mamot.fr is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mamot.fr est un serveur Mastodon francophone, géré par La Quadrature du Net.

Server stats:

3.1K
active users

#smb

6 posts6 participants0 posts today

Anyone here knows how to specify a Samba share to automount **and** display the mount point in #KDE Dolphin?

So far I have the systemd's .mount and .automount working to mount using cifs. But the path isn't shown in Dolphin's places panel (w/ remote, devices, etc) unless the Samba share is actually mounted (either eagerly at boot or if I walk into the directory by hand the first time to mount it).

It's really annoying me. Someone here can help me?

Quantum computing is poised to break some of today's popular encryption standards. Is your organization ready?

From e-commerce transactions to email security, quantum advancements threaten to upend how organizations secure information. In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin cut through the hype and explain what your organization needs to do now to prepare.

Learn:
• What encryption standards will be broken
• How post-quantum cryptography (PQC) is evolving
• Key steps to protect long-term confidential data
• How to future-proof your encryption strategy

🎥 Watch the full episode: youtu.be/MnhAm4f7Bqk

🎧Listen to the podcast: chatcyberside.com/e/quantum-ap

Microsoft 365 credential theft is evolving quickly!

Attackers are no longer just stealing your login—they’re using your own AI tools like Microsoft Copilot to accelerate fraud from inside your environment.

Our 4-minute video breaks down how threat actors are targeting Microsoft 365 accounts and weaponizing Copilot, Teams, SharePoint, and more to perform rapid reconnaissance, commit fraud, and exploit centralized trust systems.

Watch now to learn:

▪ How Copilot can be used against you
▪ Real phishing tactics mimicking Microsoft 365, Adobe & DocuSign
▪ Why SSO, OAuth, and poor access controls can make attacks worse
▪ What your organization must do to stay ahead

Watch the video! youtu.be/zaBwxy1Gjhc

How your team responds to a data breach can make a $1.5 million difference in damages. In our latest blog, Security Consultant Derek Rowe answers frequently asked questions about critical incident response training. This FAQ covers everything from what to look for in a class and how to grade your IT training maturity, to how IT training impacts compliance and BCDR.

Don’t wait for an attack to find out how prepared your team is. Read the blog: lmgsecurity.com/critical-incid

LMG SecurityCritical Incident Response Training: Your Top Questions Answered | LMG SecurityGet answers to your top questions about critical incident response training, and why it’s essential for cybersecurity success in 2025!

I have finally caved in and dove into the rabbit hole of #Linux Container (#LXC) on #Proxmox during my exploration on how to split a GPU across multiple servers and... I totally understand now seeing people's Proxmox setups that are made up exclusively of LXCs rather than VMs lol - it's just so pleasant to setup and use, and superficially at least, very efficient.

I now have a
#Jellyfin and #ErsatzTV setup running on LXCs with working iGPU passthrough of my server's #AMD Ryzen 5600G APU. My #Intel #ArcA380 GPU has also arrived, but I'm prolly gonna hold off on adding that until I decide on which node should I add it to and schedule the shutdown, etc. In the future, I might even consider exploring (re)building a #Kubernetes, #RKE2 cluster on LXC nodes instead of VMs - and if that's viable or perhaps better.

Anyway, I've updated my
#Homelab Wiki with guides pertaining LXCs, including creating one, passing through a GPU to multiple unprivileged LXCs, and adding an #SMB share for the entire cluster and mounting them, also, on unprivileged LXC containers.

🔗 https://github.com/irfanhakim-as/homelab-wiki/blob/master/topics/proxmox.md#linux-containers-lxc

GitHubhomelab-wiki/topics/proxmox.md at master · irfanhakim-as/homelab-wikiWiki about everything Homelab. Contribute to irfanhakim-as/homelab-wiki development by creating an account on GitHub.

Как создать дедуплицирующую файловую систему с нуля? Опыт TATLIN.BACKUP

Как сделать высоконагруженную систему хранения данных в сжатые сроки? Чтобы она не падала через день, не теряла данные и не поглощала ресурсы, как Гулливер провизию в амбаре лилипутов. А еще нужно реализовать дедупликацию и заложить будущий функционал на этапе создания архитектуры. Неплохо бы и стоимость хранения гигабайта снизить до минимума, а скорость передачи данных наоборот, увеличить до второй космической. Меня зовут Ростислав, я эксперт по разработке ПО отдела систем обработки данных в YADRO. Расскажу о вкладе нашей команды в разработку TATLIN.BACKUP: как мы с нуля создали дедуплицирующую файловую систему, а также какие вызовы преодолели за два года разработки и 200 тысяч строк кода.

habr.com/ru/companies/yadro/ar

ХабрКак создать дедуплицирующую файловую систему с нуля? Опыт TATLIN.BACKUPКак сделать высоконагруженную систему хранения данных в сжатые сроки? Чтобы она не падала через день, не теряла данные и не поглощала ресурсы, как Гулливер провизию в амбаре лилипутов. А еще нужно...

Help Desk Spoofing + Email Bombing = A Dangerous New Combo

Attackers are posing as internal IT staff, using email bombing to distract users and gain remote access—often deploying ransomware through Microsoft Teams and Quick Assist.

Watch the video to see a real-world example of how cybercriminals bypass traditional phishing defenses using cloud tools and AI-driven social engineering. We'll also share how to protect your organization with better verification, secure configurations, and smart incident response planning. youtu.be/RhKFx_ZRz4A

youtu.be- YouTubeEnjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

Mass-targeting SMBs has become a new battleground in cybersecurity. Small businesses must be ready to face this threat or risk losing out on critical sales. Even the basic steps (backups, simple plans, 2FA) significantly reduce the impact of incidents.
#SMB #cybersecurity
financialpost.com/technology/t

Financial Post · OPINION: Reality of cybersecurity for small businesses  By Canadian Cybersecurity Network

Did you know a ransomware tabletop exercise can uncover gaps and failure points in your incident response plan? A recent study found it can also reduce your data breach costs by an average of $248K! If you have not planned a ransomware tabletop exercise already, it's time to put this on your schedule!

In our new blog, we share common failure points, @MDurrin's favorite ransomware tabletop exercise scenarios, and tips to help you get the most out of your next exercise.

Read the blog: lmgsecurity.com/how-a-ransomwa

LMG SecurityHow a Ransomware Tabletop Exercise Can Dramatically Reduce Your Losses If You’re Attacked | LMG SecurityA Ransomware Tabletop Exercise is one of the best ways to test your organization’s ability to handle an attack, identify process gaps, & ensure a rapid response that reduces your losses. Read our favorite scenarios and tips!