![](/static/c15a0eb1/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/4271bdc6-5114-4749-a5a9-afbc82a99c78.png)
I disabled ssh on IPv4 and that reduced hacking attempts by 99%.
It’s on IPv6 port 22 with a DNS pointing to it. I can log into it remotely by hostname. Easy.
I disabled ssh on IPv4 and that reduced hacking attempts by 99%.
It’s on IPv6 port 22 with a DNS pointing to it. I can log into it remotely by hostname. Easy.
That’s basically it. My Ubuntu server is a router, NAS, plex server, public statum-1 NTP server, wordpress server, nextcloud server, security camera NVR, SMTP/IMAP mail server, CUPS print server, tor relay, and probably a few other things I forgot about.
You can do a lot with a single CPU from 2015.
I don’t have hostapd on it anymore. I now have dedicated APs on OpenWRT. The main problem with using a WNIC for an AP is that they don’t typically have a very strong broadcast output. I had to add an amplifier, and even then it wasn’t great.
I’ve done this before on Ubuntu. You can install nftables for routing, then install hostapd for a wifi AP.
Are they seriously suggesting that 33% of cheating is coming from the 2% of users that run Linux?
That is an absolute bullshit figure that I refuse to believe.
Also: This was on kernel 6.11, which does not have the new NTSYNC driver (coming in 6.14). It’s going to get even better soon.
CS2 was tested on proton, but CS2 runs natively. It’s not a useful comparison.
Edit: Someone pointed out that Nobara has already manually backpatched NTSYNC into its kernel.