

No idea. Built-in in the Imm firmware. Just partial screenshot from imm web gui


No idea. Built-in in the Imm firmware. Just partial screenshot from imm web gui


Fail2ban does not listen on any port for it has no user interface. No interface at all actually. It’s just a process that monitors your logfiles and changes firewall rules and writes to syslog if you tell it to.
I run it on internet facing servers so I use a ‘regular’ install and never docker. I see no advantage for docker in this case, but one huge disadvantage: Docker changes a lot on the network side. It creates bridges, and picks IP’s all by itself. I hate that. (I know you can put in a lot of effort to manage it, but no thanks keep your ‘hands’ of my network config thank you)


I fired it up for you … Powered down 12 Watt which is just the PSU and the IMM (I had one power supply connected) Then when powered up 100 Watt
The IMM info, one PSU with 230 Volt feed:

Bear in mind I had no VM’s running…


I have an x3500m4 but found it using way too much energy for my requirements. A regular pc does the job for less than 25% of the electricity.
So, i’d say check your needs and the footprint. Electricity bill comes every month and something runnin 24/7 adds up real quick.


simply rebrand it to xxxAI


Recent tv’s became thin client’s. Turn it on and it first need to download the app('s)


“I don’t have anything to hide” is such an insidious little lie
And easy to debunk. Take their phone, ask the pin. 9 out of 10 won’t. Open bank app ask pin again. You won’t get that far.


I don’t use anything cloud based and much of my shit isn’t even allowed out to the internet.
It’s a drop in the ocean, for too many say “But it’s sooooo convenient and I’ve got nothing to hide” and open up all they got. Share camera’s with amazon, email address book with facebook etc. not realizing nor caring I make an appearance in their instances too and I DO mind.


There are variouse alternatives to see what ports are open. Usually they autyo scan just the ip you come from, to avoid being used to scan a potential target.
If you want more, just use Greenbone. Run it twice. Once from another IP just to know how the world sees you. One time internal network and add accounts to greenbone allowing it to login and check further.
If you run linux, then Lynis is awesome to verify your config


nail polish. cost next to nothing, any color you like


IT ALSO HAS DEDICATED BUTTONS FOR VOLUME CONTROL
Bro, that’s so cool … your keys have backup’s


Let’s be grateful, they could have swapped it with the spacebar.
Then don’t go to the cloud! (or use encrypted storage if you really have to)
My view: Unless I can access the hardware 24/7/365 the data isn’t mine for ‘they’ can deny me access to my data anytime while they keep full access. (hence store it decryped)


whitelist of allowed ips
Not exactly.
If source is whitelisted, Accept (avoid being locked out myself)
So all IP’s are allowed to begin with, but some (“my” IP’s like at home, my office etc) are on a whitelist ahead of everything else. They can’t become blacklisted to avoid myself becoming locked out. Then it’s the drop all on the blacklisted, followed by portscan detection. Only after that the ‘normal’ rules (allow https, smtp etc) begin.


the spacebar on my Remington isn’t what it used to be, maybe a drop of oil will help ;)


Well, here is the CPU load:

And there is no increase on delay’s or jitter compared to what i’m already facing on the WAN itself.
It keep’s 6000+ hosts with possible harmful intend away from the ports I need/want open to the world. Actually, the router -while still being bored- offloads the services behind it. I really can’t see a reason not to keep doing it. But, sure, it’s a personal choice.


I only use their WiFi because I got some in- and outdoor ap’s for free. The Wifi manager is selfhosted and has no internet access. For upgradesi downoad the deb file, trasnsfer and install. It’s not the best out there, but works for me and i’m still happy with it.


I’m using RouterOS. In the firewall rules you can create a rule that if an IP touches a port, it get added to a address list (optional with a time-out). So my FW rules begin like this:
So using a portscanner will touch ports I’m not running any service on (like telnet) and you’ll be blocked. A time-out of one week on the blacklist usually gives me an blacklist of 6500+ addresses.
This too has endless possibilities. t.ex. like port knocking. (‘touch’ one or more ports in a specified sequence in a specified time to be allowed to access the actual service port)


Safety is relative.
It’s also not a state you can reach, it’s a mindset as well as an on-going process
Electric parts tend not to burn (and thus smell) that long. My guess is something touches the heating element (loosend part or rodent). I’d open it up to check the inside. If you are not confortable doing that, get someone to do it.
It’s been an issue for two months which might cause one to think it’s not urgent, but an oven usually isn’t daily use. Just check it asap you don’t wanna risk a fire (not saying it will burn, but it’s a risk)