Great presentation, is there a way to resolve conflicts in case of disaster recovery (Active-Active) without breaking the replication
@plusone.network14 күн бұрын
As Fry would say "shut up and take my money!" <3+1
@endogeneticgenetics15 күн бұрын
Cantrill @4:00
@Crftbt15 күн бұрын
RIP audio level. :(
@kiokogit18 күн бұрын
Great presentation. Makes me feel like I already know this thing;
@sdfglkjhdfkjdhldskfj19 күн бұрын
Too quiet. Sorry.
@VeggieTanuki19 күн бұрын
Snaps 🤢
@linkert81028 күн бұрын
I'm gearing up towards deploying a home server using Nix and NixOS. I have KZbind and duckduckgoed my way to a quite flexible flake and home-manager setup for the procrastination machine which also allows for any other type machine to live next to it. It's an absolute blessing even for a simple desktop configuration.
@IIIlIIIIlIIIIIАй бұрын
7:00 this is a more general argument that using your distribution's repos is better than downloading and running bash scripts. Of course, this is true, but it's not specific to nix or nixos (aside from the fact that nixos has a jellyfin package while debian doesn't). Good talk overall. Thanks.
@ma34529Ай бұрын
Great presentation!
@promaa_Ай бұрын
Incredible video
@kefkef5Ай бұрын
listening to this from my nixos home computer, while deploying nixos on my 3 servers at home :P
@youssefaghayou68752 ай бұрын
W
@dv_xl2 ай бұрын
I use nix at home. It's not without its downsides but it generally has been a lot better. A big advantage is just the ability to come back after weeks and remember exactly the system configuration state
@Linitsh2 ай бұрын
Nice hair
@tengjiang89222 ай бұрын
great talk!
@ChantelleMylanz-v7b2 ай бұрын
This is evil
@QuadDerrick2 ай бұрын
you do obviously do not understand how disgusting it looks to be a 19 year old little snot saying he been in navy and works for akamai , the world largest isp ,,, basically the hub, the mother, the isp for all other isps,, saying publicly your scrolling trough logs on daily basis. nasty spy.. its not that i dont did it myself when i worked in a school, spying on every pupil, but its not the same,,, scale... at least i know how to hide from your eyes,, poor looking mirai botnets... twat...
@Lugnear2 ай бұрын
Hello did you inform the the libyan company of there website ? I am in libya now and very interested in investigating it
@DrewryPope2 ай бұрын
Wait was there not a community survey?
@affieuk2 ай бұрын
As a nix noob, I did this about 8 months ago, I've still not learnt flakes yet, but my current setup works well and it's been stable. I recently updated to 24.05 too.
@zgintasz2 ай бұрын
Is this new? I suspected proxyjacking the first time I saw a service named “residential proxies”
@KIP-lh1ln2 ай бұрын
I see proxyjacking as a risk to the victims, as high risk traffic could be tunneled to these unsuspecting victims.
@ChantelleMylanz-v7b2 ай бұрын
Exactly
@ianmoyer53322 ай бұрын
Proxyjacking sounds like some kind of lewd act you would read about on urban dictionary
@UNcommonSenseAUS2 ай бұрын
There is no such thing as local government. Its a fraud operated by the state .
@UNcommonSenseAUS2 ай бұрын
Is it secure tho...
@rebane20012 ай бұрын
16:35 no thats not the right hackernews 😭
@Akash.Chopra2 ай бұрын
Please move the mic away from the center of your mouth bro..
@ngtechil2 ай бұрын
The volume is very low.
@FUKTxProductions2 ай бұрын
its funny cause hydra is also the name of a pentesting/hacking tool in kali/backtrack etc
@andresdelorbe96382 ай бұрын
I really miss the old linode logo !
@lootclan58422 ай бұрын
fr
@kat904302 ай бұрын
Awesome talk, thank you! I wish we had more of this content not bullshity reels and tiktoks 15 secs long
@vuufke43272 ай бұрын
Entirely useless talk, save you time.
@MouadScriptz2 ай бұрын
not true
@frag06382 ай бұрын
This is 15 years late
@vuufke43272 ай бұрын
@@frag0638 proxyjacking has been a thing pretty much from the day smartphones became popular, I wouldn't call it "the latest side hustle"
@corpingtons2 ай бұрын
How is it useless it’s still being used? If a computer has malware anything is possible if it’s ud
@udirt12 күн бұрын
tell me you don't need to think about real envs without telling me you don't need to think about real envs.
@terraflops2 ай бұрын
why are these video so bad at accessibility ? the font is so tiny and the microphones do not catch all of the speech .ZOOM IN and the speaker does not need to take up so much screen space for the video. not like anyone will read this but damn, do better SCALE
@gooniesfan79112 ай бұрын
im hearing impaired and the transcript is hard to search through. is this vulnerability involving modifying DNS requests via the proxy end?
@CyberSnakeEater2 ай бұрын
I just started watching so i can't answer, but maybe you could benefit from a strategy I use to study: I copy and paste the transcript into an AI and ask it questions
@bearwolffish2 ай бұрын
@@CyberSnakeEater You verify the answers the AI gives you?
@rxpe2 ай бұрын
Via the proxy end? It's just using infected machines as proxies and selling their access.
@MacGuffin12 ай бұрын
Yeah IU cant read his overhead stuff on a very large screen in 4k :[
@BillAnt2 ай бұрын
A proxy is similar to a VPN for changing different static or dynamic IP's. The only difference difference is that a VPN also encrypts the DNS requests. I'm using a proxy every day for my business to access certain sites, because changing IP's forces me to log in an verify it again the IP again. It's a completely legit use.
@bobbyrandomguy14892 ай бұрын
A proxy does not inherently promise encryption. All VPN connections provide encryption. Just make sure you use the correct protocols!
@BillAnt2 ай бұрын
@@bobbyrandomguy1489 - That what I said, a proxy is just for changing IP's. But with 99% of websites nowadays the actual traffic is encrypted via HTTPS/TTS. The only things a VPN is better at, is hiding DNS queries so an attacker won't know the url/IP of the sites you're visiting. Honestly I don't trust either proxy and VPN services, could be honey-pots all we know. "Trust me bro, no logs!" lmao
@exciteproductions4two02 ай бұрын
@@bobbyrandomguy1489tell that to lemons vpn after they sold all their customers information to a Chinese web company.
@Heapsray2 ай бұрын
This claim is false
@Heapsray2 ай бұрын
A VPN completely replicates the network stack and encapsulates it in an encrypted way, while a proxy just forwards requests for you and acts as man-in-the-middle
@BillAnt2 ай бұрын
"We discovered the motive to be monetary" duh! Wish bad hackers would be just wasting their time writing code for free. lol
@ok-jj2 ай бұрын
Trash monkey.
@ok-jj2 ай бұрын
This dude is a retarded trash loser.
@ok-jj2 ай бұрын
What a retard, you idiots know nothing about computers.
@eyezikandexploits2 ай бұрын
Great talk loved the breakdown
@milesraymond23602 ай бұрын
Why is the audio so quiet? I have youtube, software, and hardware volumes at MAXIMUM and this is still quieter than my gpa whispering. A notification coming in is like a sonic boom to my ears this hurts so much.
@nevergoon43152 ай бұрын
This talk is easily 14 years out of relevance.
@andrewferguson69012 ай бұрын
That would mean something if vulnerabilities 14 years out of relevance werent still being exploited for fun and profit
@nevergoon43152 ай бұрын
@@andrewferguson6901 Fun and profit is a dog-headed point of view. Do you think you are better than a dog? The most successful hackers are god-headed political idealogues with tragic tales; not run of the mill crooks or goons. Political idealogues look at crypto and networking technology companies and sees it for what it is. State-sponsored fascism with a bunch of pretty graphs. If you can't learn to understand the motives of your adversaries you can never hope to stop them, much less compete with them. Low-brow attacks like what this talk covers only exists because this country is one large honeypot. Hackers know better than professionals what is real and what is not.
@ericschroeman50202 ай бұрын
eh not really, some is old info but most is pretty current
@bezillions2 ай бұрын
If it's not patched or moot it's relevant
@vinegar66762 ай бұрын
i hope the steam deck gets this technology
@e8root2 ай бұрын
Since Steam Deck uses Linux I am fairly sure you can replace its kernel with one that support sched-ext and start writing your own schedulers... ah yes, technology is cool but to be usable someone would need to put the effort in to making it usable. Valve could use sched-ext to optimize scheduler with per-game rules. The used CPU has rather simple topology so it would make little sense for Valve to put effort in these things so it will probably never happen.
@blessiousphiri31092 ай бұрын
Great presentation
@BUY_YT_Views_5753 ай бұрын
I love the way you edited this, it's so visually appealing.
@Anonymous______________3 ай бұрын
Unfortunately, the only feasible way to horizontally scale is via the use of distributed systems. Storage is one of the major domains that has pushed these limits pretty hard thanks to iot, AI/ML and "big data".
@david244423 ай бұрын
Completely agree with obsession of algorithmic coding questions proving out very little of a potential engineer’s capabilities and little about their potential, yet we do it anyway because we can’t agree on anything better. Watch the Albatross Courtship Dance or the Victoria’s Riflebird Dance for nature’s analog.