• 0 Posts
  • 48 Comments
Joined 1 year ago
cake
Cake day: April 16th, 2024

help-circle


  • I was gonna charge the guy 500 dollars to rename thirty thousand images to match the directory names. Since the guy had switched cameras several times it would have involved more than one simple script but I wasn’t being paid for the script. I was being paid to do the job. Except my bash prompt scared the guy. The truth of it is he used me to leverage the company that specialized in data recovery into lowering their price down to a still absurd but much smaller amount.
    Its not the first time I’ve seen it but when they do something like that to me they burn a bridge.

    A related scam is charging absurd amount to convert and catalog microfiche to images or PDF’s. Granted a machine to do this quickly and efficiently is in the 10 to 20 grand range. The process is boring and repetitious and in no way worth the amount some companies want to charge.











  • Another thing you can do under certain circumstances which I’m sure someone on here will point out is depreciated is use TCP Wrappers. If you are only connecting to ssh from known IP addresses or IP address ranges then you can effectively block the rest of the world from accessing you. I used a combination of ipset list, fail2ban and tcp wrappers along with my firewall which like is also something old called iptables-persistent. I’ve also moved my ssh port up high and created several other fake ports that keep anyone port scanning my IP guessing.

    These days I have all ports closed except for my wireguard port and access all of my hosted services through it.