

Greylog is a syslog aggregator that might do what you’re looking for.


Greylog is a syslog aggregator that might do what you’re looking for.


Let’s bring back leaded gas too. Metal poisoning for everyone.


The exception here would be ESP32 devices. These have been some of the most reliable devices in my home and the most versatile, no Internet access required. Zigbee works well, but runs in the same frequency space as wifi and Bluetooth. Matter and thread are the new hotness and run in that space too. They all work well together, but something to consider. Z Wave is in a separate frequency space, but is a less open protocol. I have at least a few of all of these and they all play nice. Consider your priorities and choose what’s best for your application.


Can’t get to court if they murder you in the street


Female nipple. Male nipples are a-ok. 🙄


You mean like Giuliani?


It’s not so much that she’s thinking, it’s that the language that she’s parroting requires training oneself to doublethink to maintain the illusion that the Trump administration is anything but a tool of fascism.
That might be helpful. So far I was skipping the window manager and just opening the application by itself in xinit.
Thanks, I’ll give that a look.


Sounds like it’s time to take to the seas me bucko.


deleted by creator


A layered defense is always best. Nothing is 100%, but knowing your threat model will help define how far you have to go and how many layers you want in the way. Defending against State level actors looks different than swatting the constant low effort bot traffic. You’re right, if a bad actor gets root on your machine, all security is forfeit. The goal is to minimize that possibility by keeping applications and packages updated and only allowing necessary connections to the machine. You mentioned wireguard or tail scale. Set that up first. Then set up the host firewall to only allow outbound traffic onto the VPN to the required ports and endpoints on the LAN. If the VPS isn’t hosting any public facing services, disable all traffic except the VPN connection from and to the public Internet both on the cloud provider’s firewall and the host firewall. If it is hosting publicly accessible services then use tools like fail2ban and crowdsec to identify and block problem IPs.


Firewall rules on outbound traffic from the VPS to the LAN would do it. Allow traffic to the hosts and ports that the VPS needs to reach and block everything else.
Agreed.Also, Windows and OSX, unless you want to have to call your nephew who’s Good With Computers™ every couple of weeks. If you’re just using a browser for everything and never messing around like a good majority of people, Linux is just as good as either of those. Linux has gotten to the point where it’s Grandma proof if you stick to a distribution that prioritizes stability. If you choose a distro that prioritizes bleeding edge software versions, you may come across more bugs and breaking changes.Then you’ll need the troubleshooting skills mentioned here. Most of us are here to learn and mess around; the troubleshooting skills grow from that mindset.


I’ve seen it explained elsewhere and it makes sense to me. Kidnapping usually implies a person being taken with the intention of negotiating for their release, where disappeared is more often associated with avoidance of giving any substantial information to a party seeking their return.
I thought the problem with Concord was that it was like too many other things. So I guess the “failed live service shooter canceled within 2 weeks” genre?