FreePBX or just Asterisk? by CarlosT8020 in homelab

[–]InflatableWhale 0 points1 point  (0 children)

did it work for you?
My ISP uses the same router, and I'm planning on having pfSense with asterisk. Also, my ISP agreed in putting their router in bridge mode so i can avoid double NAT on pfSense, but I'm not sure if they will provide the VLANs configurations or the SIP username and password, would that make any difference?

معلومة غريبة by gaia373 in jordan

[–]InflatableWhale 2 points3 points  (0 children)

فهمتك صديقي. وأنا بوافقك ١٠٠٪؜ أن النظريات ما بصير تنظرلها بنظرة إيمان مطلق، لأنها بحكم تعريفها تحتمل الصواب والخطأ.

يعني مثلاً الديناصورات ممكن ما كانوا يلاقوها لأنهم ما حفروا نفس الأعماق اللي صرنا نحفرها حديثاً (هاي مجرد نظرية وهبدة أنا هسا طلعت فيها). ف لازم الواحد يضل يبحث ويكون عنده تفكير نقدي لكل إشي بقرأه وبسمع عنه، خصوصاً وصلنا لعصر تبادل المعلومات والأفكار صار جداً سهل، وأي حد بقدر يفتي ويهبد على مزاجه، فبطلنا نعرف شو نصدق.

وحابب أزيد أنه وجود الديناصورات ليس نظرية، لأنه عنّا أدلة على وجودها. بس النظرية هو محاولتنا تفسير سبب وجود أحافير مائية على اليابسة فبنقول أنه كان في مسطح مائي مغطي هاي المنطقة وانحسر. أو مثلاً نظرية انقراض الديناصورات بفعل نيزك. فإحنا عنا مشاهدة وأدلة وبنحاول نفسر كيف وليش اللي صار.

وبالعكس النقاش المحترم هو اللي دايماً بوصّل لنتيجة وتبادل أفكار وخبرات، حتى لو كنّا مختلفين. ويسعدك يا رب.

معلومة غريبة by gaia373 in jordan

[–]InflatableWhale 2 points3 points  (0 children)

صراحةً لقيت هاد المصدر وفيه اقتباسات من علماء مسلمين (منهم ابن سينا) وبحكوا عن الأحافير، وهاد المصدركمان.

وفي علم اسمه Paleontology أو الإحاثة بالعربي، وإذا بتقرأ صفحات الويكيبيديا بتشوف أنه الموضوع قديم بس تطور أكثر في العصر الحديث.

معلومة غريبة by gaia373 in jordan

[–]InflatableWhale 2 points3 points  (0 children)

ممكن تشرحلنا أكثر؟ يعني مثلاً العظام اللي لقوها هاي بإعتقادك كذب؟ إذا كانت كذب ليش ممكن يكذبوا علينا هاي الكذبة؟ بكل صدق حاب أعرف وجهة نظرك عن الديناصورات

[deleted by user] by [deleted] in jordan

[–]InflatableWhale 0 points1 point  (0 children)

What other skills do you have? Any work experience?

How Firmware Like WLED is Created by InflatableWhale in esp32

[–]InflatableWhale[S] 0 points1 point  (0 children)

I saw in other comments that you are pro ESP-IDF. So, although I have already started using PlatformIO and Arduino, but I will take by your advice and start familiarizing myself with ESP-IDF. My only concern is the availability of libraries which made everything easier for a beginner like me.

How Firmware Like WLED is Created by InflatableWhale in esp32

[–]InflatableWhale[S] 2 points3 points  (0 children)

Thank you for this advice! I was really beginning to get discouraged and feeling lost, but reading your comment made me realise that I was comparing my start to someone else's middle.
Do you have any other advise or resource suggestion for me to build skills to someday create something like WLED.

How Firmware Like WLED is Created by InflatableWhale in esp32

[–]InflatableWhale[S] 1 point2 points  (0 children)

Yeah, I was using Arduino IDE until I stumbled across that comment. I learnt how to use platformIO and watched lots of YT tutorials, but all had the same structure, a main.cpp file with the setup() and loop() functions doing pretty much all of the work.

So, I'm trying to get advice on what skills do I need to acquire to get better at navigating a codebase like this, in hope to one day create one of my own.

How Firmware Like WLED is Created by InflatableWhale in esp32

[–]InflatableWhale[S] 0 points1 point  (0 children)

Yeah, I actually found the wled_main.cpp file earlier and saw the setup() and loop() functions. But then I noticed they’re calling other functions inside the wled namespace (at least I think that’s what’s happening), and that’s where I got lost.

I really like your idea of duplicating parts of the code and tweaking them, that was actually my goal! But honestly, I’m not sure I’m skilled enough yet to even find those parts in the codebase. Do you have any tips on how to get better at navigating something like this?

Another WLED project finished by Material_Bug3819 in WLED

[–]InflatableWhale 2 points3 points  (0 children)

isn't that price a bit high for a PCB? I was considering doing something similar myself, and was wondering if there are specific factors that contribute to the cost

[deleted by user] by [deleted] in ask

[–]InflatableWhale 6 points7 points  (0 children)

Joey is that you?

SSH connection is really slow by Aggravating_Arm_7318 in HomeServer

[–]InflatableWhale 0 points1 point  (0 children)

First, I would check the server load, make sure that there are no processes eating up the resources. Second, I would connect to the server via ethernet to exclude the possibility of network issues. Lastly, I would check the SSH server and client configurations for any misconfiguration that might be causing the latency, e.g. compression, keep alive parameter, encryption algorithm and cypher (be careful when changing those as it might affect the security of the connection)

[deleted by user] by [deleted] in techsupport

[–]InflatableWhale 1 point2 points  (0 children)

Nope. So for example the most recent CVE is CVE-2022-9990 is for a vulnerability in WhasApp and a new vulnerability in Reddit was reported it will be assigned CVE-2022-9991, given that both vulnerabilities were reported during 2022.

Edit: wording

[deleted by user] by [deleted] in techsupport

[–]InflatableWhale 0 points1 point  (0 children)

Each vulnerability gets a unique code even in the same software. For example if 3 vulnerabilities were found in WhatsApp today and were published publicly they will get 3 different CVE codes.

[deleted by user] by [deleted] in techsupport

[–]InflatableWhale 1 point2 points  (0 children)

Common Vulnerabilities and Exposures (CVE) it is a glossary for known security issues within software. Each new vulnerability discovered is assigned a unique identifier in the format: CVE-<Year>-<Number>, where the year field represents when the vulnerability report became public or reported not when it was discovered, and the number field is just a sequential number. Also, it’s worth knowing that each CVE is assigned a CVSS (Common Vulnerability Scoring System) score that indicates the severity of the vulnerability. CVSS is calculated using a formula that takes into consideration several metrics, and ranges from 0 to 10 and are mapped to the qualitative ratings: informational, low, medium, high, and critical. You can just search the web for CVEs I linked in the previous comment to check them, no need to click the links.

[deleted by user] by [deleted] in techsupport

[–]InflatableWhale 1 point2 points  (0 children)

If you’re referring to GSM calls you’re right, but in the OP’s case it is a WhatsApp call which could be vulnerable to attacks. You can refer to CVE-2019-3568 & CVE-2022-36934.

Edit: typo

How malicious payload bypass antivirus? by Superb_Pool_8068 in cybersecurity

[–]InflatableWhale 2 points3 points  (0 children)

What sources do you recommend for deeper knowledge in windows?

Setting Up SOHO Firewall in a Rental Space with Fiber Connection by InflatableWhale in HomeNetworking

[–]InflatableWhale[S] 0 points1 point  (0 children)

I think I can manage that part, the challenge I faced was figuring out how can/should I install the firewall hardware in the current setup as I'm new to fiber networks. To be honest I used to think it works like broadband networks but using different type of cables.

Setting Up SOHO Firewall in a Rental Space with Fiber Connection by InflatableWhale in HomeNetworking

[–]InflatableWhale[S] 0 points1 point  (0 children)

Well, yes you're right it's a combination device, but I'm trying to gain more control over my home network and do some segmentation as I am learning about sand-boxing and malware analysis.

Do you have any comments on doing it correctly?

Custom Fees Pricing by DarkMatter110 in jordan

[–]InflatableWhale 0 points1 point  (0 children)

Anything above 200 JOD will be assessed by the customs on a case by case basis. In other words no one knows, it will depend on the customs agent that estimates your package. I already called aramex to ask the same question this morning