Avatar

bushvin

bushvin@pathfinder.social
Joined
2 posts • 25 comments

Metalhead, self-proclaimed Open Source adept and beard aficionado with a knack for technology.
Notorious lurker. He/Him

Direct message

Originally this campaign started off as a DnD 5e campaign, but due to WotC’s kneejerk I had a look at pf2e rules and was completely blown away by its cohesiveness and completeness.

But… Tyranny Of Dragons, where the heroes need to battle the cult of the dragon in order to stop them to summon Tiamat. We’re almost half way and having a blast!

permalink
report
reply

Thanks for that link, I was actually looking for that!

permalink
report
parent
reply

Welcome to the wonderful Linux world!

I do not know Gallium, so I have very little to say about that.

Windows software can be run using Wine. It is a Windows emulator, and there is no guarantee it will work with CSP. Alternatively you could check for alternatives that run natively on Linux (Gallium). Krita? Inkscape?

Make no mistake, your journey into Linux will be riddled with obstacles, as it is not close to Windows at all. Inform yourself, learn, ask questions. But most of all: have fun!

permalink
report
reply

I wouldn’t recommend using anti-virus software. It usually creates a lot more overhead, plus it usually mimics existing solutions already in linux. The only viruses I have ever caught using an anti-virus software on Linux are the test viruses to see if all is working fine.

Anyway, here’s my 20+ enterprise experience recommendations with Linux :

  • enable secure boot: will disable launching non-signed kernel modules (prevent root kits)
  • enable firewall: and only allow ports you really need.
  • SELinux: it is getting better, and it will prevent processes to access resources out of their scope. It can be problematic if you don’t know it (and it is complex to understand). But if it doesn’t hinder you, don’t touch it. I do not know AppArmor, but it is supposed to be similar.
  • disable root over ssh: or only allow ssh keys, or disable ssh altogether if you do not need it.
  • avoid using root: make sure you have a personal account set up with sudo rights to root WITH password.
  • only use trusted software: package managers like apt and rpm tend to have built in functionality to check the state and status of your installed software. Use trusted software repositories only. Often recommended by the distro maintainers. Stay away from use this script scripts unless you can read them and determine if they’re the real thing.

Adhering to these principles will get you a long way!

edit: added section about software sources courtesy of @dragnucs@lemmy.ml

permalink
report
reply

ebtables and iptables can be very complex. And I failed my 1st RHCE exam because of them. But once you learn, you will never unlearn, as they are quite beautifully crafted. You just need to get into the mindset of the people who wrote the tools…

Look into firewalld It has a rather simplified cli interface: firewall-cmd

The manpages will tell you a lot.

firewall-cmd —add-service=ssh Will open the ports for your ssh daemon until you reload your firewall or reboot your system firewall-cmd —permanent —add-service=ssh Will open the ssh ports until you remove them

firewall-cmd —list-all Will show you the current firewall config

permalink
report
parent
reply

A very good point I forgot! Only use trusted software repositories!

permalink
report
parent
reply

Yes, usually you configure your endpoint firewall to block incoming traffic, while allowing all outgoing.

Unless you’re in a very secure zone, like DMZ’s.

permalink
report
parent
reply

Look into restic, it doesn’t do exactly what you want, but it’s a very powerful backup server and standalone tool

edit typo

permalink
report
reply