Readit News logoReadit News
pandog commented on Ask HN: How to learn marketing and sales as a solo entrepreneur?    · Posted by u/yu3zhou4
mud_dauber · a year ago
I’m hesitant to simply say “read this”, but please consider The Mom Test. It’s a quick read & teaches how to structure conversations with potential customers.
pandog · a year ago
Came here to post this - this was a great (and short!) read to help validate if your idea could be something somebody wants to pay for.
pandog commented on Is Telegram really an encrypted messaging app?   blog.cryptographyengineer... · Posted by u/md224
alerighi · a year ago
Well of course, but this is a feature of Telegram. It's the only messaging app where messages are stored on the cloud. This of course has security implications, but also allows you to have a big number of chats without wasting your device memory like WhatsApp does, or having to delete old conversations, and allows you to access your chats from any device. By the way you can also set a password to log in from another device (two factor authentication, also on WhatsApp now you have this option).

To me it's a good tradeoff, of course I wouldn't use Telegram for anything illegal or suspect.

pandog · a year ago
I think a high definition photo taken on a recent phone takes up an awful lot more device memory than a "big number of chats"
pandog commented on Engineering Management Checklist (2021)   pnewman.org/engineering_m... · Posted by u/luu
jawns · 2 years ago
I would wager that very few engineering managers have significant formal training in management. While software engineers can hold a wide variety of degrees, the most common is a CS degree, and few of those include significant coursework specifically about engineering management.

Thus, unlike with IC-track positions, it is likely that an engineer promoted into a management role is coming in cold. And while there are a variety of helpful books and training materials about engineering management, in general new EMs are expected to mostly learn by doing.

“Learn by doing” can be tricky, however, because many of the issues a seasoned engineering manager is expected to be able to capably handle do not happen every day. They happen relatively infrequently, and sometimes only when you change teams, but you need to know how to handle them when they do occur.

Because engineering management is largely a “learn by doing” craft, and because it can take years in the role to experience even the half of what a seasoned EM is typically expected to be able to capably handle, I would argue that the best EMs are those who have had abundant opportunities to learn from their mistakes. But you can certainly speed that up at least a little bit by learning from other people's mistakes instead :)

pandog · 2 years ago
Though I would add that looking back to when I was an IC, my Computer Science degree hadn't given me much if any formal training in Software Engineering (especially in a large team and code base) and I mostly learnt by doing that also.
pandog commented on Fail2Ban   github.com/fail2ban/fail2... · Posted by u/redbell
jtriangle · 2 years ago
"Don't use fail2ban because you don't need it if you do XYZ"

I'm not so sure that's a good reason to be honest. And if you're worried about CVE's, well, you'll be using handwritten, hand delivered notes before long. Keep your systems patched, keep them tidy, none of this is likely to affect you, fail2ban or not.

pandog · 2 years ago
To put it another way - there is no security risk that fail2ban helps with that can't be resolved in another, better, more robust and less risky way.
pandog commented on Fail2Ban   github.com/fail2ban/fail2... · Posted by u/redbell
callalex · 2 years ago
Doesn’t it help to mitigate DoS type attacks by reducing the amount of CPU that a bad actor can burn?
pandog · 2 years ago
If someone is performing a denial of service attack from one I.P. address then this will help.

To tptacek's point, you've got to ask yourself is a denial of service attack in your threat model?

The reality is most folk set up fail2ban after seeing auth failures in their logs, not service degradation.

If you're considering a denial of service attack in your threat model, then I'd probably also consider a DDoS attack and there are likely more effective solutions here (a firewall or CDN).

And don't forget you're using some of those precious CPU cycles to parse the auth logs, with python no less :-)

pandog commented on Fail2Ban   github.com/fail2ban/fail2... · Posted by u/redbell
pandog · 2 years ago
fail2ban is a real pet peeve of mine because anyone security conscious enough to deploy this will have likely already mitigated any actual security risks this could help with either by using a strong password or public key authentication.

That leaves noise in the logs - which sure, it's nice to reduce, but using an alternative port can help here.

I may sound like a spoilsport - but the fact that there have been a number of security vulnerabilities (https://www.cvedetails.com/vulnerability-list/vendor_id-5567...) in this project, make it worse than security theatre, it actually increases risk whilst not at all reducing it.

pandog commented on Tor’s shadowy reputation will only end if we all use it   engadget.com/tor-dark-web... · Posted by u/mikece
aredox · 2 years ago
And in the end it can't circumvent stuff like the great firewall of China.

In the end Toe is just a legacy project from the CIA/NSA that has outlived it's usefulness. The NSA has certainly redteamed all the ways to take it down or uncloak users, if needs be, so it's not even a tool against a potential fall into dictatorship of the USA.

pandog · 2 years ago
There are a bunch of projects from Tor to aid in circumvention of the great firewall of China: https://support.torproject.org/censorship/connecting-from-ch...
pandog commented on Hardening Drupal with WebAssembly   wasmlabs.dev/articles/har... · Posted by u/gzurl
angelmm · 3 years ago
(Wasm Labs dev :)) For me, this is the key point. The end goal is to limit the attack surface for future vulnerabilities. This is not something specific to Drupal or PHP, but an example about technologies / apps that can take advantage of Wasm.
pandog · 3 years ago
Don't disagree - but if I have a limited amount of resources to harden my Drupal server, it might be best to start looking at hardening around the most commonly exploited Drupal vulnerabilities.

Having said that, searching Druapl on the CISA know exploited list shows a number of remote code execution vulnerabilities that this would help mitigate: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

u/pandog

KarmaCake day269March 5, 2012View Original