It is hard, if even possible, to keep documentation up-to-date. Better use a configuration management system (salt, ansible etc.) for your servers. Yes, you need to learn how to use it. Yes, it will take a longer time to make changes in your configuration. But as a result you’ll have a self-documented configuration-as-a-code that will allow you to scale your setup as you need. Reproducing something won’t require reading your notes, remembering your actions etc.
- 1 Post
- 354 Comments
Absolutely wrong. Only the manual (I mean official documentation, not a “howto” in someone’s blog) can provide you a complete and up-to date information.
It depends on what you mean by “local private network”. Probably, you need samba.
It doesn’t hide what’s under the hood and permits to fix/modify it. Yes, I’m a nerd.
I have no idea. It depends on your locale on mac.
You probably need to pass the
iocharsetmount option.
In matrix, chats with e2e encryption are protected from hoster even if they would try to steal your data.
bizdelnick@lemmy.mlto
Linux@lemmy.ml•foreach - Bash alias to execute command on each line
2·1 month agoI almost never use
xargs. The most common case for it isfind, but it is easier to use its-execoption. Also, withfindyour example is incorrect. You forgot that file names can contain special characters, the newline character in particular. That’s why you need to pass-print0option tofindand-0option toxargs.
Antivirus wont protect you if you run everything you find in the interhet. You need to be smart enough to avoid cracking. But if you are smart enough, you don’t need an antivirus.
Have you tried NetBSD?
bizdelnick@lemmy.mlto
Selfhosted@lemmy.world•How do I avoid becoming one with the botnet?English
4·2 months agoMakin notes is good for sonething very simple. It’s better to automate deployment with salt, ansible or something similar. A bit more effort at first setup, much easier restoration. Self-documented.
bizdelnick@lemmy.mlto
Selfhosted@lemmy.world•How do I avoid becoming one with the botnet?English
1·2 months agoI don’t think you gain much from OpenBSD. It is focused on preventing vulnerabilities that are hard to exploit and unlikely used by botnets. Most dangerous are vulnerabilities caused by software misconfiguration. The OS cannot prevent your mistake. Also, in OpenBSD you will be unable to use modern containers like docker, podman etc.
bizdelnick@lemmy.mlto
Selfhosted@lemmy.world•How do I avoid becoming one with the botnet?English
111·2 months agoBy default your OS is secure. You only have to think about what you expose and how can it be broken in. Disable SSH password authentication. Don’t run software that is provided by hobbyists who have no enough security expertise (i. e. random github projects with 1 or 2 contributors and any software that recommends install method
curl <something> | sudo bash). Read how to harden the services you run, if it is not described in the documentation — avoid such services. Ensure that services you installed are not running under root. Better use containerized software, but don’t run anything as root even inside containers. Whenever possible, prefer software from your distro official repos because maintainers likely take care about safe setup even if upstream developers don’t. Automate installing security updates at the day they released.What doesn’t help:
- Security through obscurity. Changing SSH port etc. Anyone can scan open ports and find where SSH is listening.
- Antivirus. It is simply unable to detect each of numerous malicious scripts that appears every day. It just eats your system resources.The best it can do is to detect that your host is compromised, but not prevent this. It is not security, just marketing.
- Making different rules for public internet and DMZ. Consider there’s no DMZ. Assume that your host can be accessed by crackers from anywhere.
bizdelnick@lemmy.mlto
Selfhosted@lemmy.world•Spliit – Open-source, self-hostable alternative to SplitwiseEnglish
10·2 months agoWhat is Splitwise?
bizdelnick@lemmy.mlto
Selfhosted@lemmy.world•Dim — Self-Hosted Media Manager for Organizing & Playing Your Own LibraryEnglish
24·2 months agoThere is only one commit for two years. Seems dead.
bizdelnick@lemmy.mlto
Selfhosted@lemmy.world•Why isn't using a key file the most common way to log into self-hosted servers?English
4·3 months agoPassphrase-protected SSH keys are definetely more secure than passwords.
bizdelnick@lemmy.mlto
Linux@lemmy.ml•Installed Linux for the fist time in Feb, I've now started saving ISO's
81·4 months agoYour family will hate you if you’ll change their distro and DE every time you visit them. Distro hopping is normal for the first couple of years, but do it on your own machine.
Maybe. But you never know this beforehand.
In most cases you just need to replay a playbook for quick fix. But I agree that the proper fix will likely take a longer time (while downtime is much shorter).
Let @BruisedMoose@piefed.social decide.
P. S. I don’t like Ansible, other tools can be easier to use. But I don’t want to recommend something concrete.