Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)PL
Posts
0
Comments
7
Joined
2 yr. ago

  • If your vps is a firewall, you could use it as an exit point for different private networks: ip1 to mask the traffic for a guest subnet that you don’t trust and if the ip gets blacklisted there are no issues for lan traffic behind ip2 while ip3 is reserved for server traffic with specific rulesets on supplier’s systems for updates/backup/whatnot. Should you have more than one mail server because of reasons, if one is blacklisted the other could remain clean (in this situation you usually put them on different subnets but whatever).

  • <sarcasmo>

    Se anche questo metodo segreto ha l’efficacia dell’altro metodo segreto (piracy shield) possiamo stare tranquilli…

    </sarcasmo>

    Speriamo che questa volta abbiano coinvolto qualcuno che ha idea di cosa sta parlando.

  • You need a mail server somewhere, a mail client cannot listen for incoming messages. A possible workaround: you could activate your own mail server accessible only inside tailscale and use it to send and receive your local alerts.

  • A quando una formazione adeguata per gli utenti? Nell’articolo si fa riferimento alle aziende private costrette a pagare: un ransomware entra spesso tramite ingegneria sociale, falle nel ‘sistema umano’. Ma la formazione costa; meglio spingere per una soluzione (che non funziona) pagata da qualcun altro.

    Piracy shield anyone?