• 0 Posts
  • 18 Comments
Joined 11 months ago
cake
Cake day: October 18th, 2023

help-circle






  • Yes, this seems to happen more frequent with brands like realtek. All hardware has failure rates, generally speaking more expensive and enterprise gear fails with less frequency, but can still fail. Personally, I don’t enjoy hardware failure, so I invest in stable clean power and great hardware. It may cost more in the overall power budget but is less headache because things just don’t fail as often.




  • I have another house, about 800 miles away… With another fairly identical setup. VPN at 1gb between. That’s for the replication. Also, have another site, with a VPN, and some rackspace there for periodic backups. My more critical stuff is put in an encrypted drive and left at another location. I like doing things myself and this works for me, but you may want to look into some bucket storage in the cloud, or just a USB drive you can carry offsite on occation.


  • Mine are running all of the time, including during power outages, and are only shut down for physical maintenance and reboot for software maintenance.

    This is a little variable through. Windows hosts tend to require more frequent software reboots in my experience. About once a year, I physically open each device and inspect, clean dust (fairly rare to find it for my setup though), and perform upgrades, replace old storage devices and such. Otherwise I leave them alone.

    I usually get about 5-7 years out of the servers and 10 out of networking hardware, but sometimes a total failure occurs unexpectedly still and I just deal with it as needed.


  • Before this post gets blasted with “just use a VPN” Yes I already have wireguard up and running but trying to get family members setup with a vpn that are technology illiterate is a nightmare

    I mean, the reasons to do this cannot be understated. A VPN literally accomplishes the security and exposure issues.

    It’s your network through. You can feel free to expose your ports and services to the entire internet and take the risk of zero day attacks, brute force, and credential leaks. Knowing that your family is illiterate, it sounds like they may not use best cyber security practices with your services…

    So, that leaves it on you. You can either support it on the front end with a proper VPN like Wireguard, or support it on the back end with IDS, honeypots, advanced threat management, constant monitoring, mitigation, patch management, backup and restores, isolation, etc.

    There are not shortcuts to proper security and exposure management. You can also pay someone, or a company to do this for you.





  • I built a payment processor many years ago for a large bank.

    Spoiler alert: you won’t be self hosting something like this. The regulatory and compliance aspect alone will financially destroy you. You’d have audits, auditors in your home, and they will fail you. You won’t be able to be in compliance and thus you won’t be allowed to process financial transactions.

    You will need an intermediary, like stripe or square or similar, to accept payment. Shop around for a solution or start investing into a large education on SEC, FDIC, and PCI regulations before you even get into the technical and physical challenges of financial transaction processing. I am guessing there are quite a few additional regulations now.

    Good luck



  • First red flag your company is a joke: you have a local admin account.

    Seriously, do not circumvent your corporate security. You have literally zero defense to these actions and can be terminated immediately. Not if, but when it happens, you will also likely be blamed for any issues which arise even if they are not directly your fault. If you did have permission somehow to do this, I am not sure why you are asking for help on how to do this. If your company does allow this, it’s even more of a joke than allowing a local admin account and that raises other questions.

    I allow my folks to BYOD on a (mostly) unrestricted BYOD/Guest network. Nobody has local admin accounts for any devices on the corp side. People can bring their personal laptops in and browse whatever and use VPNs on this network if they choose. There are some obvious restrictions (nothing illegal, for example), but if folks want to VPN to their self hosted environments or play on tiktok with their stuff, it’s better for liability, better for security/compliance, and most importantly … It is completely isolated from any corporate stuff. There is no need for circumventing when better options are available, promoting best practices for all employees.