• 1 Post
  • 230 Comments
Joined 3 years ago
cake
Cake day: July 2nd, 2023

help-circle










  • I might be misunderstanding this concept but it seems like extra work, or a recipe for an insecure mess that could become difficult to maintain.

    I run elk stack and log basically everything which has created a centralized point for observability. This lets me granularly investigate and thereby control the state of all of my networks services.

    It’s a little ram hungry, but I’ve got some overhead.








  • foggy@lemmy.worldtolinuxmemes@lemmy.worldFlip flop
    link
    fedilink
    arrow-up
    32
    arrow-down
    2
    ·
    3 months ago

    I had a coworker, about 30 years old… Who taught computer science at a college prior to us working together… Who said to me “Command line? That stuffs ancient, man.”

    Just in case you were thinking about spending money on college tuition to learn computer science…



  • Listen, the only folks you put your black hat on for are folks who try to phish you. And you report your findings anonymously to CISA.

    That’s how the recent USPS scams, the EZ pass scam, and the AAA scam got untangled. Be safe.

    You put on your black hat at work when your boss tells you to do so on objects under your teams ownership. Don’t be stupid.

    Other than that, don’t be an idiot. Stick to BBPs and VDPs, Educational labs, shit you own, etc. Nothing more than a totally unglamorous fine, or worse, awaits you.

    Sincerely, a veteran of cybersecurity.