• 1 Post
  • 83 Comments
Joined 1Y ago
cake
Cake day: Jun 17, 2023

help-circle
rss

Ironically, the part of Perl that looks most cursing is the regular expressions, and that’s the feature that so many modern languages have borrowed from Perl directly.


Have you tried doing CAD work on a phone or iPad over a Remote Desktop connection?

Seems unpleasant enough to drive someone to buy a proper laptop to travel with.


If you don’t have a proper computer, how will you access this remote server to do your CAD work?


I imagine BitWarden is sufficiently good. The big leap in security comes from having no password manager to a decent password manager.

LastPass does not seem as serious about security so it doesn’t meet my personal bar for decency.


LastPass doesn’t have your password, so it can’t be stolen during a breach.

But 1Password goes a step further, also requiring a “secret key”, which also can’t be stolen.

https://support.1password.com/secret-key-security/

Even if an attacker manages to steal your encrypted data from 1Password and also guess your master password, they still can’t access your data without a secret key.

For that reason, your 1Password account is more likely to compromised through your own device, not their server. And if your own devices are thoroughly compromised, no password manager can save you— the attacker can potentially grab all you type and see all you see.


I evaluated both BitWarden and 1Password for work and 1Password generally won across the board.

If you host yourself make sure backups are rock solid and regularly monitored and tested. Have a plan for your infrastructure being down or compromised.


1Password’s security model guards against this. Even if they are breached, your passwords cannot be decrypted.

You are more likely to screw up your own backups and hosting security than they are.


I like to manage services maximally with systemd so it was a natural fit for me.

It did not seem difficult to set up web and database quadlets so they are properly networked.


I’ve lived in the US for about half a century and have never heard this.


I tried a USB KVM switcher. I only recall there were serious issues and it didn’t last long.

Now I use a high quality USB dock and physically unplug/re-replug a work and personal laptop. That’s been a simple and reliable solution.

For my home server, I ssh into it.



Ghost has a lot of these features as well as being a blog and handling paid subscriptions and donations.


You use an IMAP syncer, like this one:

http://www.offlineimap.org/

A word of caution: I professionally hosted email for over a decade.

90% or incoming email will be spam. Anti-spam tools will need regular updates. Backups are also super important.

All things considered, I don’t host my own email anymore although I know all the pieces involved.

There are also some independent email hosts that are good like Fastmail or for extra privacy, Proton Mail.


If the emails live on your server, can’t you use software there to send, receive and search emails?


There aren’t log visualizers for every artisanal log file format. But there’s a movement towards supporting JSON format logs for more services, and lots tools that can understand JSON logs making generating graphs and metrics from arbitrary logs fairly efficient.

If this tool is making the logs harder to parse by using a custom format, that’s something the tool could improve.

Some apps support both plaintext logs for humans and JSON logs for tools.


I recommend generating some metrics from the logs and graphing them yourself.

Perhaps the free Grafana plan would have what you need to parse the log files and visualize the metrics you want.


Look at how Dynamic DNS supported. Does it require full access to the account-- dangerous-- by using your login credentials or an API token with full read/write access? Or does it over a very limited scope access that gives the Dynamic DNS tool precisely the access it needs to update a single DNS record-- much safer! The latter is what CloudDNS does.


There are two services involved. Domain registration and DNS. Most domain registrars now provide some free DNS service, with basic features. I monitor dozens of domains, and I can tell you that these free DNS services with registrars are most likely to have short DNS outages as well.

ClouDNS is a professional, high-quality DNS service and that does one thing well. As far as I can tell, they don’t do domain registration, so that will always be a separate service. One of the things that ClouDNS does well is making Dynamic DNS easier.


Domain.com sounds like a domain registrar. You would keep that service and point your name servers for the domain to the ClouDNS name servers.


ClouDNS makes DDNS easy for a low cost for 1-5 domains.


DDoSing cost the attacker some time and resources so there has to something in it for them.

Random servers on the internet are subject to lots of drive-by vuln scans and brute force login attempts, but not DDoS, which are most costly to execute.



I’ve donated to marcan to work on Asahi Linux, which gets upstreamed. That’s direct.

What has better performance per watt than M1 at a better price?


I didn’t pay a premium, I got a great deal.

The reverse engineering work was already complete, and all the containers I needed for ARM were available.

These have great performance per watt.


I host using an M1 Mac Mini using Fedora Asahi Linux. Installed easily, no problems. Fast and quiet!

I ran a Minecraft server for a while. Worked fine.


There are plenty of Linux containers available for ARM in part because a lot of developers want to run Linux containers within macOS on Apple Silicon.

That has had the effect improving the experience of running Linux directly on ARM servers.


All the hardware support for the Mac Mini is complete and working.

I’ve had no problems running Asahi Linux on an M1 Mac Mini.


He didn’t say he needed to make money farming.


Considering the database itself is relatively small, PostgreSQL could end up largely caching it in memory, so even hosting the DB on an HDD might not feel much slower.


As someone who has done e-commerce development and supports FLOSS and self-hosting, this is something I would outsource.

It’s complex, and you can’t really handle payments yourself anyway. That requires certification.

And people really don’t like it when their e-commerce is down and may able to quantify lost business due to an outage or bug in dollars or sense. It doesn’t feel great to realize something on your end resulted in hundreds of dollars of lost business.

If the business is very small, places like Shopify have cheap starter tiers.


Are you installing this for someone else?




Former professional email host here. Email is like 90% spam.

If want to spend your free time battling the ever evolving landscape of spam, enjoy.

Otherwise, work with a pro mail provider you trust.


As someone who has had a career in hosting: good luck.

Don’t forget backups, logging, monitoring, alerting on top of security updates, hardware failure, power outages, OS updates, app updates, and tech being deprecated and obsolete at a rapid pace.

I’m in favor of a decentralized net with more self-hosting, but that requires more education and skill. You can’t automate away all the unpleasant and technical bits.



If you use the AWS load balancer product or their certificates, they have access to the private key, regardless of whether you forward traffic from the LB to the container over HTTPS or not.

If you terminate the SSL with your own certificate yourself, Amazon still installs the SSM agent by default on Linux boxes. That runs as root and they control it.

If you disable the SSM agent and terminate SSL within Linux boxes you control at AWS, then I don’t think they can access inside your host as long as you are using encrypted EBS volumes encrypted with your key.


With what? HTTPS has to terminate the encryption somewhere and that place has to have the private key to do so.

CloudFlare is providing the same service here as all other hosts of HTTPS websites do.


It’s not who issues the cert that matters, it is who hosts it. Hosting it includes having the private key. You always have to trust your website host, full stop.


One of the services they provide is free SSL certificates. As part of that, they have the private key to decrypt the traffic. They aren’t trying to hide that— this is true of any service that hosts the SSL cert for your site.


Recommendation for outgoing-only SMTP server
I'm looking for a simple sendmail replacement to receive local mail, such as from cron and service failures and forward it to on to a real SMTP server. I have used `msmtpd` successfully but thought I'd ask if folks have other solutions they like.
fedilink