[-] biptoot@lemmy.today 1 points 6 months ago

Usually labeled as P series.

This is how I do my home system, Dell r710xd I believe. I bought it used via craigslist and I think it came from the local power company. In the States we have government surplus sites that have stuff cheap.

You can mount a rack mount system vertically on the side of the wall, hanging down with a couple of shelf brackets.

323
[-] biptoot@lemmy.today 2 points 7 months ago

If it's #2, I tend to scoop (with a plastic dog bag, I don't use one of those ) pretty much right away, tie it off & put it in the trash. I'm with @iamericandre@lemmy.world, changing to wood cut down on smell quite a bit. I change it out once a week now.

[-] biptoot@lemmy.today 3 points 7 months ago

There's wood pellets in there now :) Big fan of wood pellets since 2020!

87
New litterbox day (lemmy.today)
submitted 7 months ago* (last edited 7 months ago) by biptoot@lemmy.today to c/cat@lemmy.world

If you're getting a new litter box and have access to a Cricut - then you, too can have a ribbon-cutting ceremony for your brand new Performing Arts Center

[-] biptoot@lemmy.today 11 points 7 months ago* (last edited 7 months ago)

Ayy, nice work getting started down the selfhosting route! Start by remembering that security is a maturity process. To find out if you're doing the right things at the right time, ask yourself:

  • Do I know it needs to be done
  • Have I done enough (this day, week, etc)
  • Do I have it to give

If you're just one person and it's a self-hosted home setup, remember you can't patch all the things all at once. Asking yourself regularly if you maturing your environment over time is essential. Do a little work each week and you'll make good progress.

When I think of security, I think of a few things

Authentication & Access - each system should have just enough accounts with just enough permissions to get work done. Change default passwords. Make them long and unique. Use MFA whenever possible (often impractical for self-hosted; cut yourself slack when this is the case!). A note on logging - if you can, while you're doing this homework, check how long it saves logs. Shoot for keeping logs longer if possible; I like 30 days, but you might want more. Also make sure you have a time server, or at least that you're getting accurate time stamps. If something weird happens and you're investigating, having timestamps on logs that line up and make sense helps you recreate what happened, so you can decide if you need to wipe something and reload it.

Patching - automated scanning of your stuff for vulns would be fantastic if you're interested in going that route, but a Saturday morning checklist to run updates on everything works too.

Attack Surface Management - if you're not sure you're exposed, scanning externally can be a big help. I have a Racknerd server ($40/yr, it's amazing) in San Diego and I periodically run scans of my home network to see what's forwarded. This is using nmap, although I could also use a free version of Nessus Essentials on there. This gives me an idea of what I look like from outside my network.

Inventory - do you know what you have, and what's it doing? Even a pencil drawing of your network, IP addresses, and services they have can come in super handy. While big orgs have an index of critical data and where it's stored, just knowing what containers are running on which VM or physical box can help if stuff goes sideways. I redraw mine periodically, yes it's hand drawn because it's fast and does the job lol. Do what works for you, though, to keep an inventory of your stuff. You need to know what you have, what it does, and where it's supposed to be going.

biptoot

joined 7 months ago