Skip to content

This new 40TB hard drive from Seagate is just the beginning—50TB is coming fast!

Technology
232 129 10
  • 194 Stimmen
    21 Beiträge
    0 Aufrufe
    S
    Sure: for professionals. However when casually commenting in a forum it is fine because the reader can go check the citations (and perhaps come back and add to the thread).
  • Mergulhe em Aventuras Digitais com a MerwomanPG

    Technology technology
    1
    0 Stimmen
    1 Beiträge
    1 Aufrufe
    Niemand hat geantwortet
  • Apple acquires RAC7, its first-ever video game studio

    Technology technology
    1
    1
    0 Stimmen
    1 Beiträge
    1 Aufrufe
    Niemand hat geantwortet
  • Welcome to the web we lost

    Technology technology
    22
    1
    181 Stimmen
    22 Beiträge
    4 Aufrufe
    C
    Is it though? Its always far easier to be loud and obnoxious than do something constructive, even with the internet and LLMs, in fact those things are amplifiers which if anything make the attention imbalance even more drastic and unrepresentative of actual human behaviour. In the time it takes me to write this comment some troll can write a dozen hateful ones, or a bot can write a thousand. Doesn't mean humans are shitty in a 1000/1 ratio, just means shitty people can now be a thousand times louder.
  • Building a slow web

    Technology technology
    37
    1
    174 Stimmen
    37 Beiträge
    10 Aufrufe
    I
    Realistically, you don't need security, NAT alone is enough since the packets have nowhere to go without port forwarding. But IF you really want to build front end security here is my plan. ISP bridge -> WAN port of openwrt capable router with DSA supported switch (that is almost all of them) Set all ports of the switch to VLAN mirroring mode bridge WAN and LAN sides Fail2Ban IP block list in the bridge LAN PORT 1 toward -> OpenWRT running inside Proxmox LXC (NAT lives here) -> top of rack switch LAN PORT 2 toward -> Snort IDS LAN PORT 3 toward -> combined honeypot and traffic analyzer Port 2&3 detect malicious internet hosts and add them to the block list (and then multiple other openwrt LXCs running many many VPN ports as alternative gateways, I switch LAN host's internet address by changing their default gateway) I run no internal VLAN, all one LAN because convenience is more important than security in my case.
  • 124 Stimmen
    12 Beiträge
    2 Aufrufe
    T
    Premium supported. You get plenty with the free tier, but you get lots more with paid.
  • 36 Stimmen
    9 Beiträge
    2 Aufrufe
    T
    It's also much easier to implement.
  • 44 Stimmen
    4 Beiträge
    3 Aufrufe
    G
    It varies based on local legislation, so in some places paying ransoms is banned but it's by no means universal. It's totally valid to be against paying ransoms wherever possible, but it's not entirely black and white in some situations. For example, what if a hospital gets ransomed? Say they serve an area not served by other facilities, and if they can't get back online quickly people will die? Sounds dramatic, but critical public services get ransomed all the time and there are undeniable real world consequences. Recovery from ransomware can cost significantly more than a ransom payment if you're not prepared. It can also take months to years to recover, especially if you're simultaneously fighting to evict a persistent (annoyed, unpaid) threat actor from your environment. For the record I don't think ransoms should be paid in most scenarios, but I do think there is some nuance to consider here.