A software developer and Linux nerd, living in Germany. I’m usually a chill dude but my online persona doesn’t always reflect my true personality. Take what I say with a grain of salt, I usually try to be nice and give good advice, though.

I’m into Free Software, selfhosting, microcontrollers and electronics, freedom, privacy and the usual stuff. And a few select other random things as well.

  • 1 Post
  • 273 Comments
Joined 4 years ago
cake
Cake day: August 21st, 2021

help-circle


  • I believe unread books have a long tradition. I remember some novel we had to read in school, talking about unread books. I believe that was The Great Gatsby (from 1925), where the new-rich people bought books as a status symbol and put them on their shelves. But they never read them and you could tell by how the pages hadn’t been separated. (Which was a thing to do back then.)

    I believe they’re still some sort of a status symbol a century later, albeit a different one. I recently bought a book on Kotlin programming, because I’d really like to be able to program Android apps… But I didn’t read it (yet), so currently it’s just sitting there, collecting dust. But somehow the act of buying it and having it there, did something for me… It’s not a status symbol that I brag with to other people at all. But unless I muster up the time and actually read it, I still can’t code Android apps.

    In that sense, I think there are various reasons why we collect books. And we’re all a bit “new-rich”, because information and text is available in abundance in the digital age. And you (and everyone) can easily afford to host a BookStack instance… But is it about the content? Is it useful? Or a status symbol to show off to other people? Or a plaything to tinker with, or like with me and the Kotlin book more wishful thinking than anything else? … Kind of depends on what you do with it.



  • Try finding out if it received an IP address, if the driver is loaded or if there are any error messages in dmesg. You might also want to give more information. Which ethernet card? Which version of Linux are you running? And there seem to be some similar reports on Reddit and in some Linux forums. I couldn’t find a solution, though. Maybe you just want to buy a cheap new network card.



  • Sure, I have an old PC with an energy efficient mainboard and a PicoPSU and I wouldn’t want anything else. I believe it does somewhere around 20W-25W though. And I have lots of RAM, a decent (old) CPU and enough SATA ports… Well, I would go for a newer PC, they get more energy efficient all the time… But it’s a lot of effort to pick the components unless some PC magazine writes something or someone has a blog with recommendations.


  • You’ll want to look up the QNAP as well. I’ve seen reports with quite some variety on the power consumption. Depending on the exact model, it could be somewhere in the range from 25W to 55W… So could be less, could be the same. And have a look at the amount of RAM if you want to run services on it.



  • I think Radicale, Baikal, SabreDAV or NextCloud are the most common choices. I read those names a lot.
    But I believe only one of those isn’t written in PHP.

    I’d really recommend digging into the “hacking” though. Unless you learn from your specific mistakes and avoid that in the future, you might run in to the exact same issue again. And I mean it could be a security flaw in the program code of the WebDAV server. But it could as well be a few dozen other reasons why your server wasn’t secure… (Missing updates, insecure passwords, missing fail2ban, a webserver or reverse proxy, unrelated other software… There are a lot of moving gears in a webserver and lots of things to consider.)


  • I can’t remember the exact details, but I believe the attackers also targeted instances? So it’s not just that it happens with certain problematic instances, but everyone could have that uploaded to their media storage. And it can come from arbitrary places. I believe that adds to the problem. And it kind of requires to shut these things down for everyone. Or at least everyone except a few excellent hand-picked instances who cooperate closely, and the moderation tools actually work.

    Yes, they’ve done an excellent job. I just wish they wouldn’t have to deal with these things.

    (And I also think some of the child protection agencies should finally offer some open-source tool to scan content. Afaik there are still no image classifiers or hash tables I could use for my projects.)






  • I think if you use a SIP provider, they’ll have an app or a description on their website how to connect with third-party software. Just install it on a device you take with you, and configure it as per their description. Examples for Android SIP softphones are Linphone and Baresip.

    Other options: you have a AVM Fritzbox at home and install their app. Or you set up an entire PBX like Asterisk or FreePBX or one of the other ones. That’s rather complex and involved.



  • hendrik@palaver.p3x.detoNo Stupid Questions@lemmy.worldHow do I rent a botnet?
    link
    fedilink
    English
    arrow-up
    16
    arrow-down
    1
    ·
    edit-2
    15 days ago

    I think unless you want to send some money to a shady self-proclaimed hacker, you’d just go with a regular computer security company. They can do it and they’ll have people who know what to look for. You can’t do red-teaming without any of the background knowledge, it’s a proper job and takes lots of experience to get meaningful results. And before you yourself launch a large DDoS attack on “your” rented virtual server, contact your hoster and give them a heads-up, since that’s really their servers, their datacenter and netwoking infrastructure which might get affected.

    If it’s a smaller website and not super critical, you might be fine hiring some single freelancer who know what they’re doing as well…

    (And other than that… I’d just rent 10 AWS instances from Amazon, or the equivalent from Microsoft or any of the cloud providers. For all intents and purposes, that’s your proper botnet with a lot of bandwidth. But please don’t do this for nefarious purposes.)


  • Nah, I don’t think there’s a lot on IPv6 in that book. I think OP’s concern is valid. Accessing devices at home isn’t unheard of. The amount of smart home stuff, appliances and consumer products increases every day. And we all gladly pay our ISPs to connect us and our devices to the internet. They could as well do a good job while at it. I mean should it cost extra to manage a static prefix, so be it. But oftentimes they really make it hard to even give them money and obtain that “additional” service.


  • I wonder how often the assigned prefix changes with most of the regular ISPs. I’d have to look someone else’s router since I’m still stuck on an old contract. But I believe what I saw with some of the regular consumer contracts: the prefixes stay the same for a long time. You could just slap a free DynDNS service on top and be done with it.

    But yes, I think this used to be the promise… We’d all get IPv6 and a lot of gadgets like NAS systems, video cameras and a wifi kettle and they’d be accessible from outside. Instead of that we use big capitalist cloud services and all the data from the internet of things devices has some stopover in the China cloud.