• 0 Posts
  • 60 Comments
Joined 8 months ago
cake
Cake day: November 2nd, 2024

help-circle






  • Whatever way you go for setting up the systems themselves, I’ve found dwservice.net to be perfect for accessing systems with only a browser.

    The host component is Mac, Windows and Linux compatible. The clients need only an account at DW. Hosts tied to your own account can be shared with others.

    Depending on host OS, you get screen, terminal and fire transfer access. Sessions are logged if you need to review who’s accessed what.

    Free. Donation optional.




  • It’s better to name known safe options rather than leave it up to user search. The entities that work against extensions like uBO are already well aware of their existence, so hiding their names has no benefit.

    Case in point - uBlock and uBlock Origin are not the same, with the former being a bastardised version that does ‘acceptable ads’. There are plenty of other poor blocking options out there for the unsuspecting to stumble into besides that.

    Personal setup is Librewolf/uBO on the client and pfBlockerNG/Snort for network level blocking/additional security layer.

    And welcome to .zip :) Hope you enjoy the new home!






  • Sometimes even that’s not enough. I’ve had some questionable kit before that would just ignore the DNS settings fed to it if it thought they were no good, and fall back to something else preconfigured.

    pfSense is a wonderful tool for situations like that. Anything intended for local use only here just doesn’t get outside at all. Handy for stuff like a fire stick that only needs to be calling up a local media library.

    It can also mangle any DNS requests going out to a different server and redirect them to itself instead. You could do this without it with iptables/nftables on a generic Linux box, but pfSense makes it much friendlier.

    There are other packages that can do the same, but physically all you need is one piece of hardware as a bouncer that manages connections between inside/outside.


  • On Dell server hardware with the right cards/licensing, you can remove the need for physical access to the server to input an FDE password by leaning on iDRAC. This provides access to the console remotely during the boot process (and thereafter).

    Alternatives exist that supposedly do the same thing, but I’ve never had to try them. Airconsole, pikvm, blikvm etc.

    You can keep this interface unexposed by using wireguard to dial in when you’re away, as per your original thinking. Just make sure the endpoint isn’t on the server you’re rebooting…