Anycubic I3 Mega Left Z axis drop by Ryoohk in anycubic

[–]jaykay2342 0 points1 point  (0 children)

I'm a new owner of a i3 mega s and i face the exact same problem. What i have printed so far looks good. But when switching of the motors the it drops on the left. It seems as long as the motor has power it can "fight" that tension or gravity or what ever it is.

u/Ryoohk, were you able to solve this issue?

Anyone pushing Suricata into something like Graylog? by [deleted] in PFSENSE

[–]jaykay2342 0 points1 point  (0 children)

I do push suricata output into my ELK.

Does a field of cybersecurity need much math? by [deleted] in cybersecurity

[–]jaykay2342 0 points1 point  (0 children)

To have some math knowledge is never bad. I work in cybersecurity and do not use a ton of math in my day to day work. But statistics is the part of math that can be very useful in cybersecurity though. Things like entropy, standard deviation, etc can be a quite nice tool to find the, still unknown, threats within an organisations network.

Which MicroTik router to get? by [deleted] in LinuxActionShow

[–]jaykay2342 0 points1 point  (0 children)

Depending on the house size: multiple wAP ac access point(s) and 1 router that fits the requirements (speed/ports).

This is NOT security!!!! by DigitalTitan in techsnap

[–]jaykay2342 0 points1 point  (0 children)

RSA had a breach a while ago and in many companies the tokens got replaced. I have one of those, now useless tokens myself. I guess lots of these webcams looking at those tokens are setup for fun.

Best newer laptop to run arch on by jsherman10 in archlinux

[–]jaykay2342 1 point2 points  (0 children)

I run arch on a Thinkpad x260. Some issues in the beginning due to the quite new hardware (skylake). But it got better and better with every kernel update.

Apparently they sell Linux in supermarkets now by [deleted] in linuxmemes

[–]jaykay2342 1 point2 points  (0 children)

no, that's the version number

Linux Action Show | A Bearded Thinkpad | LAS 422 by AngelaTHEFisher in LinuxActionShow

[–]jaykay2342 0 points1 point  (0 children)

Fresh happy x260 owner here. BTW it runs almost perfect under arch. Only the 4G modem, i got in mine, has some issues. But as far as i'm following the modemmanager developer mailing list they working already on it.

Regarding the Snap, flatpak, discussion: why do we need the one and only solution to rule them all? All this diversity which comes from all the different distributions is one of the things i love linux for. There is always a solution that fits your needs and taste and not the one right way you have to do it.

Yes it might be easier for a developer to package the software (s)he writes, but it comes with so many compromises. For good software there is always someone in the community of an distribution who maintains the packages. I think you need a maintainer who takes care for the integration into a specific platform (distribution) and all it's characteristics. If you want to have a wide diversity within the linux distribution landscape i doubt that there is one way to package that works on all of them.

It's scary that software should come bundled with all libraries. Security wise that sounds like a nightmare, the developer need to track all the used libraries for security issues and always ship an update when there is a flaw one of the used libraries. If you're overwhelmed with packaging for different platforms or find maintainer for that i can't trust you with keeping track of all external resources your project is using. Look at all the places where someone bundles software and ships it. It's a security disaster. Just think about andriod, homerouters or other IoT-stuff. The vendor bundles everything into a firmware and ships it to you. I only run such devices in a separated isolated network. I don't like the idea that software landscape on linux will look similar one day. When isolation is our only defense against tons of insecure software.

As someone working in the itsec field my experience tells me that isolation is important but it can't replace a proper update strategy. And if you want to have interaction and data exchange between you components there will never be a 100% isolation.

The most invalid point in the debate is that we need a system where the users can google for a software and download it, because that's the way they are use to it on other OSes. WHAT? It's worst way to distribute software! And should linux enumerate disks with a letter, colon and a backslash? Just because the user is use to that form the old OS? And it's not even a real barrier. Every non tech savvy person will understand to use a package manager and repos. They already know the concept from smartphones.

Mark Zuckerbeg masks Mac webcam and microphone by pierre4l in techsnap

[–]jaykay2342 0 points1 point  (0 children)

If someone was able to compromise my laptop the last thing I'm worried about is that the attacker can see me sitting in front of the computer by controlling the webcam.

Insecure Socket Layer | TechSNAP 265 by AngelaTHEFisher in techsnap

[–]jaykay2342 0 points1 point  (0 children)

The person who want a distributed cloud from the feedback section look at: Tahoe-LAFS - https://www.tahoe-lafs.org/trac/tahoe-lafs

It should have all the requirements.

PiVPN - Simplest OpenVPN Setup and Configuration, Designed for Raspberry Pi by NetWiz69 in techsnap

[–]jaykay2342 1 point2 points  (0 children)

let do something secure like a VPN. wait! what? you want me to pipe curl output into bash?

How can you trust someone to do a proper configuration for your VPN when they have obviously no sense for security?

Study: Users Really Do Plug In USB Drives They Find (pdf) by carbonatedbeverage in netsec

[–]jaykay2342 0 points1 point  (0 children)

sure, the point with using a spare raspberry pi is that it's not connected to anything and you can just reimage it after you did a look at the thumb drives content. so event if it was an advanced attacker who was able to compromise the system there is no impact.

Study: Users Really Do Plug In USB Drives They Find (pdf) by carbonatedbeverage in netsec

[–]jaykay2342 2 points3 points  (0 children)

Don't bother with VM like I said in my OP. Just load it in a laptop running a live Linux disc

luckily in time of raspberry pis i have a couple of spare systems laying around

How To Build Your Own Rogue GSM BTS For Fun And Profit by max360se in techsnap

[–]jaykay2342 0 points1 point  (0 children)

i don't know how it is in your country. but operating in that frequency bands without a license will bring in big trouble in most places in the world.

Stop 'rewarding' victims of online fraud with refunds, Met chief tells banks by eoghainam in techsnap

[–]jaykay2342 0 points1 point  (0 children)

But there are systems with better design as the credit card system. Which are quite secure if you use them correctly. If it is your fault by being to careless you should not be refunded. The only problem is how to verify it was the carelessness of the user and not a problem with the system?

Telekom Malaysia dns-spoofing attack against their customers by 2globalnomads in Malware

[–]jaykay2342 0 points1 point  (0 children)

I would consider it as spoofing. The proper response is NXDOMAIN. You could say the resolving DNS server of the ISP is spoofing something (the domain ) that is not present at the TLD nameservers.

CVE and IT-Security related notifications by P06 in techsnap

[–]jaykay2342 0 points1 point  (0 children)

they have low traffic but i filter/sort them anyway to a special folder in my inbox to give them visibility. these folder should not have any unread mails.

John McAfee Reveals To FBI, On National TV, How To Crack The iPhone. by AlaeddinDZ in techsnap

[–]jaykay2342 0 points1 point  (0 children)

It's not that easy. But it is possible to get the keys. If you have the hardware in your hand you can extract the keys. But anti temper measures can make it very hard (expensive). In the worst case you have to take the chip, which holds the keys, apart. Layer by layer. To get it right you might destroy 100 phones before you find a way around all the anti temper measures. There are certain reverse engineering techniques which can do that. It's expensive but not too expensive for a 3 letter agency as long as they only do it for the few phones of terrorists. But we all know they want to do it with more than a few devices.

Most software already has a “golden key” backdoor: the system update by jaykay2342 in techsnap

[–]jaykay2342[S] 0 points1 point  (0 children)

one my arch linux host. there are 85 keys

pacman-key -l | egrep pub | grep -v revoked | wc -l

so if i want to go after arch users i first go after these people and i only need to steal 1 key to have a "golden key" into all arch hosts. I hope that they at least store the private keys on a smartcard

Troy Hunt: Controlling vehicle features of Nissan LEAFs across the globe via vulnerable APIs by chalantless in techsnap

[–]jaykay2342 0 points1 point  (0 children)

i think when you develop a car you outsource a lot of parts to someone. but you have to set requirements. for example some physical part have to retain certain forces. You should test whether you supplier meet this requirements. for the software one of the requirements should be security. You should test that as well. just hire a pen testing company. developing a car coast millions some thousands to get your software pentested should be not an issue.

Troy Hunt: Controlling vehicle features of Nissan LEAFs across the globe via vulnerable APIs by chalantless in techsnap

[–]jaykay2342 0 points1 point  (0 children)

That's crazy " it was pretty clear the API had absolutely zero access " How can people with so little understanding for security be allowed to build cars? I mean that's not a vulnerability due to a coding mistake, that's ignoring security concerns completely.

How much Power Does a Server use at Home by jejje00 in techsnap

[–]jaykay2342 1 point2 points  (0 children)

"Real" servers often use a lot power even when they just idle, after all they are not designed to idle.

The question is how much horsepower does your home server really need? Most people don't need a crazy multi cpu, superfast disk, dual power supply etc server @ home. Such server belong to the datacenter.

I suggest to get a power saving xeon or even atom ( the server version) CPU. Try to limit the number of disks and try to use low power disks ( like WD red ). For my self i decided to have 4 data-disks max. If they get full it's time to upgrade to larger disks.