• 0 Posts
  • 319 Comments
Joined 2 years ago
cake
Cake day: August 8th, 2023

help-circle
  • If you shut down the computer gracefully first before you power the disks off it should be ok more often than not, but you really should try to have everything on the same system so this can all be coordinated by the OS and the hardware.

    As others have said, avoid powering the disks off before the OS has had a chance to shut down or your disks will NOT be in a recoverable state when everything comes back online.

    I’m not even sure the setup you are describing would benefit at all from a different storage method, even “regular” writes could be in memory or controller buffers. External drives are not meant to have their power cut.


  • PFOA is one of the most prominent forever-chemicals and has polluted every single living creature on earth (including you). PFTE is another one.

    PFOA causes tumors and has been found in 100% of the places (including living creatures) that is has been tested for. Every human, every animal, every river, every forest, every senior, every newborn.

    The real “tinfoil hat” is how we let them get away with it. Oh? They had money and were in America? You don’t say.









  • I had a double NAT setup like that. Run a firewall like OPNSense as a Proxmox VM, and give it a WAN interface on the ISP router’s IP range; then run everything else on a different subnet, using OPNSense as the gateway. On the ISP router, put OPNSense’s WAN IP in the DMZ. Then, do all your hardening using OPNSense’s firewall rules. Bonus points for setting up a VLAN on a physical switch to isolate the connection.

    The ISP router will send everything to OPNSense’s WAN IP, and it will basically bypass the whole double NAT situation.


  • That is absolutely not the reason ANYONE recommends it, unless you are a complete noob and entirely unfamiliar with computer security at all, and are just pulling assumptions out of your ass. Don’t fucking do that, don’t post with confidence when you’re just making shit up because you think you know better. Because you don’t.

    If there is a vulnerability in SSH (and it’s happened before), attackers could use that to get into root directly, quickly, and easily. It’s an instant own.

    If root login is disabled, it’s way less likely that whatever bug it is ALSO allows them to bypass root login being disabled. Now they have to yeah, find a user account, compromise that, try to key log or session hijack or whatever they set up, be successful, and elevate to root. That’s WAY more work, way more time to detect, to install patches.

    If the effort is higher, then this kind of attack isn’t going to be used to own small fry servers; it’s only be worth it for bigger targets, even if they’re more well protected.

    If you leave root enabled, you’re already burnt. You’re already a bot in the DDoS network.

    And why? You couldn’t be bothered to type one extra command in your terminal? One extra word at the start of each command?

    Sorry bitch, eat your fucking vegetables