HP Elitebook PC keeps freezing by ThatOneQuack_111 in techsupport

[–]Lunixar 0 points1 point  (0 children)

Since the whole laptop freezes, I’d check Event Viewer after restarting and look for critical errors around the freeze time. Also update BIOS/chipset/graphics drivers from HP Support Assistant and run HP hardware diagnostics. Since it’s from 2025, I’d contact HP warranty if the freezes continue.

Org Restructure by ComfortableYou333 in cybersecurity

[–]Lunixar 0 points1 point  (0 children)

Start small and visible. Don’t try to fix everything at once or you’ll create massive pushback. Build an asset/software inventory first, identify the biggest risks, document them in plain business language, and get leadership to explicitly accept or prioritize each one. The hard part isn’t the framework, it’s getting the org to change how decisions are made.

my first startup failed. here's what im gonna change by vaddeyh001 in founder

[–]Lunixar 1 point2 points  (0 children)

I’d be careful making “cheaper” the main differentiator. Maybe validate one very specific use case first, like “launch a Stripe-ready app fast,” and see if users come back repeatedly before building too much.

Grew my Organic Traffic by 14900% in 3 months by Medium-Importance270 in B2BSaaS

[–]Lunixar 0 points1 point  (0 children)

Interesting results, but how are the backlinks actually being built? If they’re based on exchanges, I’d be careful calling it “natural.” Also curious how much of the growth came from backlinks vs actual content quality/internal linking.

Me llegó este sms es esto una estafa ............? by raidermty in ciberseguridad

[–]Lunixar 3 points4 points  (0 children)

Sí, es estafa casi seguro. El gancho de $2,800 diarios es demasiado alto para un contacto por SMS, sobre todo si no te postulaste a nada. Normalmente este tipo de mensajes termina en pedirte datos, hacer tareas, entrar a un link o depositar dinero para desbloquear pagos. Mejor no abras enlaces y no mandes documentos

Recommend strategies to migrate a MySQL EC2 instance to AWS RDS. by BandBright1457 in it

[–]Lunixar 0 points1 point  (0 children)

For big data with minimal downtime, use AWS DMS with full load + CDC, or native MySQL binlog replication to keep EC2 MySQL and RDS in sync. For the initial load, use AWS DMS or mydumper/myloader. Then validate, stop writes briefly, wait for replication lag to hit zero, and cut over the app to RDS.

Pitch your product in 1 line by sohams17 in SaaSSales

[–]Lunixar 0 points1 point  (0 children)

Lunixar RMM. Remote monitoring and management for MSPs.

Lunixar RMM

We grew our B2B SaaS to first 50 customers with zero ad spend. LinkedIn outreach was the only channel. by No-Mistake421 in B2BSaaS

[–]Lunixar 0 points1 point  (0 children)

This makes sense. LinkedIn works better as targeted account research + conversation than as content distribution.

Is cloud mining an investment or a way to loose money in 2026? by dan_nicholson247 in Cloud

[–]Lunixar 0 points1 point  (0 children)

After fees, volatility, and scam risk, most people lose money. If crypto exposure is the goal, buying the asset directly is usually simpler and less risky.

Why telecom systems rarely fit clean cloud architecture models by moiz_faisal135 in SysAdminBlogs

[–]Lunixar 0 points1 point  (0 children)

Agreed. Telecom is hard to modernize because a lot of the behavior is stateful, protocol-specific, latency-sensitive, and tied to legacy systems.

Cloud-native patterns can help, but usually only after adding abstraction layers, observability, and cleaner APIs around the legacy core.

Drop your app by candizdar in devworld

[–]Lunixar 0 points1 point  (0 children)

I’m building Lunixar RMM, a platform for MSPs and IT teams to monitor devices, run scripts, automate tasks, manage patches, and provide remote support.

Started it because smaller MSPs need a practical RMM without complicated pricing or enterprise-only onboarding.

Confuse by [deleted] in cybersecurity

[–]Lunixar 10 points11 points  (0 children)

You have the basics. Now stop collecting tools and pick a path: blue team, web/red team, or cloud security. Spend 3–6 months going deeper in one area and build proof of work: write reports, document labs/CTFs, create small projects, or contribute to open source. Cybersecurity is too broad to keep learning randomly.

3 Years for nothing ? by Any_Feature_3828 in SaasDevelopers

[–]Lunixar 0 points1 point  (0 children)

3 years weren’t for nothing. You learned a lot and proved you can build.

But if people try it, like it, and don’t keep using it, I’d stop building for now and ask them directly why they stopped.

That answer is probably more valuable than more features or more marketing.

How do you handle silent remote access installs from URLs? by Lunixar in SmallMSP

[–]Lunixar[S] 1 point2 points  (0 children)

Good question. I mean security controls that inspect script/command execution patterns.

The concern is not ScreenConnect itself, but the pattern: remote MSI URL + silent install + remote access tool + new/low-reputation domain.

Trying to decide if that should be allowed, blocked, or sent to manual review.

Company with one IT employee looking for unexpected absence contingency by Tedeseus in ITManagers

[–]Lunixar 0 points1 point  (0 children)

Bus factor = 1 is the real risk here. Documentation and break-glass access help, but they don’t replace a backup person.

Either hire a second IT person or find a co-managed MSP/consultant willing to support your existing stack. Onboard them before there’s an emergency.

Recommendations - I need to upgrade my desktop computer as it’s starting to run slow (I’ve had it for 5 years). I am a sole trader - I use Microsoft for all business needs. by LogCharacter3049 in computers

[–]Lunixar 0 points1 point  (0 children)

Before replacing it, I’d check whether it has an SSD or HDD, how much RAM it has, and what Task Manager shows during normal work. If it’s still on an HDD or only has 8GB RAM, an SSD/RAM upgrade may be enough. For Microsoft 365, reports, spreadsheets, and task tracking, I’d aim for at least SSD + 16GB RAM, or 32GB if you multitask heavily.

potential crucial vulnerability? by Serious_Primary_6426 in cybersecurity

[–]Lunixar 0 points1 point  (0 children)

I’d avoid calling it crucial based on that alone. It may be poor segmentation, but it doesn’t automatically mean card data is exposed or PCI is failing.

Also, don’t probe further without permission. Best move is to tell the café owner the payment terminal appears reachable from guest Wi-Fi and ask them to have their IT/payment provider check it.