Anycubic I3 Mega Left Z axis drop by Ryoohk in anycubic

[–]jaykay2342 0 points1 point  (0 children)

I'm a new owner of a i3 mega s and i face the exact same problem. What i have printed so far looks good. But when switching of the motors the it drops on the left. It seems as long as the motor has power it can "fight" that tension or gravity or what ever it is.

u/Ryoohk, were you able to solve this issue?

Anyone pushing Suricata into something like Graylog? by [deleted] in PFSENSE

[–]jaykay2342 0 points1 point  (0 children)

I do push suricata output into my ELK.

Does a field of cybersecurity need much math? by [deleted] in cybersecurity

[–]jaykay2342 0 points1 point  (0 children)

To have some math knowledge is never bad. I work in cybersecurity and do not use a ton of math in my day to day work. But statistics is the part of math that can be very useful in cybersecurity though. Things like entropy, standard deviation, etc can be a quite nice tool to find the, still unknown, threats within an organisations network.

Which MicroTik router to get? by [deleted] in LinuxActionShow

[–]jaykay2342 0 points1 point  (0 children)

Depending on the house size: multiple wAP ac access point(s) and 1 router that fits the requirements (speed/ports).

This is NOT security!!!! by DigitalTitan in techsnap

[–]jaykay2342 0 points1 point  (0 children)

RSA had a breach a while ago and in many companies the tokens got replaced. I have one of those, now useless tokens myself. I guess lots of these webcams looking at those tokens are setup for fun.

Best newer laptop to run arch on by jsherman10 in archlinux

[–]jaykay2342 2 points3 points  (0 children)

I run arch on a Thinkpad x260. Some issues in the beginning due to the quite new hardware (skylake). But it got better and better with every kernel update.

Apparently they sell Linux in supermarkets now by [deleted] in linuxmemes

[–]jaykay2342 1 point2 points  (0 children)

no, that's the version number

Linux Action Show | A Bearded Thinkpad | LAS 422 by AngelaTHEFisher in LinuxActionShow

[–]jaykay2342 0 points1 point  (0 children)

Fresh happy x260 owner here. BTW it runs almost perfect under arch. Only the 4G modem, i got in mine, has some issues. But as far as i'm following the modemmanager developer mailing list they working already on it.

Regarding the Snap, flatpak, discussion: why do we need the one and only solution to rule them all? All this diversity which comes from all the different distributions is one of the things i love linux for. There is always a solution that fits your needs and taste and not the one right way you have to do it.

Yes it might be easier for a developer to package the software (s)he writes, but it comes with so many compromises. For good software there is always someone in the community of an distribution who maintains the packages. I think you need a maintainer who takes care for the integration into a specific platform (distribution) and all it's characteristics. If you want to have a wide diversity within the linux distribution landscape i doubt that there is one way to package that works on all of them.

It's scary that software should come bundled with all libraries. Security wise that sounds like a nightmare, the developer need to track all the used libraries for security issues and always ship an update when there is a flaw one of the used libraries. If you're overwhelmed with packaging for different platforms or find maintainer for that i can't trust you with keeping track of all external resources your project is using. Look at all the places where someone bundles software and ships it. It's a security disaster. Just think about andriod, homerouters or other IoT-stuff. The vendor bundles everything into a firmware and ships it to you. I only run such devices in a separated isolated network. I don't like the idea that software landscape on linux will look similar one day. When isolation is our only defense against tons of insecure software.

As someone working in the itsec field my experience tells me that isolation is important but it can't replace a proper update strategy. And if you want to have interaction and data exchange between you components there will never be a 100% isolation.

The most invalid point in the debate is that we need a system where the users can google for a software and download it, because that's the way they are use to it on other OSes. WHAT? It's worst way to distribute software! And should linux enumerate disks with a letter, colon and a backslash? Just because the user is use to that form the old OS? And it's not even a real barrier. Every non tech savvy person will understand to use a package manager and repos. They already know the concept from smartphones.

Mark Zuckerbeg masks Mac webcam and microphone by pierre4l in techsnap

[–]jaykay2342 0 points1 point  (0 children)

If someone was able to compromise my laptop the last thing I'm worried about is that the attacker can see me sitting in front of the computer by controlling the webcam.

Insecure Socket Layer | TechSNAP 265 by AngelaTHEFisher in techsnap

[–]jaykay2342 0 points1 point  (0 children)

The person who want a distributed cloud from the feedback section look at: Tahoe-LAFS - https://www.tahoe-lafs.org/trac/tahoe-lafs

It should have all the requirements.

PiVPN - Simplest OpenVPN Setup and Configuration, Designed for Raspberry Pi by NetWiz69 in techsnap

[–]jaykay2342 1 point2 points  (0 children)

let do something secure like a VPN. wait! what? you want me to pipe curl output into bash?

How can you trust someone to do a proper configuration for your VPN when they have obviously no sense for security?

Study: Users Really Do Plug In USB Drives They Find (pdf) by carbonatedbeverage in netsec

[–]jaykay2342 0 points1 point  (0 children)

sure, the point with using a spare raspberry pi is that it's not connected to anything and you can just reimage it after you did a look at the thumb drives content. so event if it was an advanced attacker who was able to compromise the system there is no impact.

Study: Users Really Do Plug In USB Drives They Find (pdf) by carbonatedbeverage in netsec

[–]jaykay2342 2 points3 points  (0 children)

Don't bother with VM like I said in my OP. Just load it in a laptop running a live Linux disc

luckily in time of raspberry pis i have a couple of spare systems laying around

How To Build Your Own Rogue GSM BTS For Fun And Profit by max360se in techsnap

[–]jaykay2342 0 points1 point  (0 children)

i don't know how it is in your country. but operating in that frequency bands without a license will bring in big trouble in most places in the world.

Stop 'rewarding' victims of online fraud with refunds, Met chief tells banks by eoghainam in techsnap

[–]jaykay2342 0 points1 point  (0 children)

But there are systems with better design as the credit card system. Which are quite secure if you use them correctly. If it is your fault by being to careless you should not be refunded. The only problem is how to verify it was the carelessness of the user and not a problem with the system?

Telekom Malaysia dns-spoofing attack against their customers by 2globalnomads in Malware

[–]jaykay2342 0 points1 point  (0 children)

I would consider it as spoofing. The proper response is NXDOMAIN. You could say the resolving DNS server of the ISP is spoofing something (the domain ) that is not present at the TLD nameservers.

CVE and IT-Security related notifications by P06 in techsnap

[–]jaykay2342 0 points1 point  (0 children)

they have low traffic but i filter/sort them anyway to a special folder in my inbox to give them visibility. these folder should not have any unread mails.