PaulEngineer-89

joined 1 year ago
[–] PaulEngineer-89@alien.top 1 points 1 year ago

Trouble is many IT departments blindly purchase install whatever crap a security company recommends, without following step 2 (white listing).

I’ve been blocked by these stupid filters from Amazon while in engineering having to order parts to get the equipment running because it was flagged as “Japanese porn” on the guest (contractor) network. And yes I resorted to a proxy/socks tunnel to my VPS.

[–] PaulEngineer-89@alien.top 1 points 1 year ago (1 children)

The thing about containers is they usually have no NÉED in general for pure ope file system access. No need for full network access (host, LAN, WAN). So the smaller the privileges the better. So even if it is compromised there’s very little you can do with it.

This is also a general principle for network management. For instance when does the TV need to print or access any server other than Jellyfin?

[–] PaulEngineer-89@alien.top 1 points 1 year ago

Umm, a static ipv4 ip?

[–] PaulEngineer-89@alien.top 1 points 1 year ago

NEVER transcode. Do it as a background task offline. Even GPUs and desktop servers are best offline.