Follow Slashdot stories on Twitter


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:Default gateway. Tested and works to this modem (Score 1) 115

Then it's not just a modem. Do you have a separate router or just your "modem"?

If you have a router, then you're doing an unnecessary double-router setup. If you don't, then the whole point is moot. A modem is transparent to layer 3 and provides a common layer 2 among different layer 1s.

The (separate) router on the LAN side of the modem needs to be aware of the 192.168.100/24 on its WAN side or else it won't know how to reach it on layer 3, regardless of every traffic passing thourgh the modem on layer 2.

Comment Re:Secret haxxor exploit link HERE: (Score 1) 115

If you use 10/8 internally, then your router will either forward packets for to your ISP or drop them entirely. What makes you think just putting a device with on the WAN side of your router makes it reachable if your router doesn't know anything about 192.168.100/24 on that interface?

Seriously, get a clue about networking and routing.

Comment Re:Let's Encrypt is only for encryption (Score 1) 123


Free certs technically are exactly the same as every other cert. What you probably mean is to choose a higher validation than DV. That's the only reason you should pay someone money. But that has nothing to do with which devices accept your cert. That is a matter of server config and how you configure your TLS algorithms.

Comment Re:flawed "research" (Score 1) 199

The point is, when that thing is still running, what prevents the Internet service you're using from switchting it into recording state remotely? Just because it doesn't transmit data "right now", doesn't mean it can't be made to, remotely.

However, that's exactly the reason why I wouldn't use anything "cloud" in the first place. Give me a cam that can upload to my server. I don't care if it's really off or not, if I can firewall it to only talk to my services.

As such, this "problem" is only a problem because it highlights the bad decision someone made in the first place, namely using "cloud-based" bullshit.

Comment Re:I love the attitude (Score 1) 55

Simple, the username is to be considered public knowledge. It's visible when entering it everywhere, it may be in ~/.ssh/config, it's not a secret.

Just assume the whole world knows it already. All strength must come from the password either way, so don't even start to treat the username as some sort of secret.

Comment Re:Just run your own (Score 1) 147

Whether there's someone sitting on your line and grabbing your traffic or tampering with it is completely irrelevant because that problem exists in any case. By running your own resolver, you don't publish your queries directly to a third party on top of that and that's a good thing.

Comment That's what you get... (Score 1) 65

That's what you get when offering VPN access must include proper client configs because users are clueless and want to be "secure" by hitting a button.

I guarantee you that I could take the credentials of each and every one of these VPN offers, put them into my router and tunnel all my clients properly(!) without any leaks.

It's not the VPN that is flawed, it's the CLIENT SETUP. For people with a clue, that's a distinction.

Slashdot Top Deals

Wasn't there something about a PASCAL programmer knowing the value of everything and the Wirth of nothing?