mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.6K
active users

#remoteaccess

0 posts0 participants0 posts today

Thanks to the advanced double partitioning techniques in #Blosc2, our #Caterva2 package can serve small slices of big datasets (3.8 GB) through internet in less than the blink of an eye.

See how you can do that with the help of #JupyterLite in #Cat2Cloud using two different techniques:

1) Plain Python-Blosc2 library for quick and dirty access
2) Caterva2 Python client for a more heavy-duty and flexible operation

Try it out! 👉 cat2.cloud/demo/roots/@public/

USA: Erneut koordinierte Aktion gegen Nordkoreas Remote-Angestellte

Um die US-Sanktionen auszuhebeln, lässt Nordkorea Tausende IT-Fachkräfte aus der Ferne für westliche Firmen arbeiten. Die USA sind wieder dagegen vorgegangen.

heise.de/news/USA-Erneut-koord

heise online · USA: Erneut koordinierte Aktion gegen Nordkoreas Remote-AngestellteBy Martin Holland

Microsoft stellt Remote Desktop App hastig ein

Ungewöhnlich rasch zieht Microsoft seine Remote Desktop App aus dem Verkehr. Der Konzern drängt zur Windows App, die aber speziell in Deutschland weniger kann.

heise.de/news/Microsoft-stellt

heise online · Microsoft stellt Remote Desktop App hastig einBy Daniel AJ Sokolov

#STS Scholars for Remote Access and Financial Fair Play!

We call on #ScienceAndTechnologyStudies (@sts) scholars advocating for #RemoteAccess and #Financial #FairPlay to sign this petition.

We demand STS communities to
1. provide remote access, ensure hybrid participation possibilities
2. make costs of future STS conferences& associations transparent.

change.org/p/sts-scholars-for-

Change.orgSign the PetitionSTS Scholars for Remote Access and Financial Fair Play!
Replied in thread

@deepthoughts10 I can’t see the original post anymore. I was probably too harsh and got blocked… happy to have this discussion but I’ll probably stop tagging @chrismerkel after this one.

So basically IIRC the original post was something along the lines that it’s hard to distinguish legitimate users from attackers because everyone’s using VPNs, so ban access from consumer #VPN.
Which to me is basically the same as saying you should ban #encryption because bad guys use encryption.

As to your question, #remoteaccess to the business network and services should only be done through the corporate VPN (or other authenticated access). You shouldn’t have corporate services (other than VPN/remote access) accessible from *anywhere* outside of the corporate network. So I assumed the OP was referring to customers or users.

Banning VPN access is not an effective way to prevent attacks because attackers can use many other techniques to obscure their IP address not just VPNs. For example using a VPS or other cloud service. There are even ways to get legitimate residential IP addresses.

Preventing attacks is pretty complex and it really depends what sort of attack you’re trying to block, but in general attackers behave differently from users. Detecting and blocking those behaviours is more effective than trying to block tools like VPNs.

What are your thoughts?