Jump to content
Search In
  • More options...
Find results that contain...
Find results in...

Catsrules

Member
  • Content Count

    959
  • Joined

  • Last visited

Reputation Activity

  1. Informative
    Catsrules reacted to Falcon1986 in Network Security   
    Well, you already have a UDM-Pro, which has a built-in intrusion detection and prevention system through the UniFi Controller. It’s not the most comprehensive of IDS/IPS, but it’s something that can be activated with what you have.
     
    I’ve heard about Suricata under pfSense, which you can also check out. Of course, you’ll need hardware to run pfSense in the first place for this to happen though.
     
    What kind of network is this? Doesn’t sound like a home environment. Keep in mind that malicious activity can be initiated by compromised software that is intentionally/unintentionally downloaded. Also, are you sure there isn’t any legitamate use of remote PC control software when you observe these strange activities? And why is your network such an attractive target?
  2. Agree
    Catsrules reacted to Electronics Wizardy in Network Security   
    What ports did you open? normally you have to manually open ports on a firewall, otherwise they can't be access.
     
    A lot of those are false positivies, you really have to look at the alert to know if its a threat.
  3. Like
    Catsrules got a reaction from Electronics Wizardy in Network Security   
    If a devices can detect the attack like an IPS system then it can just block the attack. There isn't a need to disconnect your computer as the attack got blocked.   I don't see a real advantage of auto disconnecting your computer over the attack that got blocked. If I did that my computer would be disconnecting all of the time. There are a bunch of bots and crap hitting servers and networks all of the time. 
     
    If the attack didn't get blocked then it obviously wasn't detected so how exactly is your computer going to know it is being attacked.
     
     
     
     
     
  4. Informative
    Catsrules got a reaction from Uknown0002 in Network Security   
    If a devices can detect the attack like an IPS system then it can just block the attack. There isn't a need to disconnect your computer as the attack got blocked.   I don't see a real advantage of auto disconnecting your computer over the attack that got blocked. If I did that my computer would be disconnecting all of the time. There are a bunch of bots and crap hitting servers and networks all of the time. 
     
    If the attack didn't get blocked then it obviously wasn't detected so how exactly is your computer going to know it is being attacked.
     
     
     
     
     
  5. Informative
    Catsrules got a reaction from ledizz in How can I attach my logitech g920 to my desk   
    This is probably a bit over engineering in the crappy direction 🙂 . But if you have an shelf or board and two C claps, You could C clamp the the shelf to the front of your desk (C Clamp on both sides) give it a little overhang to make the shelf the edge of your desk so you can attach the racing wheel to the overhanging part of the shelf.
  6. Agree
    Catsrules reacted to Electronics Wizardy in I have a mining question - is a virtual machine or dual boot the safest way to mine?   
    there is no gpu passthrough in windows 10.
     
    Id argue the same os is fine for basic mining, but really depends on your threat model.
     
     
    This really isnt a big security risk.
     
    What chipset is it using? Run lsusb, and google wifi chipset name
     
     
  7. Like
    Catsrules got a reaction from Electronics Wizardy in Raid Configuration for a Storage Server with user profiles   
    I agree with @leadeaterAt your scale you need to separate your infrastructure out to be more redundant A setup they are suggesting is very redundant. 
    Backend storage will have redundant controllers,data connections, power supplies and drives. You then have two or more compute nodes. aka standard server running VMware ESXI. If one compute node dies you can just migrate the VMs over to the other one and get the downed server fixed.
     
    I also agree with @Electronics Wizardythis kind of sounds like your in over your head. Your looking at tens of thousands for this type of setup that you do need. Best to just hire a contractor to come in set everything up. This goes way beyond RAID levels. 
  8. Informative
    Catsrules got a reaction from patken007 in Temperature question   
    Bigger CPU cooler
    Run the fans faster (this makes then louder).
    Add more fans. 
  9. Agree
    Catsrules got a reaction from leadeater in Raid Configuration for a Storage Server with user profiles   
    I agree with @leadeaterAt your scale you need to separate your infrastructure out to be more redundant A setup they are suggesting is very redundant. 
    Backend storage will have redundant controllers,data connections, power supplies and drives. You then have two or more compute nodes. aka standard server running VMware ESXI. If one compute node dies you can just migrate the VMs over to the other one and get the downed server fixed.
     
    I also agree with @Electronics Wizardythis kind of sounds like your in over your head. Your looking at tens of thousands for this type of setup that you do need. Best to just hire a contractor to come in set everything up. This goes way beyond RAID levels. 
  10. Funny
    Catsrules reacted to DominicNikon in I don't have any money   
    I would recommend making money?
  11. Agree
    Catsrules reacted to Electronics Wizardy in Raid Configuration for a Storage Server with user profiles   
    Do you have other IT members to work with? THis feels like a ask you coworker or hire someone, not ask a forum type of issue. Also you probably don't want a single system doing this in case of failure, whats your backup system/ha plan?
     
    What raid card?
     
    How much storage space do you need? 
     
    Probably go raid 6 or 10, depends on the space and speed needed.
  12. Agree
    Catsrules reacted to leadeater in Raid Configuration for a Storage Server with user profiles   
    For file storage the most common and appropriate RAID is RAID 6. However more information would help a lot, like what is the actual hardware and number of disks etc.
     
    Personally I would recommend against just going with a storage server, meaning a general server used as a file server. You would be better off either getting a small scale Netapp FAS or going with some like a Netapp E-Series/Lenovo V3700 along with some ESXi VM host servers with VMware Essential Plus license and creating a File Server VM and other VMs for other role/functions etc.
     
    My last job I worked at was for an IT provider that worked exclusively in the education market. Our standardized setup at the time was the IBM/Lenovo V3700 dual SAS controller and at least two x3650 M4 (4 mean 4th generation so current models much newer/high number) with the mentioned VMware vSphere Essentials Plus license.
     
    P.S.I removed your email address, not a good idea to publish that.
  13. Agree
    Catsrules reacted to LyondellBasell in 43' 4K TV vs 32' 4K Monitor?   
    Whatever you choose, don't base any decision you make on "input lag" or "response time".
     
    You will not be able to tell with your usage case. We're not talking high-tier, competitive FPS here.
    There's no camera movement, there's no crosshair, and nothing you do is split-second.
     
    The things that will matter to YOU are pixel density, screen size, and display mounting options, since it sounds like you have limited space and may want the change how everything's lined up at some point. You should buy solely based on these things.
  14. Like
    Catsrules got a reaction from Filingo in Low profile card for an old computer with Intel Core 2 Quad Q9400   
    Search the use market, I wouldn't look for anything specific just sort based on price and see what is available, you might even look for entire computers that happen to have a GPU that old your could probable get something for free or $25-50.
  15. Agree
    Catsrules reacted to boggy77 in Storage for games?   
    i'd go for a cheap sata ssd.
  16. Agree
    Catsrules got a reaction from nac1807 in 8GB of RAM but only 6.95GB is usable?   
    Look under Peripherals\GFX Configuration in the bios try setting Integrated Graphics to disabled.

    if that doesn't work set it to Forced and manually change the UMA Frame Buffer Size to the lowers it will go.
  17. Like
    Catsrules got a reaction from jeanluckpiccard in Built a PC for my son need help blocking him!   
    Along with the non admin user I would recommend you install Privacy Badger and uBlock Origins as browser plugins that should take care of the major popups and ads he might run into.
  18. Agree
    Catsrules reacted to jeanluckpiccard in Built a PC for my son need help blocking him!   
    This would involve creating a Windows account for him but wouldn't allow him to install anything without the administrators (your) password. You can also set time limits, website restrictions, etc for him, as well as keep track of where he goes online.     Open Control Panel. ... Select User Accounts And Family Safety, then choose Set Up Parental Controls For Any User. Select the child's account. Under Parental Controls, choose Enforce Current Settings. Under Activity Reporting, choose Collect Information About PC Usage.  
    Here's a pretty good article I found:
     
    https://www.lifewire.com/microsoft-family-safety-parental-controls-4153037
     
  19. Informative
    Catsrules reacted to LAwLz in Why cell phones don't get generic OS installers?   
    There are several reasons.
     
    1) Unstable ABI and lack of code portability
    This one partially has to do with why you can't boot a generic image but it has more to do with why it takes so long to get updates.
    You might have heard of "stable ABI" before. GNU/Linux do not have a stable ABI. What this means is that the way drivers integrate into the kernel can (and usually does) change from version to version. So if you write a driver for one version of Android, it might not work on the next version, and has to be partially rewritten. 
     
    Project Treble fixed this to some degree by offering a stable ABI (which is to say, Google limited themselves with what changes they can make to the driver interfaces to ensure that one driver can work on multiple versions). Windows has a very stable ABI. That's why you can still sometimes install XP drivers on Windows 10. Here is an explanation on why GNU/Linux does not have a stable ABI.
     
     
    2) Device Tree and hardware specific code
    This has to do with how ARM works. ARM devices are typically not designed to be able to detect which hardware is present on the device when they boot. You therefore have to code exactly which hardware is present and pass that info to the kernel with a "device tree". 
     
    It is possible to design a device to look for hardware automatically at boot, if it's compliant with what's called ARM "Server Base Boot Requirements". Here is a great article about how it is being implemented in the Raspberry Pi.
    Here is a page from ARM about it, and it goes over some of the things that needs to be done. As you can probably see, it requires collaboration from OS vendors, hardware vendors and OEMs, which is one of the reasons why it might be pretty hard to get working on phones.
    Why does those articles mention "servers"? Because getting consumer electronics vendors like Qualcomm and Samsung to work with each other, to make their devices last longer so fewer devices are sold, is not exactly an easy task. It matters a lot for server vendors trying to sell to enterprise customers. So ARM has basically went "okay, we'll just focus on servers then". There is nothing technical preventing server base boot from working on phones though, if everyone worked together. Your device would still need some specific drivers though to function 100%. That brings me to...
     
     
    3) Drivers
    How do you install drivers on a phone? Usually, the drivers are baked into the Linux kernel on Android phones, so they are updated only when the OS is updated. Google has solved this limitation however by creating and implementing a way for drivers to be updated through the Play Store!
    Here is an article about how it's now supported by some Snapdragons and some Mali GPUs. So this issue is slowly being solved, but I am not sure if drivers other than GPU drivers can be updated yet.
     
     
    A side note about updates.
    A new project called "project mainline" will help Android phones get updates quicker. What Google is doing is decoupling a lot of system modules from the OS itself and making them upgradable through the Play Store.
    When it was first announced (Android 10) it was 12 different modules such as permission controller and media framework, and with Android 11 they are extending it to 20 modules.
    These modules are delivered and updated with a new file format called APEX.
    The reason why I bring this up is because APEX could be used for more than just updating some Google mandated core components. Google might be planning on making a generic Android OS, and then have vendors install their specific code through APEX modules.
     
     
     
     
     
    Then there are a ton of other reasons why booting a generic OS image on a phone isn't possible today. Google is working on solving a lot of that but it takes time.
    Please note that the article I just linked about AOSP being able to boot from mainline Linux 5.9 with just one patch has this rather big caveat:
    That means that it only works on devices where the device makers have submitted drivers to the Linux kernel team and have them merged into the master branch. That's not an easy feat and I doubt many devices supports it. But with APEX modules that might not be a problem in the future!
  20. Funny
    Catsrules got a reaction from NZKshatriya in Why cell phones don't get generic OS installers?   
    How many people install OS on their computers?  Normally people buy their computer from the Dell, HP, and Lenovo. Yet none of them really provided OS updates. It is all handled by Microsoft.  It doesn't matter if Dell doesn't support my laptop anymore because Microsoft fully supported windows 7 and then was nice enough to provide a free upgrade to Windows 10.
     
    I am just wondering why we don't have this same type of partnership with Google and Phone OEMs.
     
    Edit I should mention I do think Google pushes out some security updates via the play store. But it is nothing like was Microsoft has with Windows. 
  21. Agree
    Catsrules reacted to Energycore in [closed] We're looking for volunteers to help build and maintain the forum   
    The forum does not give LMG any profit at all.
     
    The small number of ads barely cover the server costs. If you don't feel like giving back, you don't have to
  22. Like
    Catsrules got a reaction from Kanna in Looking for a Second Monitor   
    It is on the Notify me of replies slider button of the form. Ovioulsy we can't see the dead pixel from the screen shot but that gives us an and idea where it is on the screen.
  23. Informative
    Catsrules reacted to Gamesmusic454 in Share windows tabs between PC's over internet   
    Ok, so i found the solution to my problem without spending a single dollar, you can use "spacedesk" and it will work just fine, a bit laggy over wifi but totally usefull, your pc detects a "physic display" that you can configure, thanks to all the posters and readers  
  24. Like
    Catsrules got a reaction from Sureshadow in Apple accidentally Approved a piece of Malware to Run on MacOS   
    Looks like as long as your software can pass a virus check your good to go.
  25. Agree
    Catsrules reacted to Eigenvektor in Random question   
    Right. I was mainly thinking about a modified OS where the malicious part is built right into the kernel itself. The only way to disinfect would essentially be a re-installation, since the OS itself is the malware. So it wouldn't really be possible to "disinfect" it. And it would be fairly hard to detect, since the OS could lie about anything it is doing.
     
    For example you could make it so the OS simply sends everything stored on its hard drive somewhere else for analysis. As you said, this is probably not something you'd do to random users and more of a targeted attack, e.g. espionage.
     
    If this isn't caught before installation (e.g. incorrect signature of installer files), the best bet for detection would be suspicious network traffic caused by such a machine.
×