Skip to content

ICEBlock - See Something, Tap Something

Technology
10 8 0
  • 4 Stimmen
    6 Beiträge
    50 Aufrufe
    jimmydoreisalefty@lemmy.worldJ
    I wonder! They may be labeled as contractors or similar to a merc. Third-party contractors that don't have to follow the same 'rules' as government or military personnel. Edit: Word, merchs to merc, meaning mercenary
  • 424 Stimmen
    80 Beiträge
    393 Aufrufe
    S
    It really depends on the company. Some look for any way to squeeze you. Others are pretty decent and probably more efficient as they dont waste as many working hours on bullshit claims and claim resolution. Also if i rent a car i want things to go smoothly. I got places to be. You make my life easy, ill happily pay again and do my best to make yours easy too.
  • French city of Lyon ditching Microsoft for FOSS

    Technology technology
    17
    1
    494 Stimmen
    17 Beiträge
    86 Aufrufe
    K
    The important thing is that the doomsday device runs Linux
  • The End of Publishing as We Know It

    Technology technology
    10
    1
    50 Stimmen
    10 Beiträge
    44 Aufrufe
    beejjorgensen@lemmy.sdf.orgB
    Lol.. I wanted "DRM". But it's been a long day.
  • 311 Stimmen
    50 Beiträge
    275 Aufrufe
    T
    The list of previous searches on his iPhone included “Which month is april in islam,” “Festivals happening near me,” “are suicide attacks haram in islam,” “ginger isis member,” “lone wolf terrorists isis,” and “can tou kill a woman who foesnt[sic] wear hijab.” lol of course he’s a fucking idiot
  • Super Human In Transit - Living

    Technology technology
    1
    2
    0 Stimmen
    1 Beiträge
    13 Aufrufe
    Niemand hat geantwortet
  • Building a slow web

    Technology technology
    37
    1
    175 Stimmen
    37 Beiträge
    196 Aufrufe
    I
    Realistically, you don't need security, NAT alone is enough since the packets have nowhere to go without port forwarding. But IF you really want to build front end security here is my plan. ISP bridge -> WAN port of openwrt capable router with DSA supported switch (that is almost all of them) Set all ports of the switch to VLAN mirroring mode bridge WAN and LAN sides Fail2Ban IP block list in the bridge LAN PORT 1 toward -> OpenWRT running inside Proxmox LXC (NAT lives here) -> top of rack switch LAN PORT 2 toward -> Snort IDS LAN PORT 3 toward -> combined honeypot and traffic analyzer Port 2&3 detect malicious internet hosts and add them to the block list (and then multiple other openwrt LXCs running many many VPN ports as alternative gateways, I switch LAN host's internet address by changing their default gateway) I run no internal VLAN, all one LAN because convenience is more important than security in my case.
  • 68 Stimmen
    7 Beiträge
    42 Aufrufe
    heythisisnttheymca@lemmy.worldH
    Worked with the US federal government for much of my professional career, mostly in an adversarial role. "reliable federal data sources" do not exist