social.dk-libre.fr is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Search results for tag #network

AodeRelay boosted

[?]ZДP0ЖFCΞ2 » 🌐
@Zap0xfce2@troet.cafe

Wie man super einfach seine eigene externe IP ermittelt: ifconfig.me oder via shell mit: curl ifconfig.me

    [?]Lien Rag » 🌐
    @lienrag@mastodon.tedomum.net

    Tiens depuis ce matin j'ai un comportement spécial sur le TorBrowser, après avoir ouvert plusieurs onglets en succession rapide : y'en a aucun qui se charge, et l'onglet "réseau" de l'inspecteur me dit "aucune requête" quand je tente de recharger une page ou d'en ouvrir un autre...

    et peut-être ?

      [?]gyptazy » 🌐
      @gyptazy@gyptazy.com

      Psssst! Don't tell anyone but more and more POPs are coming up for my next free service! It's not only for @BoxyBSD@bsd.cafe


      gyptazy router around the world - building BoxyBSD and...? :)

      Alt...gyptazy router around the world - building BoxyBSD and...? :)

        [?]Puppet Community Team :fedi: » 🌐
        @puppet@fosstodon.org

        In this demo, see how to use Visual Studio Code, GitHub Copilot, and the Puppet MCP Server to generate an EdgeOps automation task for your network devices!

        This video shows you how to setup your mcp.json file and then prompt for a task that configures NTP servers on a switch using your device's configuration info.

        youtube.com/watch?v=5ckSGYMXC5o

          [?]Paco Ho Ho Hope 🎄 » 🌐
          @paco@infosec.exchange

          My router interface traffic graphs are pretty useless. Every night around 2:00am, various things run backups. Some do backups across the network, others copy out to an off-site location. But the bottom line is that if I look at my network interface graphs, that massive spike every night ruins the Y axis.

          These are the daily, weekly, and monthly graphs. And the fact that daily hits around 450M, but ordinary hours are like 8-10M, it means I can't see the rest of the graph. It means that I can't spot changes or interesting things.

          I'm not really sure how to do better. (It's amateur hour over here)

          A daily graph with hours on the X axis and Mb per second on the Y axis. In and out are blue and green, but they're basically indistinguishable from the X axis line. From 2:00 to almost 4:00 there's a huge spike up to 450 Mb per second.

          Alt...A daily graph with hours on the X axis and Mb per second on the Y axis. In and out are blue and green, but they're basically indistinguishable from the X axis line. From 2:00 to almost 4:00 there's a huge spike up to 450 Mb per second.

          A weekly graph with days of the week on the X axis and Mb per second on the Y axis. In and out are blue and green, but they're basically indistinguishable from the X axis line. Each day there's this sharp green spike up to 450 Mb per second.

          Alt...A weekly graph with days of the week on the X axis and Mb per second on the Y axis. In and out are blue and green, but they're basically indistinguishable from the X axis line. Each day there's this sharp green spike up to 450 Mb per second.

          A monthly graph with weeks on the X axis and Mb per second on the Y axis. In and out are blue and green, but they're basically indistinguishable from the X axis line. There are 5 sharp spikes up to 450 Mb per second in each week.

          Alt...A monthly graph with weeks on the X axis and Mb per second on the Y axis. In and out are blue and green, but they're basically indistinguishable from the X axis line. There are 5 sharp spikes up to 450 Mb per second in each week.

            [?]Alexandre Dulaunoy » 🌐
            @adulau@infosec.exchange

            We’ve published new research from the EU co-funded project NGSOTI: “Learning from large-scale IPv4 blackhole: Behavioral analysis of SNMP traffic”.

            Over a 12-month period (Nov 2024–Oct 2025), our network telescope captured ~634 million unsolicited SNMP queries from more than 153,000 unique IPv4 sources scanning an unused /18 block.

            The origins of the traffic are globally distributed, with notable concentrations from Indonesia, China, the United States, Germany, Chile and others, as well as a few outliers generating unusually high volumes. A significant portion of the scanning activity can also be attributed to infrastructure belonging to commercial threat-intelligence and scanning companies, providing useful context on what constitutes “expected” background noise.

            The analysis covers SNMP version usage (v1/v2c overwhelmingly dominant, minimal v3), community-string patterns (default, weak, and undocumented strings), and OIDs that point to which device vendors are most scanned.

            This dataset provides insight into real-world reconnaissance trends targeting SNMP-capable infrastructure, helping defenders better understand background noise and scanning behaviours.

            🔗 Full report: d4-project.org/2025/11/27/Lear

            🔗 PDF version: d4-project.org/assets/behavior

            Co-funded by European Cybersecurity Competence Centre (ECCC) under the NGSOTI project.

              AodeRelay boosted

              [?]Marcel SIneM(S)US » 🌐
              @simsus@social.tchncs.de

              Für diesen Artikel muss man sich Zeit nehmen 😜

              heise+ | Wie man einen als -Router für mehrere Netze konfiguriert | c't Magazin heise.de/ratgeber/Wie-man-eine :tux:

                [?]Morten Linderud » 🌐
                @Foxboron@chaos.social

                Do people generally use ufw or firewalld to manage firewalls? Or are people just writing nftables rules directly?

                  [?]:trone: Shalien » 🌐
                  @shalien@mastodon.projetretro.io

                  So, I discovered that it's customary to give an on so here I am.

                  I'm @shalien , a computer enthusiast as as .

                  Disappointed with Twitter / X , I resurrected my instance and here I am.

                  I hope to discover something else, something healthier and more relaxing than the permanent chaos of Twitter.

                  Looking forward to seeing you in the !

                    Vincent 🐡 boosted

                    [?]Laurent Cheylus » 🌐
                    @lcheylus@bsd.network

                    The Banana Pi BPI-R4 Pro is a new Router Board based on MediaTek MT7988A SoC (quad-core Arm Corex-A73 processor), 2x 10GbE SFP+, 2x 10GbE RJ45, 4x 2.5 Gbps Ethernet RJ45 ports, 8 GB RAM, 2x M.2 sockets for NVMe SSD cnx-software.com/2025/10/20/ba

                      [?]Elyse M Grasso » 🌐
                      @ElyseMGrasso@wandering.shop

                      Is anyone else finding that their network connections are VERY slow this week? I'm trying to decide whether the slowness and browser timeouts are still the aftermath of the big outage (so likely to improve) or an effect of my awful internet connection (so I need to yell at someone at my ISP.

                      DNS is probably involved, since the worst problems seem to happen when I try to follow links to servers I'm not currently accessing.

                      Does anyone have root DNS servers they favor?

                        [?]anarcat » 🌐
                        @Anarcat@kolektiva.social

                        [?]Kushal Das :python: :tor: 🇸🇪 » 🌐
                        @kushal@toots.dgplug.org

                        Anyone here knows Nicholas Andre, the teacher?

                          [?]Teddy / Domingo (🇨🇵/🇬🇧) » 🌐
                          @TeddyTheBest@framapiaf.org

                          5 ways the command can help keep your secure. Nmap is an essential tool for anyone who's serious about network . It can be installed on any Linux .
                          zdnet.com/article/5-ways-the-l

                            [?]VictoriaMetrics » 🌐
                            @victoriametrics@mastodon.social

                            🔍 This video explores the challenges of using network tools like in today’s encrypted environments.
                            In the past, packet sniffing was simpler because most traffic was . Tools could easily inspect everything from IP addresses to the full content of communications.

                              [?]Laurent Cheylus » 🌐
                              @lcheylus@bsd.network

                              A set of patches from Google engineer Eric Dumazet, merged via the networking pull request for the Linux 6.18 will help servers better cope with distributed denial of service DDoS attacks phoronix.com/news/Linux-6.18-D

                                [?]Teddy / Domingo (🇨🇵/🇬🇧) » 🌐
                                @TeddyTheBest@framapiaf.org

                                's great - but for more complete protection, you need to add this. When you use the Tor Browser, the only traffic that's being masked is via the web browser. If you want more traffic anonymized and encrypted, you need to take a different approach.
                                zdnet.com/article/tor-browsers

                                  Marcos Dione boosted

                                  [?]Nonilex » 🌐
                                  @Nonilex@masto.ai

                                  Cache of Devices Capable of Crashing Cell Is Found Near

                                  The discovered more than 100,000 SIM cards & 300 servers, which could disable towers or be used to conduct .


                                  nytimes.com/2025/09/23/us/poli

                                    [?]Nonilex » 🌐
                                    @Nonilex@masto.ai

                                    The found & seized an illicit of sophisticated equipment in the New York region that was capable of shutting down the network as foreign leaders prepared to gather nearby for the annual , the agency announced on Tuesday.

                                    Officials said the anonymous communications network, which included >100k SIM cards & 300 servers, could interfere with response services & could be used to conduct encrypted .

                                      [?]Nonilex » 🌐
                                      @Nonilex@masto.ai

                                      One official said the network was capable of sending 30 million text messages per minute, anonymously. The official said the agency had never before seen such an extensive operation.

                                      There is no specific information that the , now dismantled, posed a threat to the conference itself, officials said, speaking on the condition of anonymity to discuss an ongoing investigation. The agency leads the for the meetings this week.

                                        [?]joany » 🌐
                                        @joany@mastodon.bsd.cafe

                                        Any suggestions for a decent 2.5Gb switch in the EU.
                                        Managed would be nice, but it's not a must

                                          3 ★ 0 ↺

                                          [?]oldsysops » 🌐
                                          @oldsysops@social.dk-libre.fr

                                          note pour plus tard : ne pas rater ses copier coller quand on bloque un subnet /24... parce qu'un /2 ca fait tout de suite plus de monde...

                                            [?]hubertf » 🌐
                                            @hubertf@mastodon.social

                                            Borrowed from LinkedIn`s The Cyber Security Hub™

                                              [?]Bruno Adelé » 🌐
                                              @jesuislibre@mamot.fr

                                              MikroTik ne gère pas le DNS failover… Et si je simulais ça dans ?

                                              Je bosse sur une solution avec pseudo failover via DNS forwarding pour mon homelab

                                              Vous seriez intéressé que je documente ça ?

                                                [?]Bruno Adelé » 🌐
                                                @jesuislibre@mamot.fr

                                                🚀 Mettre en place un DNS Failover avec MikroTik

                                                Vous voulez améliorer la résilience de votre réseau ? Dans cet article, je vous montre comment faire du DNS Failover avec MikroTik et containerlab.

                                                ➡️ blog.jesuislibre.org/homelab-d