• 0 Posts
  • 17 Comments
Joined 9 months ago
cake
Cake day: December 27th, 2023

help-circle


  • an experiment with words, first mixed (CAP ist first sentence, lower is second, but try to read all words first) then separated versions:

    LET how ME does TRY it TO feel MAKE to YOU you COMPARE reading IT that TO sentence READING and TWO this SENTENCES question WITH in MIXED parallel? WORDS.

    let me try to make you compare it to reading two sentences with mixed words.

    how does it feel to you reading that sentence and this question in parallel?

    actually reading this feels a bit similar to listening to different songs in parallel to me, but when reading these 1:1 alternating words (even with one sentence in CAPS) i do not recognise any meaning while reading, but when explicitly only reading CAP or noncap words. when listening to two songs in parallel this seems far more easy for me and seems to work. am i a musician?


  • i started to create separate email aliases for every newsletter, account and contact like >10years ago. i still have some few aliases that i shared with friends so these are spread more wide. some of these aliases turned out to be useful as in the platform i created it for lost my data, i got some phishing mail and told the platform admins about their data loss, i then just stopped spam by changing that one single email alias. that happened i think four times.

    this year i wanted to get rid of old domains and had to go through all of the aliases there, which turned out to be >400, that was a lot of work, but my setup turned out to be quite a good documentation about what accounts i’ve set up during that period. some accounts were for platforms that do not exist any more, many for platforms that changed owner (mostly without notice) while some accounts turned out to be stuck like i cannot even delete them, because if i try, that platform freezes the account for “weird looking actions” looks like they just do not want to follow the laws.

    overall i think of maybe improving usability by platforms, (free)email providers and also newsletter senders, then creating some specs and try writing RFC style definitions and write a proof-of-concept to make “handshake” and email addresschanges possible and easy for endusers in large scale while achieving the same level of filterless spam protection that i have now.

    when i find the time to do it.


  • i once had to look at a firefall appliance cluster, (discovered, it could not do any failover in its current state but somehow the decider was ok with that) but when looking at its logs, i discovered an rsh and rcp access from an ip address that belonged to a military organisation from a different continent. i had to make it a security incident. later the vendor said that this was only the cluster internal routing (over the dedicated crosslink), used for synchronisation (the thing that did not work) and was only used by a separate routing table only for clustersync and that could never be used for real traffic. but why not simply use an ip that you “own” by yourself and PTR it with a hint about what this ip is used for? instead of customers scratching their head why military still uses rcp and rsh. i guess because no company reads firewall logs anyway XD

    someone elses ip? yes! becuase they’ll never find out !!1!

    i really appreciate that ipv6 has things like a dedicated documentation address range and that fc00:/7 is nicely short.


  • ipv6 in companies… ipv6 is not hard, but for internal networking no company (really) “needs” more than rfc1918 address space. thus any decision in that direction is always “less” needed than any bonus for (da)magement personnel is crucial for the whole companies survival…

    for companies services to be reachable from outside/ipv6 mostly “only” the loadbalancers/revproxies etc need to be ipv6 ready but … this i.e. also produces logs that possibly break decades old regexes that no one understands any more (as the good engineers left due to too many boni payed to damagement personnel) while other access/deny rules that could break or worse let through where they should block (remember that 192.168. could the local part of ipv6 IF sone genious used a matching mech that treats the dot “.” as a wildcard as overpayed damagement personnel made them rush too fast), could be hidden “somewhere”. altogether technical debt is a huge blocker for everything, especially company growth, and if no customer “demands” ipv6, then it stays on the damagement personnels list as “fulfilling the whishes of engineers to keep them happy” instead of on the always deleted “cleaning up technical debt caused by damagement personnel” list.

    setting up firewalls for ipv6 is quite easy and if you go the finegrained “whitelisted or drop/block” approach from the beginning it might take a bit for ipv6 specials to be known to you, but the much bigger thing is IMHO the then current state of firewall rules. and who knows every existing rule? what rules should be removed already and must not be ported to ipv6? usually firewalls and their rules are a big mess due to … again too many boni payed to damagement personnel, hindering the company from the needed steps forward…

    ipv6 adoption is slow for reasons that are driving huge cars that in turn speed up other problems ;-|


  • maybe start with an adjustable setup:

    • rent a cheap vm, i got one for 1€/month (for the first year,cancel monthly) from ovh currently
    • setup 3 openvpn instances to redirect all routes through the tunnel, one with ipv4 only, one with ipv6 only and one with both
    • setup the client on your mobile phone and your laptop both with all three vpns to choose from
    • have the option to choose now and try out ipv6, standalone or dualstack depending on what vpn you switch on
    • use this setup to blame services that don’t support ipv6 yet or maybe are broken with dualstack 🤣
    • rise from under-the-stone (disabling ipv6 only) to in-sunlight (to a well-above-industry-standart-level !!! “quick” new network technologies adopting “genious”) 🤣
    • improve your openvpn setup from above to be reachable “by” ipv6 too if you haven’t done it from the beginning, done: reach the pro-level of the-late-adopter-noob-group

    (if you want, ask for config snippets)

    btw i prefer to wait for ipv8😁 before “demanding” ipv6 from services i use 🤣


  • and the ones finding apes on a planet just short ahead or into the beginning of those 10000 years might think “well lets teach them how to stack stones and let them call us gods for just showing some of our million years old and cheap replicated tech gadgets pewpew, how amusing! but now lets go on, this planet has water but way too much oxygen and also there is axial precession that would change weather over only few hundrets of thousands of years if not less, not the planet of choice for eternals like us, duh!”


  • Often children that are rescued are taken out immediataly and irrevocably for their security, this is done due to sometimes very realistic dangers to their life as well as to protect them from manipulation. Without such external help, a victim would have to do all alone what police in groups with lots of money sometimes struggle to accomplish. keeping kids safe (and that is true even when police does not have child abusers in their mids) is not always easy.

    They don’t have anywhere else to turn :(

    yes, i think that very often they have nowhere to turn to, and partly this is intentionally deployed by the abusers like cutting contacts with everyone that the child might be willing just to talk to so that some few words could reveal what really happens.

    Also by schools that report kids bad behaviour to parents (which in general is seen somewhere between unproblematic and good, but to the abused child, the school working hand in hand with the abuser, does not help with anything). But the hope to “leave forever once grown up” can help do the (mental) split (possibly there are other solutions like living in fantasy worlds or such or combinations) But leaving for real also has(!) to wait until the abusers are not officially “responsible” for the victim any more, otherwise gov could make sure that the situation gets even worse and this is a very realistic horrifying danger to the victim and regularily happens too. Having to wait means a child of i.e. 5 years may have to decide to wait until it is like 18 years old to actually be able to do the escape it so badly needs to develop its own life, this means it would have to decide to wait another 3times of its current lifetime/age just to securely be able to leave for real and start with developing its own life while the abusers have plenty of time to go on damaging the victims life, body, mind and soul. Also please be aware that countries exist where government is running (as in organising, financing and protecting from any justicial consequences) projects that involve getting hands on helpless kids, handing over those helpless kids to known previously convicted pedophile sex abusers (explicitly selected because(!) of the criminal record as a pedo sex abuser…), then protecting the abuser as well as the knowledge about the explicit handover “to a selected known child abuser” from the public knowledge while presenting “protecting the child” as the official reason for not making details public or even investigating how suizidal (i.e.) that kid actually is.

    That victims in general should seek help in such official child"care" facilities (which were the ones known to do the handover to the abusers) would not only be a slap in their face but could also might pose other serious threats to them. Already knowing a little bit how to handle and prevent worse abuses by that first abuser but beeing faced with a new unknown “parent” that is abusive too but maybe in other ways, is a huge risk and might get them in additional trouble just because they would have to start try protecting themselves but again with no knowledge about the new threat they are confronted with.

    “Officially” stopped (as in “a single one” of those child"care" offices has only stopped doing the handovers) projects tend to go on very long (just look how long we still have pirates on the seas despite the british crown and others took back those “letters of marques” once payd by a gov, a legalized crime will go on for centuries especially if the abusers happen to be protected by gov) From that stopped “handover helpless childs to convicted pedophile sex abusers” project (kentler “experiment”) up until now AFAIK not a single child has been rescued so far (thus the project continues with happy abusers and likely suicidal thinking victims)

    So in some lesser civilized countries (which usually thrive to call themselves the most civilized…) the official childcare much more looks like a real trap to face even more abuse.

    Some abusers build psycological traps for their victims like offering help but turn it into desaster then making the child (or even adults) responsible for any bad outcome (wich might as well be preparedly forged bad outcomes by the abusers. mind control bastards are in fact evil). Such experience could harm the victims overall acceptance of ‘help’ from anyone, effectively preventing offered true help from beeing accepted.

    Now say what to choose where an abused child “should” turn to “in general” and how the help has to be organised and offered to those children to actually help.

    Social workers often say that every abusive situation is very special while at the same times the schemes are often very similar.

    No matter what, the solution is never easy unless the abuser dies by a true accident or real health issues and luck lets the child find (luck no2) someone really trustworthy - no matter by which way. When thinking of humans and eternal life the point of abusers never dying is the one point where i would say if abusers could also live forever in case that humanity in general could, then it would be better humanity in general could not live forever.

    But also love IS part of human beeings, loving someone else makes us feel better and also heal a bit, pple say that sharing comes back twice and i think this is part of it. We humans do need to care for someone else or we get illminded, maybe feel the need of becoming richer and richer, more powerful and even more powerful every day, may it be in politics or in controlling other peoples lifes or minds effectively abusing them, becoming an abuser or such) that is loosing ground in our own minds and loosing real control over ones own life then sometimes raises the need to control others instead if that seems more easy or maybe more realistic or maybeveven pleasant, i don’t know. Maybe the love given by abused victims to their abusers is just that, keeping themselves sane, even if that sounds insane by itself, but given the circumstances sometimes could seem to be the smalles loss while loosing a whole life but just “not yet” every day :( which i see as a whole-life torture.

    Thats about the main parts of what i think why, not a single reason but a bunch of maybe’s one worse than the other.

    this is part 2 of 2


  • the “love” part is - as always - difficult to define. its a word widely abused by those who abuse in other ways anyway, while in non-abuse circumstances, “love” is kind of a word without clear definition. In some aspects this is very similar to love itself - as love has many ways and facets to it that can vary greatly - okay, but that possibly is only a thought fed by a lack of a more precise language and overall use of way too generic words.

    A young child that is abused might not have experienced love in its short lifetime, yet it might use the word it once heared in different context out of just trying to get word meanings - that is learning to speak - or trying to figure out what could stop the abuser from abusing it, while their abusers might personally use the word “love” instead of “abuse” because abusing others - for the abuser - might be the one thing which makes them feel something that most closely matches what others say about how love feels. For the kid, love then is a wierd word with very contradicting meaning, which in turn would be said to be so by nearly all adults, but mostly for other reasons. Please try to be more precise when talking about serious love questions about abusive contexts =) let me now do a step aside to the literally cold part of the world. One knows snow and ice, but i once read in a documentation that some culture in an icy region has 32 words for different types of ice and snow for their daily use and i assume that this happened due to the need of definition what type of snow to expect ‘over there’, or maybe “tomorrow” or in discussions where to settle or how to reach a site… that is having only one word that has to fit-them-all yet beeing so important and prone to be abused(abuse of the word here) it seems to me that the lack of words for defining a bit more precisely if it is loving like a (non-abusive) mother loving like a real friend loving sth like an enthusiast … could probably have a slightly bigger role in the overall problem than anticipated in general.

    but yes, the brain is programmable, you do it when learning to ride a bicycle. Social programming may work differently, but is also possible. See how many people are trained like apes to always shout how great their country is, how civilized etc they are, yet if you really look it, all the lies just stinc horribly and that so called civilisation is very far away from beeing civilised. yet all the programmed apes prodly shout the greatness does not even exist there, but maybe it exists in their dreams (only)…

    but now to answer the question with what i personally think:

    while the mind is still developing to actually come into existance, conciousness still is a rare visitor as it comes into play and drifts away again without having a way to make it stay, one has only few things randomly choosen that can be directly remembered and huge parts of time inbetween conscious moments which start with a fast-forward in time while the inbetween is like the memory of a bad dream, blurred, not in order etc, but yet is the actual reality consciousness then stepped into. Stepping in of not yet developed consciousness may also have an incontrollable timing of stepping in-and-out, making decisions very urgend to do before blurrtime starts again and consciousness stepsl out. While not having consciousness at hand alltime, one can - during conscious times - only act or even think so little until unconscious time of “instinc-only” starts again. Again in nonconcious time contra-abuse actions cannot be performed or even thought of. body screams in pain, making the abuser causing more pain to victim which causes body to scream more until finally passing out. however thinking how to get out is only available in moments when the currently developing consciousness actually steps in again which can be quite short and not so easy to predict when that happens or when it ends again.

    In later stages where consciousness - while not fully developed - at least is nearly alltime available -that is until passing out of course- actions can be adjusted to like not(!) crying in pain when waking up from passing out (while still beeing abused though) so to disrupt this specific downward spiral of screaming-is-punished-by-more-abuse.

    In later stages when beeing able to observe the little hints of psychological instabilities of the abusers and their “abuse triggers” a “profile” becomes visible -that is when the victim has sort of a years long running statistics about that broken abusers “personality” not because the victim wants to make statistics but because of intentionally forgetting things is just not yet available to the under-stress-developing personality / brain functions of the victim as same as also intentionally remembering things (in general or circumstances related) too is a not yet available brain function. Also some parts of a more developed brain hide horrible experiences from consciousnes while other parts try to reach the memories to not only complete development but also to maybe find solutions to get out of the danger by analyzing memories of what happened when and why, when did it stop and maybe what caused the stop so one can start to handle it somehow. So it all forms a rather horrible yet “luckily incomplete” statistics done under stressfull fight against oneself then later called maybe hust “experience” or trauma etc. while the victim should learn to cope and handle and develop its own body or brain functions or even personality, to prepare for life, it is >500% overload-occupied with learning to cope with the junkyard of the abusers “personality” to prevent the small quantum fluctuations in the inbalances of the abusers psycholigical radioactive mess to avoid at least passing out due to abuse. trying to prevent the abuse is then the only available way of trying to survive, which is also instinct driven and surviving is n1 priority of the child, that is if course unless the child develops suicidal thoughts as a result of abuse. If and only if the victim somehow survives this mentally and becomes capable of doing the splits (mind, not sports) it is then eventually able to try to analyse how it could be possible and plan ahead solving the problem by maybe leaving forever or maybe finding other solutions, beeing on a constant lookout for what might bring security instead of learning to live or enjoying life let alone build up his life. Children don’t know what possibilities society in general offers or the risks child"care" offices pose to them (neither the other way around). They only rely on that little they know which is only their own experience and the “experience” of all ancestors combined and inherited in “instincts”, which are both unreliable in such cicrumstances: instincts are sort of predictable by adults and often abused by abusers thus bad to rely on in an abusive context when still a child. The own experience is still very little, likely poisoned by abusers and logic (brain instinct?) also needs all relevant variables to make good decisions while the lack of experience causes a lack of knowing what variables would be relevant or do exist at all also again likely beeing poisoned by abusers. Decisions are made out of the visible(!) possibilities which are likely also intentionally reduced overall by abusers for this very reason maybe by cutting the cholds connections to others, telling the child that those neigbours were very evil persons etc.

    Some types of abusers intentionally destroy their victims believe in themselves. this makes it very hard or impossible for the victim to get out on his own, sometimes the victims mind may even start to think (what narcisists heavily work on to achieve) that the current abusive situation was the best possible outcome of their life, which then stops the “want” of leaving the abusive context as result of the psycoligical trap the abuser intentionally layed.

    Also leaving abusive circumstances always is risky, and one should be thoughtful about risky decisions in general, right? Obviously abusers already are ok with substancially harming the victims body, mind, life and soul. Also they usually fear to face consequences (not sociopath or psychopath they don’t fear consequences), some would rather completely destroy the life of their victim than facing the consequences of their actions. Narcisists would probably make the friends of the victim believe the narcisist was the victim and the victim was the offender, deliberately destroying all friendships A sociopath would probalby cause unimaginable damages of any type to the victim not preventing even damage to himself, while a psychopath would maybe kill the victim for any reason including removal of evidences. Considering all of this does not make “leaving” abusive situations an easygoing task but a decision that can possibly and realistically end very horrible. Additionally victims might fear to get similar punishments from others when telling the truth so in fear might not even tell the truth when help would really be at the tip of their nose. Then saying weird things could be such an instinct kicking in and maybe not(!) a thoughtful decision. Saying such things (out of trained fear) that protect the abuser or even add insult to the victim itself (as trained by the abuser that the victim always has to insult and calling itself beeing responsible for all bad things or face even worse punishing) might also affect the victim to start to believe really untrue thing about itself. Most people struggle to get out if a single devils-circle, but what if a second circle was added?

    this is part 1…


  • there was a study saying that there is not “the” best way of learning, but it is best to combine multiple ways, like with an app, by book, listening to audio only (i listened to radio stations via internet and got some exercise for free), a bit of talking, visiting a country that only speaks that language and so on. trying everything a bit in parallel.

    that is because of our brain learns better when given more different types of “connections” to learn.

    i started with duolingo (website only, not the app and only the free parts) 4 years ago and now i speak quite fluently. but i also partly read a book about grammatics, visited a spanish speaking country (more than once), viewed movies with only subtitle in my language and did lots of phone calls in spanish only.

    my advice is:

    look at free apps, whatever pleases you, take chances, listen to the sound (movies, radio), try to speak, and read easy books or go through exercise books.

    duolingo is good to keep on going while not really motivated as the shortest thing that counts are really only minutes and one can choose to do something that is already easy. this way at least continuation is kept even if pace is down for a while. and it is much easier to go on with pace when not having really stopped.


  • i am happy to have a raspberry pi setup connected to a VLAN switch, internet is behind a modem (like bridged mode) connected with ethernet to one switchport while the raspi routes everything through one tagged physical GB switchport. the setup works fine with two raspi’s and failover without tcp disconnections during an actual failover, only few seconds delay when that happens, so basically voip calls recover after seconds, streaming is not affected, while in a game a second off might be too much already, however as such hardware failures happen rarely, i am running only one of them anyway.

    for firewall i am using shorewall, while for some special routing i also use unbound dns resolver (one can easily configure static results for any record) and haproxy with sni inspection for specific https routing for the rather specialized setup i have.

    my wifi is done by an openwrt but i only use it for having separate wifis bridged to their own vlans.

    thus this setup allows for multi-zone networks at home like a wifi for visitors with daily changing passwords and another fror chromecast or home automation, each with their own rules, hardware redundancy, special tweaking, everything that runs on gnu/linux is possible including pihole, wireguard, ddns solutions, traffic statistics, traffic shaping/QOS, traffic dumps or even SSL interception if you really want to import your own CA into your phone and see what data your phones apps (those that don’t use certificate pinning) are transfering when calling home, and much more.

    however regarding ddns it sometimes feels more safe and reliable to have a somehow reserved IP that would not change. some providers offer rather cheap tunnels for this purpose. i once had a free (ipv6) tunnel at hurricane electronic (besides another one for IPv4) but now i use VMs in data centers.

    i do not see any ready product to be that flexible. however to me the best ready router system seems to be openwrt, you are not bound to a hardware vendor, get security updates longer than with any commercial product, can 1:1 copy your config to a new device even if the hardware changes and has the possibility to add packages with special features to it.

    “openwrt” is IMHO the most flexible ready solution for longtime use. same as “pfsense” is also very worth looking at and has some similarities to openwrt while beeing different.


  • smb@lemmy.mltoMemes@lemmy.mlWell shit it took me a minute.
    link
    fedilink
    English
    arrow-up
    4
    ·
    6 months ago

    ich you have adhd and asperger or better, you might end up beeing trained by yourself for ignoring google’s, microsoft’s or other f’uped up so called “autocorrection” and ‘automatically’ overlook single mismatching words but recognize the sentence as a whole without actually reading it word by word. some can read entire pages with a single look on it without focusing on a a specific region or i.e. the center while still beeing able to later rephrase the content of the entire page.

    1up for all with special (dis-)Abilities!!


  • i have to admit, that my point ‘just don’t do it’ in reality does not garantee to prevent any trouble. it still is possible to be sued for things someone else did.

    also one suggestion to think about:

    if the seller just sprays some random changes over a book for every sold version, one would have differences in “every” sold version to every other sold version. by blindly changing those parts to something else you could reveal which exact two/three versions you had for diffing.

    UPDATE: someone else here had the same thought a bit earlier…

    my suggestion to not do it stays the same ;-)

    it could be interesting to figure things out how they work, what could be done to prevent or circumvent such prevention, but actually doing it seems risky no matter what.


  • have a look on “snowdrop” (search together with “steganography”), its basically the opposite of what you want, but worth mentioning here. watermarks could be placed into whitespace (not limited to actual spaces or linebreaks, intentionally changed usage of paragraphs, tabs or even page boundaries could possibly be detected after scanning andeven after OCR. IMHO snowdrop uses -depending on choosen operation mode- small errors like misspelled words, commata etc but also has a mode that comes along with fine grammar and without misspelled words…

    how do you make sure that by diff’ing two versions you do cover "everything’ that has been deliberately placed into both documents but share literally the same informations?

    lets say you bought two books at two different stores with two different watermarks. if the watermark contains the date and time of the purchase and the only difference of this were the minutes because you bought them within the same hour, the remaining watermark would point to all buyers that bought exactly this book in this hour - worldwide. but still it could be “very” precise depending on all other(!) buyers, if they exist at all within that timeframe. what if the watermark includes unix epoch? then the part which is the same in both watermarks would not be bound by hours, but by seconds, 10seconds, 100seconds etc.

    and you could not know if there were other watermarks hidden that just happened to be the same for your two (three.?) purchases (same country, continent, payment method, credit card holder name, name of internet provider used during purchase, browser used etc.) it fully depends on the creator of the watermark what would be included and what not. if you happem to know all that (without any possibleexemptions) you might be on the safe side, but if not…

    my general suggestion here is:

    • if you want to be sure to not getting into trouble, then just don’t do it.
    • if that book is too expensive compared to its content, just not buying it possibly also helps the market to fix the problem.
    • save that time and instead help those who already fight for a better world.
    • search already licence free books (or such as “cc” licensed) and promote those instead, help improving free resources like openstreetmap, wiki* but do not publish licence-poisoned content there, wtite it yourself, alway.
    • write your own book and publish it free.

    just to mention… the “safe” side sometimes seems limited but maybe is actually not, if you really look at it.


  • my 2 cents just in case…:

    A raid6 is not a replacement for backup ;-) i use rdiff-backup which is easy to use, stores only one full backup and all increments are to the past while it is only possible to delete the oldest increments (afaik no “merging”) i never needed anything else. The backup should be one off-site and another one offline to be synced once in a while manually. Make complete dumps (including triggers, etc) from databases before doing the backup ;-)

    i like to have a recreateable server setup, like setting it up manually, then putting everything i did into ansilbe, try to recreate a “spare” server using ansible and the backup, test everything and you can be sure you also have “documented” your setup to a good degree.

    for hardware i do not have much assumptions about performance (until it hits me), but an always-running in-house server should better safe power (i learned this the costly way). it is possible to turn cpu’s off and run only on one cpu with only a reduced freq in times without performance needs, that could help a bit, at least it would feel good to do so while turning cpu’s on again + set higher frequency is quick and can be easily scripted.

    hard drives: make sure you buy 24/7, they are usually way more hassle-free than the consumer grades and likely “only” cost double the price. i would always place the system on SSD but always as raid1 (not raid6), while the “other” could then maybe be a magnetic one set to write-mostly.

    as i do not buy “server” hardware for my home server, i always buy the components twice when i change something, so that i would have the spare parts ready at hand when i need it. running a server for 5+ years often ends up in not beeing able to buy the same again, and then you have to first search what you want, order, test, maybe send back as it might not fit… instable memory? mainboard released smoke signs? with spare parts at hand, a matter of minutes! only thing i am missing with my consumer grade home server hardware is ecc ram :-/

    for cooling i like to use a 12cm fan and only power it with 5v (instead of the 12v it wants) so that it runs smoothly slow and nearly as silent as a passive only cooling, but heat does not build up in the summer. do not forget to clean the dust once in a while… i never had a 5v powered 12V-12cm fan that had any problems with the bearings and i think one of them ran for over a decade. i think the 12volt fans last longer with 5v, but no warranty from me ;-)

    even with headless i like to have a quick way at hand to get to a console in case of network might not be working. i once used a serial cable and my notebook, then a small monitor/keyboard, now i use pikvm and could look to my servers physical console from my mobile phone (but would need ssl client certificate and TOTP to do so) but this involves network, i know XD

    you likely want smart monitoring and once in a while run memtest.

    for servers i also like to have some monitoring that could push a message to my phone somehow for some foreseeable conditions that i would like to handle manually.

    debsums, logcheck logwatch and fail2ban are also worth looking at depending on what you want.

    also after updating packages, have a look at lsof | egrep “DEL|deleted” to see what programs need a simple restart to really use libraries that have been updated. so reboots only for newer kernels.

    ok this is more than 2 cents, maybe 5. never mind

    hope these ideas help a bit


  • i disliked an ad in tv before 2000 and decided to not buy the deodorant stick then because of that. like 10 to 15 years later i accidently bought the product- long forgotten that this was the one with that bad ad and actually liked the product and bought it regulary for some time (then remembering how bad that ad was, but okay the product was good actually). that was until they decided to put more plastics into packaging as well as less content into it (same price for package) just to make it more costly for me thus more profitable for them, whilst producing more litter and destroying more resources just for profit. The higher price would not have been too bad, but creating more litter for more profit made me then search a better product. then found a bio product with all natural contents, very few plastic packaging and even less pricy.

    That ad made me NOT buy it. So that was the worst ad i’ve ever seen in two ways: it reduced my willingness to buy their product to far below zero lasting for a decade and i did not even want to try the product that i later found to be actually good, so worst case for the vendor AND the customer.

    However that product later also had the “best” Price raise (by less content) for me ever as that made me search and find the then newly existing even better and more natural, less pricy product of their competitor.

    Maybe good CEOs are rare.