People have done that for ages. Pic taken of the screen with another device, try and block that now. Basic rule, if you send it out assume it’s no longer private.
Some dingbat that occasionally builds neat stuff without breaking others. The person running this public-but-not-promoted instance because reasons.
People have done that for ages. Pic taken of the screen with another device, try and block that now. Basic rule, if you send it out assume it’s no longer private.
Oh come on, you think some would do that? Go in the internet and tell lies?
I mean it is or at least should be a policy on most sites already, it’ll be nice to have some teeth beyond banning their accounts though.
Also a nice tool, but not nearly as convenient if you want to just pull a quick test from a phone for example.
A lovely tool to have on the home net to help confirm things are working as expected.
If they’re already giving exclusive access to Google for search and AI training, my bet is it’s all in a bid for ‘please buy us daddy Google’, and let them handle it from there.
After all, they wouldn’t want anyone to call them out on continuing chicanery during such a trivial event as their home country’s presidential election cycle…
Who is surprised here, raise your object manipulation attachment, er, hand…
Yet I see those same posts screen-shot and posted here as though they was reliable news sources.
Never used don’t care really but:
users can also force touch a post in order to open a menu with more options.
Their terminology needs some work, force touching is not ok…
Question here, why do the cameras I need to only connect to that one? Using an extender won’t create a truly separate net, some might create a NAT to look separate but you can still connect from the extenders net to the host net.
WiFi continually beacons out to try and find previously connected networks and will select for the best signal from an AP it can reach. Extenders can be a trick if you’re sitting in the ‘crossover’ space between the extender and the back haul it connects to.
What you might try instead is one of those distributed AP systems like Unifi or similar where all the APs are controlled by a switch and work in unison. The one I have at least has an ability to disconnect someone if they drop below a certain level and migrate them to another AP without breaking the session states.
The other option that I can think of is just turning off the auto connect for the extender net and only using that manually.
The hard part is securing the exported tokens in a way that you could quickly replace them in the event a device was lost/compromised. A good practice would be something like with Aegis you can have it save an encrypted export whenever you make a change and then sync that to an external location where you can re-import it from. Wiping them from the original lost device is another challenge in itself, but as I recall both Android and Apple have mechanisms where you can send a signal to remotely wipe the system.
I looked about for it and the PG update basically involves creating a new folder to initialize and then exporting/importing the old DB, but haven’t successfully done so yet here.
They’re a part of the mix. Firewalls, Proxies, WAF (often built into a proxy), IPS, AV, and whatever intelligence systems one may like work together to do their tasks. Visibility of traffic is important as well as the management burden being low enough. I used to have to manually log into several boxes on a regular basis to update software, certs, and configs, now a majority of that is automated and I just get an email to schedule a restart if needed.
A reverse proxy can be a lot more than just host based routing though. Take something like a Bluecoat or F5 and look at the options on it. Now you might say it’s not a proxy then because it does X/Y/Z but at the heart of things creating that bridged intercept for the traffic is still the core functionality.
It depends on what your level of confidence and paranoia is. Things on the Internet get scanned constantly, I actually get routine reports from one of them that I noticed in the logs and hit them up via an associated website. Just take it as an expected that someone out there is going to try and see if admin/password gets into some login screen if it’s facing the web.
For the most part, so long as you keep things updated and use reputable and maintained software for your system the larger risk is going to come from someone clicking a link in the wrong email than from someone haxxoring in from the public internet.
I have a dozen services running on a myriad of ports. My reverse proxy setup allows me to map hostnames to those services and expose only 80/443 to the web, plus the fact that an entity needs to know a hostname now instead of just an exposed port. IPS signatures can help identify abstract hostname scans and the proxy can be configured to permit only designated sources. Reverse proxies also commonly get used to allow for SSL offloading to permit clear text observation of traffic between the proxy and the backing host. Plenty of other use cases for them out there too, don’t think of it as some one trick off/on access gateway tool
Should not, wonder if there’s any adguard/pihole lists to smack OneDrive/box/Dropbox/etc domains and just take these services out before they can start.
A deadline set by a government agency for government workers, NOT a ‘Google Pixel Deadline’. Stop writing alarmist headlines to make it sound like Google is gonna shut off your phone if you don’t comply. You should update, but knock this writing style off people.
Zabbix or Cacti are nice ways to draw maps that also serve a functional role in keeping track of the activity and alerting.
Looks like was just updated today pending transfer, so either the owner transferring registrars or someone took it over.
There are some use cases other than web page compatibility. One for me is in dealing with firewall and proxy policy, if the agent is a browser and comes in on specified explicit ports then force authentication, things of that nature.