Skip Navigation
Linux Users- Why?
  • i started with slackware ~2003 and moved to gentoo in 2005. it was very transparent to me as a newbie. use flags and compilation from source were way simpler to me than mysterious precompiled binaries. also ndiswrapper worked with my wireless chipset on gentoo. that helped

  • ATT SMTP port 25 unblocking
  • for my own sanity i will assume the audience of that page you linked is business customers given one of their examples is a .gov. im just residential. getting a static ip out here felt monumental in itself

  • ATT SMTP port 25 unblocking
  • even if you get port 25 unblocked your IP won't pass the sniff test. you must have a PTR record on the IP pointing to your domain for the large email hosts to accept mail from you. i use amazon SES to handle outbound because of this hurdle. it sucks

  • Why disable ssh login with root on a server if I only log in with keys, not password?
  • no, if the attacker can change files in your account, they can read every byte you type in and respond with anything, including pretending to be a normal shell. im not sure how to prevent ssh from running commands in your shell

  • Why disable ssh login with root on a server if I only log in with keys, not password?
  • which sudo will check $PATH directories and return the first match, true. however when you type sudo and hit enter your shell will look for aliases and shell functions before searching $PATH.

    to see how your shell will execute 'sudo', say type sudo (zsh/bash). to skip aliases/functions/builtins say command sudo

    meh nvm none of these work if your shell is compromised. you're sending bytes to the attacker at that point. they can make you believe anything

  • InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)SL
    sludgewife @lemmy.blahaj.zone
    Posts 0
    Comments 6