Jump to content

tuxflux

Member
  • Posts

    11
  • Joined

  • Last visited

Awards

This user doesn't have any awards

System

  • CPU
    AMD Ryzen 3700X
  • Motherboard
    Gigabyte Aeorus x570 Elite
  • RAM
    32 GB G.Skill 3600 MHz CL16
  • GPU
    Gigabyte RTX 2070 Super
  • Case
    NZXT 510
  • Storage
    Samsung 970 EVO M.2 Gen.3 512GB with Linux and 256GB for Windows 10 - 2 TB Barracuda Game storage
  • PSU
    Corsair RM750X
  • Cooling
    Corsair H110i
  • Keyboard
    Varmilo VA109M
  • Mouse
    Razer Basilisk v2
  • Sound
    Schiit Modi DAC and Magni 3+ Headphone Amp
  • Operating System
    Arch Linux /w BSPWM

tuxflux's Achievements

  1. Thanks for your reply. Building the enclose like trag1c suggested won't really be very expensive. I was mostly worried about heat output, but it will probably be OK. The thing is, for me it kind of fades in the background and for what I need, it's fine. It's my girlfriends super ears that pick it up mostly lol. We are probably moving to a new place next year where I'll be able to have the server and the UPS in a seperate room, so it's more of a temporary measure. From all that I've read, I doubt it's actually defective. Some coil whine is normal and perhaps I was a bit unlucky with my unit, but I don't think there's actually anything really wrong with it. Going to explore the enclosure option as a stop gap measure until we get a place with more space.
  2. Nice idea to think in terms of speaker design. Thanks for the swift reply!
  3. Not really sure which category this is suited to, but power supplies is the closest I can think of. If mod's think this should be moved, go right ahead. Anyway, here goes. I've got an APC Back-UPS CS 650 as a battery backup for my Unraid server. At idle the server draws about 100 Watts of power. However, no matter how much the draw is, I've got an insanely high pitched and annoying coil whine that's driving my girlfriend mental. So much so, she can't stay in the same room as my rig is placed. It also functions as my home office, and having the server in the same room isn't a problem since it in itself is pretty quiet. My hearing isn't as good as hers and I have to be a lot closer to hear it. After hours of searching, most people say that this is normal and there is no real way of getting rid of it and that it's not indicative of a faulty unit. It's only a few months old and can be considered as new. So, I want to hear any thoughts as to building a sound proofed enclosure for it. Few sheets of plywood to make a box with sound dampening material to block most of the noise. My only fear is obviously cooling. The unit doesn't really have much in the ventilation department, with only a few tiny slits on the top and bottom of the unit. As far as I can tell, it doesn't really seem to get very warm as it's sitting on the floor, but in a more or less closed enclosure I'd expect this to rise by quite a bit. So, I know it probably isn't a very good idea exposing heat generating components to this kind of trauma if you will, but I don't have the option of putting the server in another room and this is the only thing I can think of as a workaround. So, thoughts on the idea or any other suggestions would be much appreciated. Thanks!
  4. Nope, All the web facing content is through docker containers. Bitwarden database, nextcloud, Sonarr and Radarr for example, All these containers are up to date and have no direct connection the VM. Since it hasn't happened again, I'm pretty sure it's under control. I'll update the thread if it happens again. Thanks for your input anyways.
  5. This an NGINX logging feature, and the only thing I use it for is via the Let's Encrypt container. Do you mean that I should enable logging here and that this will provide the necessary logs for any potential intrusions to my WAN IP? Will it not only log specific requests to the ports open for the reverse proxy? I can give it a shot sometime during the week if you think this will provide the information needed, and I would appreciate a short explanation as to how this log provides evidence of the requests in question, I'd consider myself tech savvy, but I'm by no means a networking guru ^^
  6. Yes, keys only. There shouldn't be any problems there. My logs are plentiful now, and lots of inbound connections get dropped. However, some are accepted and after doing some quick research on the IPs in question, I'm not sure if it's bad or not. I'll attach the last 12 hours here and maybe some of you can give me some insight, syslog.txt
  7. Sure. I'm running Advanced Tomato (shibby) on my ASUS router, and logging of inbound connections was turned off by default. I've turned it on now so any activity should be showing up in the log. I'll post and update if something interesting turns up. I really wish there was a feature to block all incoming connections from specific geolocations. I know PfSense has features like this. Must be nice to basically block out all of eastern Europe.
  8. Ports that are open are as follows: 80 which redirects to internal port (not 80) on the server to directly access the nginx server for reverse proxy handling 443 which also redirects to another internal port for the same reason above OpenVPN port for external access to my server. Plex port for remote sessions Ports for my torrent client on the server I keep port 22 and 21 closed and do not access my server via SSH og FTP externally. I have a more secure setup via a docker container using a reverse proxy and VPN to get access from outside my LAN. There are no open ports to my laptops internal IP. Thanks for recommending x2go. It definitely seems like a better option than VNC. I agree that it seems strangely specific, and it hasn't happened since. I've made some modifications here and there and hopefully this won't happen again, but it was just so weird in the first place that I wanted to hear if anyone had any thoughts on it.
  9. So this is a weird one. I'm thinking that the likelyhood that I'm infected by something is small, but I figured I'd post this there because I've seen nothing like this before. I've been a pretty adamant tech user for 20 years and this just has me boggled. So I have an Unraid server and on that server I have a Linux VM with Pop OS installed (version 19.04), The laptop I'm using to access the VM's and the server is a Macbook Pro (2017). I VNC into the VM from my Mac using VNC Viewer from RealVNC, and when this happened I was just browsing the web while the VM was open on another desktop. When I go back to the VM, the linux terminal is opened and text is being automatically typed into the terminal without me doing anything at all. Here are screenshots of some of the commands it was trying to execute It's pretty clear it's trying to run some kind of Windows Powershell executable. Did a quick whois on the IP in some of the text, and it is based in the Ukraine with Protonmail e-mail addresses in the whois output. An obvious giveaway that something fishy is going on. There hasn't been a problem obviously since I don't have a Windows machine and clearly this isn't going to do anything in a Linux terminal. However, I am very curious to know where the hell this is coming from. Has someone hacked my VNC session? My security is pretty tight but nothing is foolproof obviously. Very few ports are exposed to the internet on my router, and 5900 (the VNC standard) is not one of them). 443 is open as I run several web based services through my own subdomains via reverse-proxy using NGINX and Let's Encrypt. I did a quick malware scan on my Mac using Malwarebytes, and no hits. It seems doubtful that it was being done live as I'm pretty sure the attacker would know they weren't in a Windows environment. I'm racking my brain trying to figure out where this is coming from, so any help would be greatly appreciated. So far it's been a one time occurrence. PS - This is a repost from Reddit on /r/techsupport, but not getting anywhere there so I figured I'd try this awesome community as well.
  10. Unbelievable. After trying to figure this out for hours, as soon as I post something about it, it seems to have sorted itself out. Not actually sure what I did to fix it either, but at least it's working. /facepalm
  11. So after upgrading my Vertex 2 SSD to a Samsung 850 Pro, I decided to do a clean reinstall of Windows. The previous drive had been upgraded from Win 7 and had a lot of old baggage, and I wanted a clean system to go with my new, fast SSD. The format and installation of my programs is now complete, but it took me a while to get access to my Unraid box and its shares. The solution in the end (after a lot of dicking around) was to add the username and password of my Microsoft account to the Windows credentials for the hostname and the IP of the server, on the computer I'm trying to access the Unraid box from. Took a while to figure THAT one out. So now I can access the shares if I type in \\192.168.1.101 (the IP of the box) or \\hostname. However, Windows 10 does not list the server under Network. Network discovery is turned on, and sometimes after a lot of refreshing and manual updating, it will show up, then disappear again. For instance, last night I was up quite late trying to figure it out. I get up this morning, and there it is showing up. I reboot and now it's gone. I know this isn't a big deal, since I can access the shares just fine by mapping the network manually, but it is#%&/!!! annoying. Using Windows 10 Pro with the latest updates. System specs in my signature. Ideas?
×