this post was submitted on 23 Aug 2024
449 points (100.0% liked)
196
667 readers
60 users here now
Be sure to follow the rule before you head out.
Rule: You must post before you leave.
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Data corruption/re-write. Installed a bunch of psychedelic programs I bought on the black market and restructured my OS from the kernel level. Worth it because shutdown/sleep signals were being ignored as well as CPU buffer trashing issues (resulting in system crashes, hangups, etc.). Works a lot better now, but handshakes are difficult because my non-conforming configuration isn't recognized by the majority of the network. Still very much worth it though as I find complete network access isn't exactly necessary.
(╭☞´ิ∀´ิ)╭☞
This could be a case of nodes running outdated software, the current standard protocols can handle any unknown configuration just fine. These are a source of a lot of holes and vulnerabilities that can pose a serious risk, they should be updated as soon as possible. If you have to keep outdated systems in your network e.g. running on legacy hardware, or make the ocasional connection, you'll have to monitor them and isolate them from your critical infrastructure, at least with a good firewall and a strict configuration when possible.