Cybersecurity professional with an interest in networking, and beginning to delve into binary exploitation and reverse engineering.

  • 1 Post
  • 404 Comments
Joined 6 months ago
cake
Cake day: March 27th, 2024

help-circle


  • Maybe it’s not something where they remember they’re right or left handed based on that specific thing, but just that they prefer using the hand on that side.

    That sounds weird. You wouldn’t need to understand the concept of left and right to know you have a dominant hand. You would just innately know one hand is the dominant one and the other isn’t. If I told my cat that a treat was behind the door on the left he’d be like “wtf is left bruh”, but he almost always bats at shit with his right paw.





  • borari@lemmy.dbzer0.comtoSelfhosted@lemmy.worldNetwork Switch
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    1
    ·
    3 days ago

    You presented one that doesn’t have security vulnerabilities? Here’s yet another CVE out for trendnet: https://nvd.nist.gov/vuln/detail/CVE-2018-19239

    Every. Single. Brand. Has. CVEs. I’ve used Mikrotik, I’ve used Cisco, I’ve used Juniper, I’ve used Ubiquiti. I have a trendnet Poe switch in my attic powering some cameras and an AP right now. I have no “problem” with any brand of anything.

    I do have a problem with you implying that a company doesn’t take security seriously when they do. I start to think you’re intentionally lying when you lift up trendnet as the model, because they have quite an especially atrocious history of it.







  • borari@lemmy.dbzer0.comtoSelfhosted@lemmy.worldNetwork Switch
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    1
    ·
    3 days ago

    Yeah I’ve worked at WISPs that were pushing TBs through their core routers every day. Those core routers? Mikrotiks. Every apartment buildings core routers and fiber aggregation switches? Mikrotiks. You had to get down to the access layer switches that fed the individual apartments to hit Cisco equipment.

    This person is just repeating some shit they read somewhere, hoping it makes them sound knowledgeable. In another post they’re recommending trendnet shit. Get back to me when you can set up BGP peering on your trendnet lol.






  • I can’t quite get a read on if you’re being sarcastic or not, but if you are you should know that there are curated porn blocklists for pihole. This obviously won’t stop anyone from accessing porn via nsfw channels on sites that are not exclusively nsfw, like lemmy, Reddit, tumblr, or whatever.


  • Run pihole with a MikroTik router at your houses demarc.

    Set up firewall rules in the tik to redirect any packet with dst tcp/udp 53 outbound on wan to the pihole. If you’re worried about dns when pihole is down, create disabled rules to allow the dns traffic as well, then set up a scheduler script using if blocks to toggle the sets of rules depending on status. This will force any client on your network, even one with hardcoded dns IPs, to use the pihole.

    If the client is configured for DoH you’ll just have to build out an ip block list in the MikroTik and block all known DoH IPs.

    Create firewall rules to drop all vpn traffic you can, combining port based rules and similar IP lists as for DoH, but subbing in VPN provider IPs. If you want to route your home traffic over a vpn, set up a vpn client in the router itself and basically site-to-site your home to the vpn provider you use.

    This would block the vast majority of kids trying to bypass parents blocks, but it’s asking quite a lot from the parents who don’t have experience configuring this stuff already.