Is anyone else getting a huge number of bot visits from servers in the Fastly network? I'm seeing junk traffic that approaches low level dDOS numbers and a huge chunk of it is coming from Fastly data centers.
@Gina Ok I shall attempt 🤣 ⁃ Shower: nowhere to put your shit and v hard not to get hair wet if you don't want to ⁃ Sink: wtf nowhere to put anything ⁃ Can't plug in a hair dryer ⁃ Ugly as hell otherwise What did I miss?
Lenovo? No, thanks I have never been really fond of Lenovo notebooks, even if they are used by many notable Linux hackers. Now I have an actual yet feeble reason to avoid them, preferring Linux-friendly vendors (such as Laptopwithlinux.com, tuxedocomputers.com, slimbook.com, even dell.com1 or system76.com in the USA) since it happens that in my country Lenovo does not even consider the idea to offer Linu https://monodes.com/predaelli/2026/02/07/lenovo-no-thanks/ #YetAnotherReasonToAvoid
@mayintoronto@evan Yes! I would commit crimes for mutuals only posts to be an option, here and on most other platforms I use. Followers only isn't always enough.
@evan I’ve always leaned toward having A's wishes respected as a first order priority.
I've worked to help platforms work through options for B to respond in a manner (it was a two tiered response model) where the one to A is clear, but one that filters out A from the response (either as script to remove it, or giving B the option for a public version).
These options were never implimented.
I know Traction software (for enterprise and “secure" focussed organizations) did this really well.
@evan this is what happens when people want to have a moderately private conversation, yeah: think of it like the pub/bar/café table filling up for a given subthread
@evan Twitter / X have public replies from B visible to A's followers as they are open. But, B's followers can see the response, which is where things get to be problematic.
I wasn't intending to say only B's followers saw the reply, but that they could see the response to a private account.
Marketers, stalkers, and worse have easy pickings in that model.
What @dahukanna lays out in the venn diagram is the good approach.
Have you worked with tags on your jails yet?One nice benefit of using tags is that you can also TARGET by tag name, meaning you can group like systems and maintain those separate from others.`bastille tags help`Usage: bastille tags TARGET [add|delete] tag1,tag2bastille tags TARGET list [TAG]#FreeBSD #BastilleBSD #SysAdmin #DevOps
@stefano @ricardo the article mentioned the FreeBSD subreddit and The FreeBSD Forums. Yorick Peterse shared his post in the sub, where it was very well-received. Pictured: insights that are not visible to the public (I very rarely share such things, doing so seems harmless on this occasion). No mention of Discord, Twitter, or X. Also pictured: the wiki for FreeBSD Discord very recently cautioned that the FreeBSD Community Code of Conduct can not be enforced. I do not imagine that this caution relates to any recent misconduct there …<https://www.freebsd.org/internal/code-of-conduct/><https://wiki.freebsd.org/Discord/DiscordServer><https://yorickpeterse.com/>#FreeBSD #Reddit #forums #Discord #community #conduct #misconduct
Four days left on the "Networking for System Administrators" #kickstarter! Back this campaign, get at LEAST three #sysadmin books.Actually reading it will help you achieve peace with your network team.https://mwl.io/ks
So, this is your regular reminder that phishing eMails are getting REALLY good...I received TWO phishing messages for different online web brokerage companies, and they look quite authentic.But I'm not a client of those companies, so I knew it was a scam.Please remind your friends and family members not to click on links in eMail, ESPECIALLY if they're urgent or threatening dire consequences.#infosec #phishing #scam #spam