• 0 Posts
  • 17 Comments
Joined 1 year ago
cake
Cake day: June 16th, 2023

help-circle
  • liara@lemm.eetopics@lemmy.worldErwin TN after Helene Storm
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 month ago

    Glad you are okay. I got out yesterday too and the scenes of the city were just an absolute mess. Glad the cell towers are back online, so many people I saw yesterday were just trying to find a spec of reception to get even a single text out to their loved ones to let them know they were still alive.

    It’s going to take quite some time to repair all the damage and get power back up, but I saw the National Guard rolling in as we left with tree chippers 🙏













  • liara@lemm.eetoTechnology@lemmy.worldUnity apologises.
    link
    fedilink
    English
    arrow-up
    4
    ·
    1 year ago

    This is called the “Door in the face method” of bargaining. Start with a request so high and absurd that you “slam the door in their face” because it’s so absurd.

    The next time they try, they’ll come back with an offer that sounds far more reasonable than the original request. Since you’re still primed with the previous context, your brain makes it sound less bad than it probably is ("At least it’s not the first offer!). You’re more likely to accept after this.

    The opposite technique is called “foot in the door”, start with a small request (get your foot in the door) and then increase the ask after the small request goes over.



  • I don’t really use it for this, but here are some things I do use it for:

    • metrics scraping on servers without needing to open ports or worry about ssl encryption. Works great for federating Prometheus instances or scraping exporters
    • secure access to machines not directly exposed to the internet. I.e. ssh access to my home box while I’m traveling
    • being an exit node for web traffic while traveling. I.e. maybe you are traveling and have a bank who is giving you grief about logging in – masquerade that connection from your home IP

    I mostly just use it for metrics scraping though


  • It sounds like what you want is to either get a modem (either rented through the ISP or bought 3rd party, if your ISP supports it) and then ensure that this modem is in bridge mode without any sort of router features. That said, most places will just give you a dumb modem if you have no intention of using their router.

    Then the other gear would be a router with the feature set you want. I personally am quite fond of my Mikrotik hap ac2 but the ac3 looks good too. I don’t use the Mikrotik for the wifi either (I use unifi for that), but it’s decent enough for a small space in a pinch.

    Basically you would need to find out from your ISP if they allow you to bring your own gear – modem and/or router, with the router being the more important of the two and get their help to either swap your existing device into a bridge or getting you something that can.


  • Going to play Devil’s advocate here, but open source does not automatically mean that things are safe or that anyone is even auditing the code on anything that resembles a regular basis.

    Heartbleed was introduced into OpenSSL source code in 2012 and wasn’t discovered and fixed until 2014