I take my shitposts very seriously.

  • 0 Posts
  • 25 Comments
Joined 1 year ago
cake
Cake day: June 24th, 2023

help-circle
  • rtxn@lemmy.worldtoAnimemes@ani.socialNo idea at all...
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    1 month ago

    I enjoy the occasional irredeemable, evil for evil’s sake villain who nevertheless has a goal and the competence to carry it out. It was also cool when he

    did a thing

    came back from death just to scold Hermes for… let me check my notes… not being evil enough.

     

    Valens on the other hand? Dude can burn for all I care. He was sadistic for no reason, he only wanted power at any cost, and relied on the technology and experience of others that he ultimately couldn’t control. The only good thing he did was

    the reason it's the best trial series.

    giving Gaius a redemption arc.



  • This. I’ve had issues at work while imaging classroom computers where some would finish in ~30 minutes and a few would need hours. All of the computers used Cat6 cables. This being a classroom, and students being absolute wankbags, they kept yanking the computers and kicking the cables, so the wires came loose from the plugs. I later used ethtool to debug the slow computers – the switch would only allow 10baseT link modes.


  • I just simply set up a script to export my Trilium notes

    edit the notes with an external editor, and then you can just re-import the note

    Those two lines right there.

    I value interoperability between software. Using a container format to store plaintext files and metadata introduces an XKCD 927 situation where it’s just another reinvention of the wheel that requires additional software support or a whole other workflow for no real benefit. Why is it necessary, for example, to store plaintext data and the related hierarchical structure in a container format when the same feature is already present in the filesystem with files and directories? It adds unnecessary complexity, roadblocks, and points of failure.

    I’m using QOwnNotes at the moment. If I want to edit a note, for example, using neovim through SSH, all I need to do is navigate to the markdown file and open it. No scripts, no export/import. Only text files, and that is all it ever needs to be.


  • They all offer more or less the same network services with different UIs.

    OpenWRT is specifically designed to work as a lightweight system running on consumer-grade routers. If you want this, you’ll have to check the website’s Table Of Hardware to determine if your hardware is compatible.

    OPNsense and pfSense are general-purpose FreeBSD-based operating systems that you can run on discrete computers or in VMs that act as network gateways. All three are free/gratis, but you have to make an account and go through the store page to download pfSense.

    I personally use OPNsense in a VM.







  • At some point, you have to compromise.

    • You can open the port(s) used by the game on the firewall (assuming you have a publicly routable IP).
    • You can run OpenVPN or a proprietary solution, but you’ll have to open a port on the firewall, and I know from experience that they’re a bitch and a half to configure.
    • You can run Wireguard, but you’ll have to open a port on your firewall and have the other clients generate and send you their public keys.
    • You can run Tailscale (my preferred solution), which uses Wireguard and works without opening the firewall and without a publicly routable IP (e.g. behind CGNAT), but you’ll have to install the client, have the users sign in, and then add them to your tailnet, which IMO is much easier than setting up Wireguard peers manually.
    • You can use Tailscale Funnel, which exposes your tailnet to the public internet, but it’s in beta, has high latency, and only supports TCP, so you’ll have to figure out how to smash UDP datagrams through a TCP tunnel.
    • You can try Ngrok (my backup in case Tailscale can’t connect), which is a similar NAT traversal solution, but it only supports TCP and gives you a different IP and port every time you create a tunnel.
    • Twingate also exists, I guess, but I’ve only ever used it for SSH.


  • Wireguard

    You mean Wireshark? It’s possible. You might even capture the DHCP exchange.

    The two best programs for the job are nmap and arp-scan.

    Nmap is like ping on steroids. You can use it for network discovery, port scanning, fingerprinting, and basic pentesting. As long as the pi can talk to the computer, nmap will sniff it out.

    ARP-scan works on the data link layer to identify hosts using ARP. It should be able to return the IP address of all ethernet devices even if they end up in different subnets. It took me a little over two minutes to scan a /16 subnet with one retry and 0.1 second timeout.

    If you are really concerned about the pi’s address, you should run a local DHCP server on the laptop. dnsmasq for Linux and Mac, but I have no idea what to use on Windows (other than a VM bridged to the ethernet interface).




  • I’ve never used a pi, but it should be possible to mount the root partition and edit the /etc/network/interfaces or /etc/dhcpcd.conf file, or /etc/NetworkManager/conf.d/* if you have NetworkManager (systemctl status NetworkManager to check).

    You should also make sure that sshd is listening for connections from any address (0.0.0.0 and ::).




  • rtxn@lemmy.worldtoSelfhosted@lemmy.worldssh into raspberry without a router
    link
    fedilink
    English
    arrow-up
    32
    arrow-down
    2
    ·
    edit-2
    9 months ago

    Give each device a static address, and set the default gateway to whatever’s on the other end of the cable. You might need a crossover cable, but most NICs can work using a straight-through.

    E.g. set the laptop’s address to 169.254.1.1/16 and default gateway to 169.254.1.2, and the RPi’s address to 169.254.1.2/16 and default gateway to 169.254.1.1. They should be able to talk to each other then.

    If those addresses seem familiar - Windows uses the 169.254.0.0/16 subnet to automatically assign random addresses if DHCP fails, so that if there are several computers in the subnet, they’ll at least have addresses that can talk to each other. It’s called APIPA in Windows, and Zeroconf in the Unixverse.