Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
ELI5:
It lets you remotely control a computer.
It's different (arguably better) than remote connection software because it is a separate device that basically just forwards your keyboard & mouse inputs. This means that you can control the remote device even if it's powered off or not able to boot properly, and you can configure the BIOS remotely too.
You could call someone on-site to connect the KVM to a server, but KVMs, while expensive by regular person standards, are pretty cheap as enterprise hardware goes. So some organizations just keep separate KVMs plugged into all critical hardware all the time.
Worth noting here that KVMs are potentially a quite high security risk.
Their website is probably light on details because "KVM" is fairly common industry parlance. If you normally work with this stuff then just hearing those 3 letters tells you most of what you need to know.
Edit: high, not Hugh
You can put them behind a VPN and they should be relatively secure. I definitely wouldn't expose it on the web directly, however.
Sure, as long as the VPN itself is secure. Strong passwords/keys, etc. A VPN itself can be a potential security risk, as if it's compromised an attacker can tunnel traffic directly into a network straight past a firewall.
The risks can definitely be mitigated, but if someone's asking for an ELI5 on KVMs, then it may be best to stay away until they have a better understanding of IT infrastructure altogether.