• 0 Posts
  • 437 Comments
Joined 3 years ago
cake
Cake day: June 16th, 2023

help-circle



  • With respect, help me out here…

    I process PDFs all the time, both assembling text and images into PDFs and extracting images, text, layouts, etc. My uses are mostly cleaning up metadata and unwanted elements so they render correctly in more environments. I use pdftk and imagemagick for this, generally.

    Is bentopdf just a nice GUI for tools like these?

    I’m struggling to understand what part of bentopdf is “self-hosted”.


  • non_burglar@lemmy.worldtoSelfhosted@lemmy.worldBentoPDF v1.16.0
    link
    fedilink
    English
    arrow-up
    13
    arrow-down
    2
    ·
    1 day ago

    Maybe I don’t understand the use case for bentopdf, and considering how popular it is, that is likely true. However, I don’t get what this does…

    • it’s self-hosted, but the processing happens on the client? Is this just a local application?
    • it only works with PDF documents?
    • What advantage does bentopdf have over something like paperless ng?

    Again, if this is obvious to most ppl, forgive me.






  • Calling it “disobedience” is a clear indication that following the big corporations is considered “normal”.

    Stop thinking like that.

    It’s YOUR INFORMATION. You can be harmed by its abuse and you already know this.

    I do not “disobey” anyone by self-hosting. The information belongs to ME. I alone have rights to its access and control. If google doesn’t like it, they can fuck off.







  • non_burglar@lemmy.worldtoSelfhosted@lemmy.worldHoneypots and Tarpits
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    2
    ·
    13 days ago

    You need to chill out and not get so worked up about someone calling out your promotion of honeypots in a forum where the vast majority don’t even know the difference between DNS and PKI, and aren’t clear on the delineation between their LAN and the internet.

    There’s nothing to solve, it’s not a CTF.

    You misunderstand, I’m not implying your network is a CTF. I mean go to your local security group and watch how pen testers work. I can tell you they certainly do not fall for “tarpits”, even the fairly new kids.

    Ultimately, you can do what you want, I obviously can’t stop you.




  • non_burglar@lemmy.worldtoSelfhosted@lemmy.worldHoneypots and Tarpits
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    2
    ·
    14 days ago

    Hackers don’t poke around themselves, generally. They use bots and scripts to collect info and then return in person to pry open targets they want or find interesting.

    Op is tarpitting with a stream, which is a telltale sign of a honeypot, nothing else behaves that way. So a bot crawling for content? Fine. A bot collecting info for suitable targets? Might get the attention of the person looking. And once you have a hacker’s attention, you might be in trouble if they’re competent and start pressing buttons.

    You really have to know what you’re doing to understand where in the stack an attacker is going pull levers, which is as individual as people themselves.