• 0 Posts
  • 180 Comments
Joined 3 years ago
cake
Cake day: July 2nd, 2023

help-circle


  • foggy@lemmy.worldtolinuxmemes@lemmy.worldFlip flop
    link
    fedilink
    arrow-up
    32
    arrow-down
    2
    ·
    15 days ago

    I had a coworker, about 30 years old… Who taught computer science at a college prior to us working together… Who said to me “Command line? That stuffs ancient, man.”

    Just in case you were thinking about spending money on college tuition to learn computer science…



  • Listen, the only folks you put your black hat on for are folks who try to phish you. And you report your findings anonymously to CISA.

    That’s how the recent USPS scams, the EZ pass scam, and the AAA scam got untangled. Be safe.

    You put on your black hat at work when your boss tells you to do so on objects under your teams ownership. Don’t be stupid.

    Other than that, don’t be an idiot. Stick to BBPs and VDPs, Educational labs, shit you own, etc. Nothing more than a totally unglamorous fine, or worse, awaits you.

    Sincerely, a veteran of cybersecurity.



  • Linus from LTT asks Linus if he’d ever heard of software developers being terminated based on how many lines of code they’d written .

    Linus Torvalds responds “Anyone who thinks that’s a valid metric is too stupid to work at a tech company…”

    It’s clear Torvalds doesn’t know who this is about when questioned.

    Linus hints to him it’s about Musk.

    “Apparently I was spot on [about Elon Musk being such and individual who is too stupid to work at a tech company].”



  • You got two options. Both suck.

    1. Call support. Have fun. I’d rather rip out my eyeballs in this scenario because you’re not a paying customer. You will get the shit-tier service, will likely be hung up on, and reexplain the situation to 3+ individuals over the course of 4 hours and ultimately get nothing done.

    2. Resubscribe. Finish the job. The odds of your accounts db being wiped are kinda slim. Sucks because you do what you explicitly sought to avoid: pay Microsoft.




  • I think the bulk of users are running discarded junk and raspberry pis.

    That was me, I built a ~$5k rig and now some of what I’m doing is just nonsense of a typical self hoster, so the point is somewhat valid, but even those like me mostly started out with discarded junk and raspberry pis.

    Docker used to scare me until I tackled a project that required me to use it. Then I realized I learned it without knowing I’d learned it.






  • foggy@lemmy.worldtoSelfhosted@lemmy.worldAutograding tool
    link
    fedilink
    English
    arrow-up
    3
    ·
    2 months ago

    I mean just for the love of God don’t spin up something on your company’s infrastructure that accepts file uploads.

    Just don’t.

    If you’re reading this and going “well, it’s just internal,” or “well, it doesn’t do much it just accepts this exact file type.” My god. Ask your CISA. And if they’re okay with it, cool. That’s on them.

    Unless your whole business is transferring files, don’t. And even then… Don’t.

    And if you’re still confused, the answer is to use another company’s infrastructure for this. Use Azure. Use AWS. Use Google cloud or even g suites. Don’t accept that liability. Let the trillionaires do it.


  • foggy@lemmy.worldtoSelfhosted@lemmy.worldAutograding tool
    link
    fedilink
    English
    arrow-up
    16
    arrow-down
    2
    ·
    edit-2
    2 months ago

    Why give your students a way to get RCE on your institutions servers through anything less than perfect file upload implementation.

    For a .tar? I wish you the best…

    Instead of that, simplify.

    Use unique salts for each assignment per student.

    Align hashes with those salts to check the outcome for each students assignment.

    Literally have them send you a CTF style sha256 string.

    Do it step by step where each step doesn’t depend on the next, grade as a percentage of flags accurately procured.


  • For getting your stuff available over the internet, y I recommend a secure tunnel with wire guard between your vps and servers running the services.

    Make your vps an authentication portal using stuff like Authelia and Fail2ban.

    If you’re really needing out, get ELK stood up for free and get agents on your containers/services to keep visibility into any potential… Anything