It’s pretty scary: I am seeing it in the IT sector as well. It’s not just knowledge; anyone can look up things, even Einstein did it. “I never memorize anything that I can look up,” he said once, about the why he never memorized cosine tables and such. But it’s basic logical flow of thought and problem solving. Like the skills behind the knowledge, that I see less and less of.
Punkie
Linux nerd and consultant. Sci-fi, comedy, and podcast author. Former Katsucon president, former roller derby bouncer. http://punkwalrus.net/
- 0 Posts
- 7 Comments
Punkie@lemmy.worldto Today I Learned@lemmy.world•TIL ancient Romans used communal toilets—stone benches with keyhole-shaped holes—where people sat side by side without privacy, chatting while waste drained beneath them using flowing water.English34·23 days agoAlso “without privacy” is also in question, because you could use cloth partitions hanging from a rod; something known to be used in stadiums to separate class.
Punkie@lemmy.worldto No Stupid Questions@lemmy.world•Instead of Orange Man doing Tariffs would it not have been better for him to talk about shopping locally and so forth. And giving more tax breaks to companies that stay and sell in the US?1·1 month agoI often think he’s a second grader lying on his oral book report.
Punkie@lemmy.worldto linuxmemes@lemmy.world•I didn't know you were supposed to disable root user...0·4 months agoBasic setup for me is scripted on a new system. In regards to ssh, I make sure:
- Root account is disabled, sudo only
- ssh only by keys
- sshd blocks all users but a few, via AllowUsers
- All ‘default usernames’ are removed, like ec2-user or ubuntu for AWS ec2 systems
- The default ssh port moved if ssh has to be exposed to the Internet. No, this doesn’t make it “more secure” but damn, it reduces the script denials in my system logs, fight me.
- Services are only allowed connections by an allow list of IPs or subnets. Internal, when possible.
My systems are not “unhackable” but not low-hanging fruit, either. I assume everything I have out there can be hacked by someone SUPER determined, and have a vector of protection to mitigate backwash in case they gain full access.
I was out of sugar, so I tried to sweeten Kool-Aid with honey. Nope. Just god-awful.
Thank you for this!