sungloc.utus
sungloc.utus
One of my home servers was popped once, they stuck a new MOTD on there to let me know how foolish I was and I haven’t made that mistake since. So… yay greyhat?
For Chiefly reasons of course. Now whether or not that server is active in the cluster is another matter entirely, but hey if it makes him/her feel important /shrug
Figure ~45 minutes to run to the liquor store for a decent single malt, another ~25 minutes for the pizza rolls, quick power nap, wake up and redeploy. That’s about 2 hours.
Unix is the kind of friend who won’t bat an eye about holding your beer while you go and do something incredibly stupid
Should have paid for upgrade to a 10/8
Just make sure it is only accessible in trusted networks though!!
Aw you’re no fun. Next you’ll be telling me to block all emails over 500 miles.
For me it’s not about the traffic, more the log spam.
Generally I’ll have :22 enabled internally, and anything non-standard is defined in ~/.ssh/config
and shared out so I don’t have to remember things.
Edit: Didn’t notice you said your router can’t issue out two DNS servers. I’ve never heard of that.
Ugh. When I moved into my new place I bought a NetGear Orbi system to hold me over until I got my Ubiquiti gear put in place. Never again.
It’s well worth it for this reason alone. Unless you’re running a honeypot, getting that noise out of your access logs can provide more actionable data to work with for more persistent threats.
No joke, I thought for a second you were referring to Infinite Solutions and were trolling hardcore. I haven’t thought about that in a long time.