

“bashism” made my day


“bashism” made my day


Sweet!


Same here. Just wanted to share my findings.


Thanks for the heads up! For now, I only want to contribute with bandwidth and decentralization, so I won’t be using the network myself. :)


Well I’ll be damned. How have I not looked into I2P before. This seems like a whole new world to explore. Thanks!


Noice.



Sweet! I will check it out immediately! :)


Would it be possible for an average user like me to host the whole AUR and the whole Arch Wiki to make it available at times like this? I’m already seeding a couple of Arch isos (not pirate lingo).
I just want to help out.
I went as far as scanning my passport for these @ssholes and they still banned me 😂 to this day I have no clue why


Not with the front end iptables. Linux can filter packets based on their source and destination IP, port and MAC address. It can also filter packets based on their state, being NEW,ESTABLISHED, RELATES,INVALID and UNTRACKED. You can check what processes are establishing connections with for instance ss or lsof -i and what commands or binaries/executables stand for those processes with for instance ps.
I know of no userland utility with which one could specify processes, command names or binaries/executables to block. Which might seem like a hassle from a Windows perspective, but the level of control that you achieve with Linux’s packet filtering is neat and it has taught loads about how networking and the Internet works. :)


😂🤮 I didn’t even look at them. Just quickly searched and copy-pasted shit for OP. 🤣


Dang it… Thanks for enlightening me!


Thank you sir and I wish you a very Merry Christmas! :)


Thank you! I will check out OpenStitch.


Thanks! That looks like a great way to learn what’s going on “under the hood”.


I finally understand your point. That’s true though with or without the use of a firewall. Not becoming infected by malware through ports that are otherwise used for common connections can preemptively only be achieved with good cyber hygiene. Once infected, I guess I’d need access control lists and/or software that blocks code execution based on signatures, but I’m not aware of such software for Linux.


Thanks for the valuable input! :)
I always encrypt all my drives - external or internal - because at the very least, I have nothing to loose with today’s computing power. The overhead isn’t noticeable for me once the drives are decrypted, which takes two seconds with my Ryzen 5800 x3d.
Regarding what you said specifically about the peace of mind that it gives me if and when I were to sell the drives: YES. encryption can even be used as a method of securely wiping scrambling content.


The purpose is to block any connections that I haven’t explicitly allowed, since I don’t have the skills to vet all my binaries. Linux packages are as we know not immune.
It’s a pretty static system and I imagine I could write a script that notifies me if and when iptables blockes something outgoing (or when the kernel complains thereof).
That’s amazing! But why the “😭”? I grew up with two first languages and it didn’t feel like a burden. Please enlighten me! 😊