MSgtRedFox

joined 9 months ago
[–] [email protected] -2 points 7 months ago* (last edited 7 months ago) (7 children)

I see a lot of comments conveyed unhappiness with Indiana governor and Republicans in general.

Any opinions?:

  • What should be done about the border security?

  • Is the threat of drug smuggling from across the border real or made up?

  • What should we do about fentanyl issues? I'm not interested/care about weed. It will be available soon/someday, just a matter of time.

@[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected]

[–] [email protected] -2 points 7 months ago (4 children)

What do you think would happen if the Federal government tried to activate the entire state's national guard?

How do you see that playing out?

Sounds dangerous and scary.

[–] [email protected] 2 points 7 months ago

I guess in lieu of multiple parties, or no parties, I'll take ones that differ from at least all extremes.

[–] [email protected] 4 points 7 months ago

Plus, we had one D prior.

[–] [email protected] 3 points 7 months ago

Well, they only got elected by 50.7 and 52.x percent.

[–] [email protected] 6 points 7 months ago* (last edited 7 months ago) (4 children)

I'm trying to compare Young and Braun on some of the current topics

Braun's account made a stupid social media post regarding border security/immigration recently.

I'm trying to figure out why he and party liners reject it so hard.

I appreciate that young broke away from herd on something.

https://www.indystar.com/story/opinion/columnists/james-briggs/2024/01/31/indiana-senator-fights-trump-border-immigration/72406947007/

[–] [email protected] 3 points 7 months ago

Ah, I'm sorry. 😉

[–] [email protected] 4 points 7 months ago (15 children)

This is who I was previously talking about. I didn't realize you were local.

[–] [email protected] 2 points 7 months ago* (last edited 7 months ago)

Is that a pickup line? Lol

[–] [email protected] 1 points 7 months ago (1 children)

I have the older Sophos utm, which doesn't use the Sophos cloud central manager.

I think their new firewall utm can work disconnected, but I don't know.

Sophos has a home use license that's free for non business use.

I love companies that do community edition or free home use.

Sophos, Veeam has nfr, Elastiflow has community edition, which is a netflow.

[–] [email protected] 2 points 7 months ago (1 children)

Sorry for confusion. I use Sophos utm as a WAF for exchange. Basically reverse proxy that is specifically programmed for exchange attacks. It allows OWA to keep working.

I put the exchange admin URL behind authentication, so you try to go to /ecp, it Sophos intercepts and make you authenticate to Sophos utm first, which is passing to ad with radius.

MS got rid of intune on prem. It's only Azure service now. I think.

My router is my biggest vuln. Oddly the most important. It's an enterprise ISR. It's updated as far as possible. My paranoia ends with the US gov/NSA. I don't care if they want back door oddly. I don't want China using me for attack relay however.

Loads of monitoring. You do a span/mirror port to your IDS like security Onion. Let it analyze all your traffic. Apparently there are some state sponsored exploits that allow them to owe a router at kernel level and hide their activities from you and monitoring, but that's a level I can't deal with.

As far as lock out, you create a break glass on everything. Emergency account with non rememberable ridiculous password, saved in a safe place.

[–] [email protected] 1 points 7 months ago* (last edited 7 months ago) (1 children)

What about Islamic religion? Are they bigots? There's a proper way to beat your wife constructively and lovingly.

Are they bigots?

They don't like community people either. I think they kill them? I watched a video of a group of them cutting the heads off two guys over bigot views.

Would rather have mild Republican bigotry then murder I guess.

I'm curious though if that's all of them, or some of them? All one political party,.or some?

 

cross-posted from: https://infosec.pub/post/6671372

I'm not a vendor, I'm just curious what experience people have with implementing security control frameworks?

DOD uses DISA STIGs. Else uses CIS benchmarks, or self developed based of NIST CSF?

To what degree is your organization using any of these?

Are they enforced? Monitored?

Using any vendor solutions that don't suck?

Does anyone care except you (hopefully 😉)

 

Let's talk about root certificate management and the EU proposed QWACs.

Steve Gibson of the security now podcast weighed in with opposition to the EUs proposed QWACs certs and cited a few other prominent figures also expressing opposition.

Paragraphing their concerns, they proposed that mandating a bunch of new CAs introduced more risk and greater opportunity for abuse or compromise. Steve favors less CAs also being in favor pruning out most, but 6 or 7.

At the moment, I don't care for browsers having their own certificate stores, as I would rather use the OS which I would use group policy for windows or use an automation tool for Linux.

I am also in favor of pruning out certs, though I've never tested that in an enterprise.

Does your organization allow non OS certificate stores?

Does your organization prune out default root certs?

How do you feel about the proposed QWACs?

 

cross-posted from: https://infosec.pub/post/6911236

Is anyone running saltstack, and if so, are you doing gitfs for your repo?

Do you have your pillar data in the repo? Or some other external?

Are you doing one top file in base? Or top in each branch/environment?

Is there a better way to do managed repo for salt?

 

Is anyone running saltstack, and if so, are you doing gitfs for your repo?

Do you have your pillar data in the repo? Or some other external?

Are you doing one top file in base? Or top in each branch/environment?

Is there a better way to do managed repo for salt?

 

I'm not a vendor, I'm just curious what experience people have with implementing security control frameworks?

DOD uses DISA STIGs. Else uses CIS benchmarks, or self developed based of NIST CSF?

To what degree is your organization using any of these?

Are they enforced? Monitored?

Using any vendor solutions that don't suck?

Does anyone care except you (hopefully 😉)

 

I'm curious what tools, SaaS, or other solutions are being used for vulnerability assessments?

DOD calls it ACAS, which is just an acronym for required assessment program of record they currently fullfil with Nessus scanner and related vender solutions.

Anyone have Nessus experience that can compare to another vendor? Good, bad, etc?

 

Has anyone heard significant criticism of Indiana's road?

I have. I'm wondering if there's merit to it, or we everyone thinks the roads where they live are bad.

I've driven out west and northwest where the composition of roads is different, loader like concrete, but they might not have temperature swings, use salt, or plow.

Marion County usually has bad roads compared to the suburbs, but that's a whole thing of its own

Thoughts?

41
submitted 9 months ago* (last edited 9 months ago) by [email protected] to c/asklemmy
 

Pure curiosity:

If you left reddit or another corporate platform under the banner of not being censored by their views or beliefs, what was that?

Wait. Before we open this can of worms, I'm not at all curious about an in-depth explanation of unpopular views or opinions that are generally extremist or that most reasonable people consider extreme. More of:

  • I left reddit or some other because they censor...?
  • The lemmy community is more for me because?
  • I reasons my instance policies or moderators are better than the other platform is?
  • The other platform restricted opinions or views regarding...?

If you feel like sharing, just summarize the general idea, please no indoctrination speeches.

Oh boy...

76
submitted 9 months ago* (last edited 9 months ago) by [email protected] to c/technology
 

Question for the masses because I'm curious:

What do you think social media would be like if there was no anonymity?

Is it fair to say some people behave differently online because of anonymity?

Would it be good or bad if everything you posted could be tied back to you by your friends, family, employer, etc?

Some obvious concerns people express:

  • personal safety
  • freedom to express views contrary to community, government, etc without retaliation
  • fear of stigmas related to support, education, etc for stigma topics like mental health, sexuality, etc

What reasons do you have for not wanting to own your online identity other than being able to talk trash without being identified? Some people are public and still talk a lot of trash, looking at you Twitter.

You you got doxed, what do you think the impact would be just related to social media conduct?

Edit: With the introduction of online protections for minors, how does that affect the question?

Not from a political standpoint but from a technology one, how do you see that even working?

5
submitted 9 months ago* (last edited 9 months ago) by [email protected] to c/ipv6
 

Im interested in thoughts for a scenario where you want to do small-scale multi-site activities, with site-to-site connectivity.

Here's a couple of constraints:

  • you're not going to pay the money to get an assignment, you'll just have ISP global.

  • your two or more sites will have different ISPs.

  • You're doing VPN between sites instead of provider managed. The sites might be running some normal enterprise services like active directory, or other internal corporate norms.

  • you might have the need for a backup Internet connection. Load balancing would not be required.

With the fact that the globals could change at a site, would you consider using ULA? Or just stick with global and update DNS in the event of change. I know there's a preference problem with ipv4 being chosen over ULA, so the ULA thing wouldn't be very easy unless you went straight v6.

If ULA, would you pattern/convention match the global in each site or create one organization wide ULA and assign it something like /48 per site?

What precautions do you take on gateways to ensure globals aren't used outside of the tunnel? ULA prevents this, but so does proper configuration I assume.

How would you do this?

I keep asking about ULA because I heard/read enough articles where the author says don't do it, but they seem to be geared at large enterprise or hosting where they would definitely get dedicated blocks, peering, etc. I'm interested in the little guy.

19
submitted 9 months ago* (last edited 9 months ago) by [email protected] to c/[email protected]
 

The Internet and email is old at this point.

It can be reasonably argued that email links are a significant threat vector right now.

So far, we just keep trying to sandbox links or scan attachments, but it's still not stopping the threat.

My questions for comment:

  • Would removing anonymity from email reduce or remove this threat? If business blocked all uncertified email senders, would this threat be gone?
  • Why can't we do PKI well after a few decades?
  • Does anyone believe PKI could apply to individuals? In the context of identity for email, accounts, etc?

I see services like id.me and others and wonder why we can't get digital identity right and if we could, would it eliminate some of the major threats?

Image credit: https://www.office1.com/blog/topic/email

Edit, post not related to the site or any service, just image credit.

 

I'm curious how much people are interested in using this? I see posts are fewer, especially if compared to reddit.

Maybe it doesn't help that there isn't one production mobile app, but a few personal/opensource ones out there?

Everyone here still over in r/homelab a lot?

view more: ‹ prev next ›