[-] persiusone@alien.top 1 points 11 months ago

This is why it's important to have other security monitoring resources on your network if you intend to open ports or expose your services to the Internet. Also a good time to change all your passwords if you have not already.

[-] persiusone@alien.top 1 points 11 months ago

Interesting. I've been in IT for over 30 years and have always used UPS systems. Never had data loss as a result of power issues. Also, it cleans the power a bit and I get a lot of life from my hardware. Plus, I dont have to worry at all, it works as intended. My entire lab has redundant UPS systems backed by a large generator ... Zero downtime is nice.

[-] persiusone@alien.top 1 points 1 year ago

My UPS systems have built in monitoring.

[-] persiusone@alien.top 1 points 1 year ago

Yes, this seems to happen more frequent with brands like realtek. All hardware has failure rates, generally speaking more expensive and enterprise gear fails with less frequency, but can still fail. Personally, I don't enjoy hardware failure, so I invest in stable clean power and great hardware. It may cost more in the overall power budget but is less headache because things just don't fail as often.

[-] persiusone@alien.top 1 points 1 year ago

I sit around 5kw average.. Depending what the GPUs are doing

[-] persiusone@alien.top 1 points 1 year ago

I'd use a VPN and give your friends the credentials for access to your server(s)

[-] persiusone@alien.top 1 points 1 year ago

Mine are running all of the time, including during power outages, and are only shut down for physical maintenance and reboot for software maintenance.

This is a little variable through. Windows hosts tend to require more frequent software reboots in my experience. About once a year, I physically open each device and inspect, clean dust (fairly rare to find it for my setup though), and perform upgrades, replace old storage devices and such. Otherwise I leave them alone.

I usually get about 5-7 years out of the servers and 10 out of networking hardware, but sometimes a total failure occurs unexpectedly still and I just deal with it as needed.

[-] persiusone@alien.top 1 points 1 year ago

Before this post gets blasted with "just use a VPN" Yes I already have wireguard up and running but trying to get family members setup with a vpn that are technology illiterate is a nightmare

I mean, the reasons to do this cannot be understated. A VPN literally accomplishes the security and exposure issues.

It's your network through. You can feel free to expose your ports and services to the entire internet and take the risk of zero day attacks, brute force, and credential leaks. Knowing that your family is illiterate, it sounds like they may not use best cyber security practices with your services...

So, that leaves it on you. You can either support it on the front end with a proper VPN like Wireguard, or support it on the back end with IDS, honeypots, advanced threat management, constant monitoring, mitigation, patch management, backup and restores, isolation, etc.

There are not shortcuts to proper security and exposure management. You can also pay someone, or a company to do this for you.

[-] persiusone@alien.top 1 points 1 year ago

No rack mount options? Not for my lab...

[-] persiusone@alien.top 3 points 1 year ago

I built a payment processor many years ago for a large bank.

Spoiler alert: you won't be self hosting something like this. The regulatory and compliance aspect alone will financially destroy you. You'd have audits, auditors in your home, and they will fail you. You won't be able to be in compliance and thus you won't be allowed to process financial transactions.

You will need an intermediary, like stripe or square or similar, to accept payment. Shop around for a solution or start investing into a large education on SEC, FDIC, and PCI regulations before you even get into the technical and physical challenges of financial transaction processing. I am guessing there are quite a few additional regulations now.

Good luck

[-] persiusone@alien.top 1 points 1 year ago

Best practice example would be a Kali VM on a testing vlan for playing all the Kali specific stuff.

[-] persiusone@alien.top 1 points 1 year ago

First red flag your company is a joke: you have a local admin account.

Seriously, do not circumvent your corporate security. You have literally zero defense to these actions and can be terminated immediately. Not if, but when it happens, you will also likely be blamed for any issues which arise even if they are not directly your fault. If you did have permission somehow to do this, I am not sure why you are asking for help on how to do this. If your company does allow this, it's even more of a joke than allowing a local admin account and that raises other questions.

I allow my folks to BYOD on a (mostly) unrestricted BYOD/Guest network. Nobody has local admin accounts for any devices on the corp side. People can bring their personal laptops in and browse whatever and use VPNs on this network if they choose. There are some obvious restrictions (nothing illegal, for example), but if folks want to VPN to their self hosted environments or play on tiktok with their stuff, it's better for liability, better for security/compliance, and most importantly .. It is completely isolated from any corporate stuff. There is no need for circumventing when better options are available, promoting best practices for all employees.

view more: next ›

persiusone

joined 1 year ago