• 1 Post
  • 548 Comments
Joined 2 years ago
cake
Cake day: August 8th, 2023

help-circle
  • It’s like a virtual license file for a game. It’s basically the same system as before but now you can trade them with people on your friends lists.

    People with kids: be sure to set parental controls on this before your kids are bullied into sending away all the games you bought them

    WDIT: I see the article is not actually about the virtual key cards but the physical ones. This is a game cert without the game on it, just the license file. You still have to download it.

    Honestly I think that fucking sucks because they can just take it away from you.


  • Couple things there.

    There are Virtual Game Cards, purchased and downloaded digitally from the eShop. These can now be traded, sold, gifted, loaned, etc. to other friends, which was not previously possible. (This could possibly require an NSO subscription, but I’m not clear if that’s true at all.)

    There are physical game cartridges, which contain the actual game on them, and (from what I’ve heard) most games will be distributed this way.

    Then, there are also physical carts that contain only the virtual game license file, thus that you have to possess the physical cart in order to download or play the game. Apparently, there are Switch 1 games like this already, but they are rare.

    With the introduction of Virtual Game Cards, it is no longer possible (even on Switch 1) to play more than one copy of a game online at the same time, even with a min NSO Family subscription.

















  • I had a double NAT setup like that. Run a firewall like OPNSense as a Proxmox VM, and give it a WAN interface on the ISP router’s IP range; then run everything else on a different subnet, using OPNSense as the gateway. On the ISP router, put OPNSense’s WAN IP in the DMZ. Then, do all your hardening using OPNSense’s firewall rules. Bonus points for setting up a VLAN on a physical switch to isolate the connection.

    The ISP router will send everything to OPNSense’s WAN IP, and it will basically bypass the whole double NAT situation.



  • That is absolutely not the reason ANYONE recommends it, unless you are a complete noob and entirely unfamiliar with computer security at all, and are just pulling assumptions out of your ass. Don’t fucking do that, don’t post with confidence when you’re just making shit up because you think you know better. Because you don’t.

    If there is a vulnerability in SSH (and it’s happened before), attackers could use that to get into root directly, quickly, and easily. It’s an instant own.

    If root login is disabled, it’s way less likely that whatever bug it is ALSO allows them to bypass root login being disabled. Now they have to yeah, find a user account, compromise that, try to key log or session hijack or whatever they set up, be successful, and elevate to root. That’s WAY more work, way more time to detect, to install patches.

    If the effort is higher, then this kind of attack isn’t going to be used to own small fry servers; it’s only be worth it for bigger targets, even if they’re more well protected.

    If you leave root enabled, you’re already burnt. You’re already a bot in the DDoS network.

    And why? You couldn’t be bothered to type one extra command in your terminal? One extra word at the start of each command?

    Sorry bitch, eat your fucking vegetables