• 3 Posts
  • 39 Comments
Joined 1 year ago
cake
Cake day: June 15th, 2023

help-circle


  • SFP is pretty straightforward. Most of the SFP modules you can buy you just connect and they work. For something like that, you would be doing fiber to ethernet hand off at a switch. Then you have pretty much everything run to the switch including router and just VLAN isolate. It’s not super complicated, but if you never messed with VLANs it might be better to go with something pre-packaged unless you’re up for learning.

    You could also do a DIY router and run a multi-gig SFP+ network card over PCIe. You still have to purchase a separate SFP module for that, but that is another option.




  • I set up a backup cell connection to my cable internet connection. Sketchy Chinese 4G LTE modem. My router was a DIY job I set up off of Ubuntu Server. Everything ran to a Cisco switch and then was VLAN isolated. For the two WAN connections, I ran scripts from the router that periodically tried to reach out to several DNS providers and then average response rates to determine if the main connection was up. If not then it would modify default routes and push everything to the cell.

    The cell connection had pretty low data cap, so it was just for backup and wasn’t a home style plan. I used the old TTL modification trick to get it to pass data like a phone. When I moved the backup to 5G, TTL modification stopped working and I had to resort to creating tunnel interfaces to an actual phone. Since that tunnel is limited in bandwidth to the lowest value, my speeds were really cut in half.







  • My take on this is that Shar knew about the prism, but simply just did not care. Sharran documents like to refer to the Dead Three as “godlings” which makes a lot of sense from the perspective of Shar. She’s old. Like really old. To her the Dead Three are not much more than mortals who tricked their way into a fractional amount of power, so their machinations are childlike at best and nowhere near on the scope of what Shar is capable of.

    I agree though that Shar wouldn’t thematically ever make any personal appearance or have any direct involvement with any of her plots. That isn’t her style. She would whisper commands to super high level followers, but even then never divulge the why of it. You would just get orders not explanations.


  • Morgikan@lemm.eetoSelfhosted@lemmy.worldAny feedback from port knockers ?
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    edit-2
    10 months ago

    A VPN would give you access to a network, but not necessarily the devices on that network. It adds another layer of security as the user not only has to have SSH credentials/keys, but they also have to have the same for the VPN. SSH and VPNs would really be used in conjunction with each other.

    It’s onion security.






  • I really love the lore, especially as it pertains to the Planescape setting. It’s part of the Proclamation of Two Skies:

    After the gith destroyed the illithid empire, Gith, a warrior-queen and leader of the rebellion, declared that the People would not rest until they had discovered and destroyed all remaining illithids in the multiverse; then, the People would be free to conquer all of the planes of existence and bring war to all other races. Many of the People’s hearts shared this goal. Zerthimon argued that the People already knew freedom and should begin to mend the damage done to their race. He too expressed a goal that was in the hearts of many of the People. Still, Gith insisted that hers was the only path and that they would be “under the same sky” in the matter.


  • I use Lae’zel for my evil run, but she does have kind of that evil cat vibe. Like how every cat not only acknowledges it is a cat, but somehow feels that it is the epitome of what it means to be a cat.

    Also, as I think it’s pointed out, githyanki are canonically space Nazis. Early in her character arc there is definitely the notion that she is only helping you to help herself and that she has no problem with “final solutioning” you.


  • Typically schools and universities have acceptable use policies for student VPNs. It is not very difficult to detect VPN setup on a network and universities almost always have at least some form of network monitoring happening.

    That said, VPNs are often times blocked and so is SFTP. Most universities I’ve done work with have a requirement that the traffic will be blocked unless you can make a case to IT as to why you need that access.

    There are few legitimate use cases for student VPNs and IT staff are usually not idiots and understand what you are up to.