- 24 Posts
- 37 Comments
Ponziani@sh.itjust.worksto
Kombucha Brewing@sh.itjust.works•First Drinkable Booch Batch, Raspberry + MintEnglish
2·9 months agoGood job
Ponziani@sh.itjust.worksto
Kombucha Brewing@sh.itjust.works•Fresh Picked MullberryEnglish
1·10 months agoHave you considered force carbonating? Its always consistent.
Ponziani@sh.itjust.worksto
Kombucha Brewing@sh.itjust.works•Fresh Picked MullberryEnglish
1·10 months agoGreat looking carbonation
That sounds yummy and I bet it would come out a beautiful color
I’ll be watching for your post!
Get the pulp and make it! It’s really unique
Ponziani@sh.itjust.worksOPto
linux4noobs@programming.dev•Using Wireshark to verify encryption
2·2 years agoOk thank you!
Ponziani@sh.itjust.worksOPto
linux4noobs@programming.dev•Using Wireshark to verify encryption
2·2 years agoIm a little knowledgeable with this stuff but i do not know how to see the “handshake” itself, but maybe this is synonymous with what i am doing:
Right click any of the packets (TCP or SSH) > Follow > TCP stream
From there i can see some info about the ssh protocol and connection, as well as the 2 devices communicating (Operating systems used) followed by random gibberish which is the encrypted data.
When I analyze the TCP packet “frames”, they contain data including the motherboard manufacturer, but packets themselves look like its just gibberish.
Thanks by the way for trying to help me :)
Ponziani@sh.itjust.worksOPto
linux4noobs@programming.dev•Using Wireshark to verify encryption
2·2 years agoIt looks like everything is in 1 stream, maybe that answers your question? I am capturing traffic only on port 22 briefly while the rsync is running to look at the packets
Ponziani@sh.itjust.worksOPto
Privacy Guides@lemmy.one•Any way to join Zoom with any privacy at allEnglish
3·2 years agoI figured its another black box hell like a google meets or something similar where itll try to grab any detail, data or info about what i am connecting with, and also how trustworthy the E2E encryption is if its proprietary
Ponziani@sh.itjust.worksOPto
linux4noobs@programming.dev•Make sudo command not need sudo?
2·2 years agoThank you both
Ponziani@sh.itjust.worksOPto
linux4noobs@programming.dev•Make sudo command not need sudo?
2·2 years agoAwesome now I understand what you and the other commenter were talking about with aliasing. Well this works perfect without the alias, many thanks
Ponziani@sh.itjust.worksOPto
linux4noobs@programming.dev•Make sudo command not need sudo?
1·2 years agoWell my other comement saying this is exactly what i need did not get posted as a reply to your comment, my mistake. I followed rhe example for “/usr/bin/wg/” intending to be able to use
wg showbut it still requires sudo. I tried rebooting and nothing changed, any ideas? I did
type -a wgto get the command location for the sudoer file.
Ponziani@sh.itjust.worksOPto
linux4noobs@programming.dev•Make sudo command not need sudo?
1·2 years agoThank you
Ponziani@sh.itjust.worksOPto
linux4noobs@programming.dev•Make sudo command not need sudo?
1·2 years agoThis does seem to be exactly what i am looking for. I implemented this and tested it and the command still isn’t working yet but i will keep troubleshooting, its probably a silly quirk on my end. Thank you very much!
Thank you for the info! This is very helpful to me.
But the router must forward the port to allow the VPN to be utilized , meaning that port being forwarded can be scanned/detected i thought?
This is the first that I have heard about setting the SSH port to only accept connections from the VPN, is there a term or something I can search about this online? Or is this basically just allowing port 22 open on a device and not forwarding the port on the router as when a different device tunnels into the same network through the VPN it can already talk to the first device?
But wouldn’t the port being open alert anyone who looks for that? Network security is not my specialty but I believe I have read that people can ping/scan ip addresses easily and quickly to determine if any ports are open / forwarded, so if Wireguard was used or any VPN software, they could pick up on that as an attack vector?

Looks awesome