Gee are you implying that storing passwords in plaintext is a bad thing? /s
A person with way too many hobbies, but I still continue to learn new things.
Gee are you implying that storing passwords in plaintext is a bad thing? /s
Who said anything about it being standard? I said I know this CAN happen, and I said it was quite some time ago. We can only hope this insanity isn’t still in practice anywhere, but I learned long ago that expecting a corporation to NOT do foolish things will give me the same disappointing results as expecting money to come out of my ass. If there’s a manager involved, then something on the tech side is going to get fucked up in the name of saving a buck. Therefore I cannot just assume OP gets a normal NAT address, nor can I assume they have any other firewall type device between them and the internet. With limited data, the best I can do is try and provide some general information, hopefully encourage them to ask more questions or provide more specific information, and just hope they don’t have a ridiculously stupid ISP that makes things needlessly complicated.
Most of my experience is with iptables, but yeah, I think until you start adding rules nothing is implicitly denied? Once you enable a couple of initial rules then you should have good blocking from the outside while allowing internal traffic to connect freely. It doesn’t get in your way until you start using it, but then it doesn’t take much to get it going.
You’re right, it doesn’t make any sense. And it didn’t make any sense at the time either. After setting up the router with a laptop, I moved the connection to the firewall but it refused to connect. When I finally got ahold of tech support they said the connection locks into the first machine that logs in and they had to release it so I could connect the new machine. And just like that the firewall was given a routable IP address and connected to the internet. Stupidest thing I ever heard of, but that’s how they were set up. Now this was around 15+ years ago and I would certainly hope nobody is doing that crap today, but apparently that was their brilliant method of limiting how many devices could get online at once.
What are you talking about? You’re assuming that every residential router is going to have some kind of firewall enabled by default (they don’t). Sure, if OP has a router that provides a basic firewall type service then it will likely block all incoming unauthorized traffic. However OP is specifically talking about a linux-based firewall and hasn’t specified if they have a router-based firewall service in place as well so we can only provide info on the firewall they specified. And if you look at UFW, the default configuration is to allow outgoing traffic and block all but a very few defined incoming ports.
You’re also making the assumption that OP is using NAT, when that is not always the case for all ISPs. Some are really annoying with their setup in that they give a routable IP to the first computer that connects and don’t allow any other connections (I had that setup once with Comcast). In this case, you wouldn’t even need to define port-forwarding to get directly to OP’s computer – and any services they might be running. This particular scenario is especially dangerous for home computers and I really hope no legitimate ISP is still following a practice like this, however I don’t take anything for granted.
Regardless of what other equipment OP has, UFW is going to provide FAR better defaults and configurability when compared to a residential router that is simply set up to create the fewest support calls to their ISP.
Possibly? The way I read it, it sounded like OP wasn’t really even sure what a firewall does.
Sure it CAN be configured, but the typical policy of firewalls is to start from a position of blocking everything. From what I’ve seen, on Linux the standard starting point is blocking all incoming and allowing all outgoing. On Windows the default seems to be blocking everything in both directions. Sure you could start with a policy of allowing everything and block only selected ports, but what good is that when you can’t predict what ports an attacker might come from?
You’ve got it backwards. A firewall blocks everything, then you open up the ports you want to use. A standard config would allow everything going out, and block everything coming in (unless you initiated that connection, then it is allowed).
So the question you should be asking, is what services do you think you’re going to be running on your desktop that you plan to allow anyone on the internet to get to?
I’ve also read about the John Deere issue as a leading instigator of right-to-repair laws. They weren’t able to provide authorized local repair techs when a tractor breaks down, so farmers were stuck waiting 1-2 weeks for someone to show up while crops were rotting in the fields (think of how fast your fresh fruit rots in your kitchen and then imagine dozens of fields of that crop going to waste). And the biggest insult was when the repair tech drove into town for a $5 part that the farmer had already identified but couldn’t replace because of manufacturer lockouts.
From my own experience it was more about being a solution in search of a problem. I see some comments about how the old init system was so horribly broken, and yet the reality was it worked perfectly fine for all but some very niche situations. The only advantage I have ever seen with systemd is that it’s very good at multitasking the startup/shutdown processes, but that certainly wasn’t the case when it first arrived. For example I had a raspberry pi that booted in 15 seconds, and when I loaded a new image with systemd it took close to two minutes to boot. And there were quite a lot of problems like that, which is why people were so aggravated when distro admins asked the community for their thoughts on switching to systemd and then changed the distros anyway. This also touches on the perception that the “community” accepted it and moved on – no, systemd was pushed on the community despite numerous problems and critical feedback.
But we’re here now, systemd has improved, and we can only hope that some day all the broken bits get fixed. Personally I’m still annoyed that it took me almost a week to get static IPs set up on all the NICs for a new firewall because despite the whole “predictable names” thing they still kept moving around depending on if I did a soft or hard reset. Configuring the cards under udev took less than a minute and worked consistently but someone decided it was time to break that I guess.
What’s your fear of editing config files? They’re just text files, and manual edits certainly allow a degree of customization that you’ll never find in a GUI interface. My own config is set up with domain name folders under /home/ to contain the many domains I run, that’s something I’ve never seen handled by a GUI and yet it makes so much more sense for keeping files organized.
sudo apt install apache2
Did you really need a GUI for that? The web folders are under /var/www/ and you can browse to it from another computer by typing the IP into the address bar. As long as you’re not using Chrome you might even be able to type the computer name into the address bar.
So Sony wants to punish ISPs for continuing to “allow” illegal things to happen? Hmm remind me again which company it is that has had so many data breaches that users have come to just expect it? Sounds to me like if they are allowed to pursue attacking internet providers then they themselves should start seeing lawsuits for continuing damages until such time as Sony is able to successfully recover all stolen personal data and other parties can no longer use it for profit.
If you’re curious enough to get one, I’ve seen them on ebay as well. Might even be available on Amazon. I think they’ve been around for a couple years, I just got mine in April but still haven’t had time to fire it up and play with it.
Hmm I’m seeing a sale price right now, might be based off my order history though. I found another that has a standard price of $10.39, but all the ones I looked at are now also including a shipping cost around $4.50 so that jacks the price up even more.
All these taxes and tarrifs and what-not are really hurting people’s ability to get access to affordable items. I was looking at some solar panels right before the US added a tarrif to those items, so now I’ll wait to see what happens.
The board costs about $10, I have one on hand. Besides VGA and PS/2 ports, it also has an audio-out jack and a slot for SD cards. And if you want to compare specs, the ESP32 blows this away. Sure $1 sounds impressive, until you realize just how little you can do with it.
[Edit] Looks like the price has come down under $10 for this board now, here’s a link to get them from China.
So basically something like this only a whole lot LESS capable? Although if you specifically want to do RiscV coding then it does limit your options.
Hard to say for sure. They may have legitimately found something, but my experience with McAfee products has been abysmal. The last time I dealt with it, someone had the full paid version of their virus scanner which was up to date but wasn’t finding anything. I ran the free version of AVG and found over 200 items (mostly trojans and other malware). Their research may be valid, but I certainly wouldn’t trust any of their software to find even widely-known issues.
security firm McAfee
Now there’s an oxymoron. Let me know when they can write a virus scanner that works.
How much privacy do you have when someone has your account password?