PaulEngineer-89

joined 2 years ago
[–] PaulEngineer-89@alien.top 1 points 2 years ago

Trouble is many IT departments blindly purchase install whatever crap a security company recommends, without following step 2 (white listing).

I’ve been blocked by these stupid filters from Amazon while in engineering having to order parts to get the equipment running because it was flagged as “Japanese porn” on the guest (contractor) network. And yes I resorted to a proxy/socks tunnel to my VPS.

[–] PaulEngineer-89@alien.top 1 points 2 years ago (1 children)

The thing about containers is they usually have no NÉED in general for pure ope file system access. No need for full network access (host, LAN, WAN). So the smaller the privileges the better. So even if it is compromised there’s very little you can do with it.

This is also a general principle for network management. For instance when does the TV need to print or access any server other than Jellyfin?

[–] PaulEngineer-89@alien.top 1 points 2 years ago

Umm, a static ipv4 ip?

[–] PaulEngineer-89@alien.top 1 points 2 years ago

NEVER transcode. Do it as a background task offline. Even GPUs and desktop servers are best offline.

view more: ‹ prev next ›