Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]


Groups > comp.os.linux.misc > #35497

Re: Not Strictly Linux - How To Do SMB2/SMB3 Efficiently With FreeBSD & Derivatives

From The Natural Philosopher <tnp@invalid.invalid>
Newsgroups comp.os.linux.misc
Subject Re: Not Strictly Linux - How To Do SMB2/SMB3 Efficiently With FreeBSD & Derivatives
Date 2022-08-25 10:38 +0100
Organization A little, after lunch
Message-ID <te7fvd$3k9im$1@dont-email.me> (permalink)
References <Yi2dnVr7RNd5wJn-nZ2dnZfqnPrNnZ2d@earthlink.com> <te287l$2v73v$1@dont-email.me> <te721g$1uu4$1@gioia.aioe.org>

Show all headers | View raw


On 25/08/2022 06:41, 25B.Z969 wrote:
> On 8/23/22 5:56 AM, The Natural Philosopher wrote:

> 
>> They say  - academics, who are fond of talking out of their anal 
>> orifices - that security by obscurity doesnt work.
>>
>> It does.
> 
>    Agreed. It's now because of the BOTS. They won't waste
>    time searching/analyzing 65534 ports for every possible
>    service. Always redirect your common external traffic to
>    obscure ports. For fun, try something like zenmap and
>    have it do the "intensive search" on a remote target.
>    Even with gigabit networking that probe can take like
>    half an hour. This is NOT time-efficient. The bots
>    will look for RDP on the default RDP port, VNC on the
>    default VNC port, MS-SQL on the default MS-SQL port
>    and a few others. No response, they MOVE ON to the
>    next potential victim.
Indeed. I relocated the ssh port on my server here, as far as access 
from the world is concerned (its handy to be able to grab files off it 
when I am away from home), and the logs don't show anyone banging on its 
door.
> 
>    However the OTHER, human-factor, approaches like the
>    poisoned link and "Click Me Now For Big Saving" tricks
>    CAN be more useful. The latest plague seems to be
>    fake invoices - and some of them LOOK real good (but
>    most are so crappy/vague/weird that even the secretarial
>    pool can spot 'em). Today's basically boiled-down to
>    "Hi ! Please send me your credit-card number." - and
>    I bet a thousand targets DID just that ..........
> 
I never have. In all my time I have lost a credit card twice, but have 
never had one used by anyone else.


>>
>> I got burgled once. Did they pick the expensive door lock? No. They 
>> walked round the back and jemmied a (locked) window open.
> 
>    Yep, a $19.95 pry-bar from Home Depot will open most ANY
>    door ... the $29.95 sledge/wedge will take apart brick walls
>    in 30 seconds.
> 
>    However an alarm system within CAN be useful. I'd
>    suggest multiple Really-High-Decible alarm sounders
>    within - loud enough to HURT and prevent thought ...
> 
Really there isn't much to steal here.
And there is no one close to hear the alarms anyway.

>    Nobody pays attention to external alarm sounders
>    anymore and the cops will FINE you for fake alarms.
> 
>    'Security' is mostly an illusion, a game. The perps
>    want it to be an EASY game, or they'll go elsewhere.
> 
>    But the pointy-haired bosses don't know that.
> 
>    If you want to know the latest insanity, read 'Dilbert'.
>    Last year the pointy-haired bosses wanted blockchain
>    for EVERYTHING because they'd read something about it
>    in a managerial-trends blog ......
> 
I was the pointy haired boss,  and my staff were frank open and honest, 
because I encouraged it, WE had the odd windows virus, till I removed 
all the floppy drives from the PCs.
ISTR the techs then put up a machine running all virus and malware 
detection software on it and told the rest of the staff to put their 
disks in that, first.
And then THEY would install it on the user machines.

>    And sometimes you just have to bullshit them with
>    long technical-sounding buzzwords .........
> 
Why I never lasted long in the 'corporate' world. A recruitment 
consultant told me 'you are top management material but no one will ever 
promote you there because of your attitude'.

The simple answer was to run my own business, ultimately

-- 
"The most difficult subjects can be explained to the most slow witted 
man if he has not formed any idea of them already; but the simplest 
thing cannot be made clear to the most intelligent man if he is firmly 
persuaded that he knows already, without a shadow of doubt, what is laid 
before him."

    - Leo Tolstoy

Back to comp.os.linux.misc | Previous | NextPrevious in thread | Next in thread | Find similar


Thread

Not Strictly Linux - How To Do SMB2/SMB3 Efficiently With FreeBSD & Derivatives "25B.Z969" <25B.Z969@noda.net> - 2022-08-23 00:57 -0400
  Re: Not Strictly Linux - How To Do SMB2/SMB3 Efficiently With FreeBSD & Derivatives The Natural Philosopher <tnp@invalid.invalid> - 2022-08-23 10:56 +0100
    Re: Not Strictly Linux - How To Do SMB2/SMB3 Efficiently With FreeBSD & Derivatives "25B.Z969" <25B.Z969@noda.net> - 2022-08-25 01:41 -0400
      Re: Not Strictly Linux - How To Do SMB2/SMB3 Efficiently With FreeBSD & Derivatives The Natural Philosopher <tnp@invalid.invalid> - 2022-08-25 10:38 +0100
        Re: Not Strictly Linux - How To Do SMB2/SMB3 Efficiently With FreeBSD & Derivatives "25B.Z969" <25B.Z969@noda.net> - 2022-08-25 20:55 -0400
        Re: Not Strictly Linux - How To Do SMB2/SMB3 Efficiently With FreeBSD & Derivatives "25B.Z969" <25B.Z969@noda.net> - 2022-08-25 21:33 -0400

csiph-web