What’s the odds that these things don’t become regular theft targets, even of the drones themselves? Porch pirates are enough of a thing now, can’t see any of them feeling bad about robbing a robot.
Some dingbat that occasionally builds neat stuff without breaking others. The person running this public-but-not-promoted instance because reasons.
What’s the odds that these things don’t become regular theft targets, even of the drones themselves? Porch pirates are enough of a thing now, can’t see any of them feeling bad about robbing a robot.
Huh, odd that they don’t advertise it more then. Probably make the notion of selling it get less of a rep of desperate people needing money and more similar to donating blood as an altruistic thing, so you get more involved.
Wonder if they could save some time and not put the rest back, just give it to a zoo to feed vampire bats or something… 🤔
I’ve only donated a few times but from what I recall you can donate blood or sell plasma. Always struck me as weird but the difference is that they use the whole blood medically while the plasma only is used for research or commercial purposes. We do love to make a market for near everything possible here.
As for how much, not sure exactly since I haven’t done so myself but I get the impression it’s not huge, maybe $20-$50 each time.
And with a major portion of US military aid grants coming with the condition that the purchased equipment come from US contractors you can argue which funding bucket it came from, but in all practicality Israel bought US systems with aid money granted from the US and then where willing to give the old systems they intended to decommission to someone the US is aiming to support.
It really is just US aid to Ukraine with an Israeli sticker on it in that sense.
Israel wants to get some gold star for agreeing to send systems the US provided to Ukraine now? What kind of PR lunacy is going on here.
Depends on the place. If someone is in a public facing role I’d expect it to be a bit more comprehensive.
They’re a part of the mix. Firewalls, Proxies, WAF (often built into a proxy), IPS, AV, and whatever intelligence systems one may like work together to do their tasks. Visibility of traffic is important as well as the management burden being low enough. I used to have to manually log into several boxes on a regular basis to update software, certs, and configs, now a majority of that is automated and I just get an email to schedule a restart if needed.
A reverse proxy can be a lot more than just host based routing though. Take something like a Bluecoat or F5 and look at the options on it. Now you might say it’s not a proxy then because it does X/Y/Z but at the heart of things creating that bridged intercept for the traffic is still the core functionality.
It depends on what your level of confidence and paranoia is. Things on the Internet get scanned constantly, I actually get routine reports from one of them that I noticed in the logs and hit them up via an associated website. Just take it as an expected that someone out there is going to try and see if admin/password gets into some login screen if it’s facing the web.
For the most part, so long as you keep things updated and use reputable and maintained software for your system the larger risk is going to come from someone clicking a link in the wrong email than from someone haxxoring in from the public internet.
I have a dozen services running on a myriad of ports. My reverse proxy setup allows me to map hostnames to those services and expose only 80/443 to the web, plus the fact that an entity needs to know a hostname now instead of just an exposed port. IPS signatures can help identify abstract hostname scans and the proxy can be configured to permit only designated sources. Reverse proxies also commonly get used to allow for SSL offloading to permit clear text observation of traffic between the proxy and the backing host. Plenty of other use cases for them out there too, don’t think of it as some one trick off/on access gateway tool
Disney used to do that a lot, ‘get it now before it goes back into the vault’ in some effort to make it special/get-it-while-you-can.
Having everything available all the time would leave them with little to put on a pedestal as a coming soon limited time thing. Just one person’s theory though.
Should not, wonder if there’s any adguard/pihole lists to smack OneDrive/box/Dropbox/etc domains and just take these services out before they can start.
A deadline set by a government agency for government workers, NOT a ‘Google Pixel Deadline’. Stop writing alarmist headlines to make it sound like Google is gonna shut off your phone if you don’t comply. You should update, but knock this writing style off people.
Plugging a modem into the POTS made them smart I say.
Zabbix or Cacti are nice ways to draw maps that also serve a functional role in keeping track of the activity and alerting.
Looks like was just updated today pending transfer, so either the owner transferring registrars or someone took it over.
https://www.whois.com/whois/funkwhale.audio
Domain expired on the 19th, so it’s validly offline. Has always seemed to be a low-adoptiom platform, will have to see the status in the next few days.
Stop using southern Indians as your drinking vessel and that wouldn’t be a problem. Daft auto written headlines…
I’m fairly sure if they took porn off the internet, there’d only be one website left, and it’d be called “Bring Back the Porn!”
Never used don’t care really but:
Their terminology needs some work, force touching is not ok…