mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

8.1K
active users

#remoteaccess

2 posts2 participants0 posts today
Matthew Whitaker<p>For those who use RIM (Remote Incident Manager), quick question: can you connect to an unattended computer while it’s asleep, or does it have to be on and awake the entire time?</p><p>\<a href="https://dragonscave.space/tags/Accessibility" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Accessibility</span></a> <a href="https://dragonscave.space/tags/BlindTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlindTech</span></a> <a href="https://dragonscave.space/tags/RemoteAccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteAccess</span></a> <a href="https://dragonscave.space/tags/RIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RIM</span></a> <a href="https://dragonscave.space/tags/TechSupport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechSupport</span></a> <a href="https://dragonscave.space/tags/ScreenReaders" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ScreenReaders</span></a></p>
AskUbuntu<p>Trying to reboot remotely via ssh my ubuntu pc <a href="https://ubuntu.social/tags/openssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openssh</span></a> <a href="https://ubuntu.social/tags/remoteaccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>remoteaccess</span></a> <a href="https://ubuntu.social/tags/windows11" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows11</span></a></p><p><a href="https://askubuntu.com/q/1554553/612" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1554553/612</span><span class="invisible"></span></a></p>
Home Lab Dad<p>Stop exposing your homelab to the internet! 🔒 There are much safer ways to get remote access.</p><p>I wrote a new guide comparing the top 4 methods for 2025:<br>✅ The Easy Button (Tailscale)<br>✅ The DIY Powerhouse (WireGuard)<br>✅ The Web Gateway (Cloudflare)<br>✅ The Sysadmin's Tool (SSH)</p><p>Find the perfect fit for your setup: <a href="https://homelabdad.com/secure-your-homelab-top-4-remote-access-methods-for-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">homelabdad.com/secure-your-hom</span><span class="invisible">elab-top-4-remote-access-methods-for-2025/</span></a></p><p><a href="https://mastodon.social/tags/Homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Homelab</span></a> <a href="https://mastodon.social/tags/SelfHosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SelfHosting</span></a> <a href="https://mastodon.social/tags/RemoteAccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteAccess</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WireGuard</span></a> <a href="https://mastodon.social/tags/Tailscale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tailscale</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p>
AskUbuntu<p>Steam Link shows games but does not show steam UI <a href="https://ubuntu.social/tags/games" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>games</span></a> <a href="https://ubuntu.social/tags/steam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>steam</span></a> <a href="https://ubuntu.social/tags/remoteaccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>remoteaccess</span></a></p><p><a href="https://askubuntu.com/q/1553936/612" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1553936/612</span><span class="invisible"></span></a></p>
OS-SCI<p>Raspberry Pi Connect offers secure remote access to your Raspberry Pi from any web browser. Using peer-to-peer WebRTC, it's easy to set up and free to use. Install it on Raspberry Pi OS Bookworm and access your Pi from anywhere. Currently in beta, so expect some bugs. <a href="https://mastodon.social/tags/RaspberryPi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RaspberryPi</span></a> <a href="https://mastodon.social/tags/RemoteAccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteAccess</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNews</span></a> 𝗵𝘁𝘁𝗽𝘀://𝘄𝘄𝘄.𝗼𝗺𝗴𝗹𝗶𝗻𝘂𝘅.𝗰𝗼𝗺/𝗿𝗮𝘀𝗽𝗯𝗲𝗿𝗿𝘆-𝗽𝗶-𝗰𝗼𝗻𝗻𝗲𝗰𝘁-𝗿𝗲𝗺𝗼𝘁𝗲-𝗮𝗰𝗰𝗲𝘀𝘀-𝘃𝗶𝗮-𝘄𝗲𝗯/</p>
heise Developer<p>Software-Testing: Der Wandel von Remote Testing Services</p><p>Richard Seidl diskutiert mit Alexander Weichselberger über den Einsatz von externen Ressourcen in Projekten.</p><p><a href="https://www.heise.de/blog/Software-Testing-Der-Wandel-von-Remote-Testing-Services-10501758.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/blog/Software-Testing</span><span class="invisible">-Der-Wandel-von-Remote-Testing-Services-10501758.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/AgileSoftwareentwicklung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AgileSoftwareentwicklung</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/RemoteAccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteAccess</span></a> <a href="https://social.heise.de/tags/SoftwareTestingPodcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SoftwareTestingPodcast</span></a> <a href="https://social.heise.de/tags/Softwareentwicklung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Softwareentwicklung</span></a> <a href="https://social.heise.de/tags/Test" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Test</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise online English<p>Fake IT specialists smuggled in from North Korea: US woman jailed</p><p>A US-American woman helped North Koreans to get remote IT jobs on a large scale under a false identity. Now she has been sentenced for it.</p><p><a href="https://www.heise.de/en/news/Fake-IT-specialists-smuggled-in-from-North-Korea-US-woman-jailed-10501037.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Fake-IT-speci</span><span class="invisible">alists-smuggled-in-from-North-Korea-US-woman-jailed-10501037.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercrime</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/RemoteAccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteAccess</span></a> <a href="https://social.heise.de/tags/Wirtschaft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wirtschaft</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise online<p>Falsche IT-Fachkräfte aus Nordkorea eingeschleust: Haft für US-Amerikanerin</p><p>Eine US-Amerikanerin verhalf Nordkoreanern im großen Stil zu Remote-IT-Jobs unter falscher Identität. Jetzt wurde sie dafür verurteilt.</p><p><a href="https://www.heise.de/news/Falsche-IT-Fachkraefte-aus-Nordkorea-eingeschleust-Haft-fuer-US-Amerikanerin-10500790.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Falsche-IT-Fachk</span><span class="invisible">raefte-aus-Nordkorea-eingeschleust-Haft-fuer-US-Amerikanerin-10500790.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercrime</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/RemoteAccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteAccess</span></a> <a href="https://social.heise.de/tags/Wirtschaft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wirtschaft</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
adingbatponder<p>How would you enable <a href="https://fosstodon.org/tags/clipboard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>clipboard</span></a> sharing from a physical remote IP KVM (like <a href="https://fosstodon.org/tags/JetKVM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JetKVM</span></a>) to the local device?<br>Specifically: how can clipboard content (like copied text) from the remote machine be transferred back to your local system while using the KVM?</p><p><a href="https://fosstodon.org/tags/KVM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KVM</span></a> <a href="https://fosstodon.org/tags/RemoteAccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteAccess</span></a> <a href="https://fosstodon.org/tags/ipkvm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ipkvm</span></a></p>
Pyrzout :vm:<p>Inside the Heimdal Labs Deep Dive: A Closer Look at Remote Access Protection – Source: heimdalsecurity.com <a href="https://ciso2ciso.com/inside-the-heimdal-labs-deep-dive-a-closer-look-at-remote-access-protection-source-heimdalsecurity-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/inside-the-heimd</span><span class="invisible">al-labs-deep-dive-a-closer-look-at-remote-access-protection-source-heimdalsecurity-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/HeimdalSecuritycom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HeimdalSecuritycom</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/heimdalsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>heimdalsecurity</span></a> <a href="https://social.skynetcloud.site/tags/remoteaccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>remoteaccess</span></a></p>
Tailscale<p>Thousands of screens. Dozens of firewalls. One solution.<br>DEEL Media built a remote support workflow that just works — with Tailscale.</p><p>🔒 Secure<br>⚡ Instant<br>🖥️ Scalable</p><p>How they did it: <a href="https://tailscale.com/customers/deel-media" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tailscale.com/customers/deel-m</span><span class="invisible">edia</span></a><br><a href="https://hachyderm.io/tags/RemoteAccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteAccess</span></a> <a href="https://hachyderm.io/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroTrust</span></a> <a href="https://hachyderm.io/tags/Tailscale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tailscale</span></a> <a href="https://hachyderm.io/tags/DigitalSignage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalSignage</span></a></p>
Claroty<p>🛡️ Remote access remains the leading risk to cyber-physical systems, exposing critical infrastructure to advanced threats. Explore key challenges and effective mitigation strategies in this blog: <a href="https://claroty.com/blog/why-remote-access-is-considered-the-1-risk-to-your-cyber-physical-systems-environment" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">claroty.com/blog/why-remote-ac</span><span class="invisible">cess-is-considered-the-1-risk-to-your-cyber-physical-systems-environment</span></a></p><p><a href="https://infosec.exchange/tags/NetworkProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkProtection</span></a> <a href="https://infosec.exchange/tags/RemoteAccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteAccess</span></a> <a href="https://infosec.exchange/tags/CyberPhysicalSystems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberPhysicalSystems</span></a></p>
ironArray SLU<p>Thanks to the advanced double partitioning techniques in <a href="https://mastodon.social/tags/Blosc2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Blosc2</span></a>, our <a href="https://mastodon.social/tags/Caterva2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Caterva2</span></a> package can serve small slices of big datasets (3.8 GB) through internet in less than the blink of an eye.</p><p>See how you can do that with the help of <a href="https://mastodon.social/tags/JupyterLite" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JupyterLite</span></a> in <a href="https://mastodon.social/tags/Cat2Cloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cat2Cloud</span></a> using two different techniques:</p><p>1) Plain Python-Blosc2 library for quick and dirty access<br>2) Caterva2 Python client for a more heavy-duty and flexible operation</p><p>Try it out! 👉 <a href="https://cat2.cloud/demo/roots/@public/examples/large-dataset-indexing.ipynb?roots=%40public" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cat2.cloud/demo/roots/@public/</span><span class="invisible">examples/large-dataset-indexing.ipynb?roots=%40public</span></a></p><p><a href="https://mastodon.social/tags/BigData" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BigData</span></a> <a href="https://mastodon.social/tags/RemoteAccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteAccess</span></a> <a href="https://mastodon.social/tags/Performance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Performance</span></a></p>
heise online English<p>USA: Another coordinated action against North Korea's remote employees</p><p>To circumvent US sanctions, North Korea has thousands of IT experts working remotely for Western companies. The USA has once again taken measures against this.</p><p><a href="https://www.heise.de/en/news/USA-Another-coordinated-action-against-North-Korea-s-remote-employees-10465525.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/USA-Another-c</span><span class="invisible">oordinated-action-against-North-Korea-s-remote-employees-10465525.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.heise.de/tags/Cyberspionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberspionage</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/RemoteAccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteAccess</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Wirtschaft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wirtschaft</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>USA: Erneut koordinierte Aktion gegen Nordkoreas Remote-Angestellte</p><p>Um die US-Sanktionen auszuhebeln, lässt Nordkorea Tausende IT-Fachkräfte aus der Ferne für westliche Firmen arbeiten. Die USA sind wieder dagegen vorgegangen.</p><p><a href="https://www.heise.de/news/USA-Erneut-koordinierte-Aktion-gegen-Nordkoreas-Remote-Angestellte-10465476.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/USA-Erneut-koord</span><span class="invisible">inierte-Aktion-gegen-Nordkoreas-Remote-Angestellte-10465476.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.heise.de/tags/Cyberspionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberspionage</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/RemoteAccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteAccess</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Wirtschaft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wirtschaft</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
UltraVNC<p><a href="https://mastodon.social/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a>: <a href="https://mastodon.social/tags/TimeToUpdate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TimeToUpdate</span></a><br>👁️<br><a href="https://mastodon.social/tags/UltraVNC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UltraVNC</span></a> 1.6.4.0 and <a href="https://mastodon.social/tags/UltraVNCSC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UltraVNCSC</span></a> 1.6.4.0 Released (<a href="https://mastodon.social/tags/VNC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VNC</span></a> <a href="https://mastodon.social/tags/VirtualNetworkComputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirtualNetworkComputing</span></a> <a href="https://mastodon.social/tags/RFB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RFB</span></a> <a href="https://mastodon.social/tags/RemoteFrameBuffer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteFrameBuffer</span></a> <a href="https://mastodon.social/tags/RemoteDesktop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteDesktop</span></a> <a href="https://mastodon.social/tags/RemoteDesktopSoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteDesktopSoftware</span></a> <a href="https://mastodon.social/tags/RemoteAccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteAccess</span></a> <a href="https://mastodon.social/tags/RemoteAssistance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteAssistance</span></a> <a href="https://mastodon.social/tags/RemoteComputer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteComputer</span></a> <a href="https://mastodon.social/tags/RemotePC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemotePC</span></a> <a href="https://mastodon.social/tags/RemoteSoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteSoftware</span></a> <a href="https://mastodon.social/tags/RemoteSupport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteSupport</span></a> <a href="https://mastodon.social/tags/HelpDesk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HelpDesk</span></a>) <a href="https://forum.uvnc.com/viewtopic.php?t=38095" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forum.uvnc.com/viewtopic.php?t</span><span class="invisible">=38095</span></a></p>
Hacker News<p>Ts-SSH – SSH over Tailscale without running the daemon</p><p><a href="https://github.com/derekg/ts-ssh" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/derekg/ts-ssh</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/TsSSH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TsSSH</span></a> <a href="https://mastodon.social/tags/Tailscale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tailscale</span></a> <a href="https://mastodon.social/tags/SSH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSH</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/remoteaccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>remoteaccess</span></a> <a href="https://mastodon.social/tags/open" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>open</span></a>-source</p>
Daniel<p>Fredrik Wikstrom's SMB2 handler allows remote access to files via the SMB2/3 protocols. Version 53.9 has been released which among others implements automatic reconnection handling:</p><p><a href="https://www.amiga-news.de/en/news/AN-2025-06-00053-EN.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">amiga-news.de/en/news/AN-2025-</span><span class="invisible">06-00053-EN.html</span></a></p><p><a href="https://fosstodon.org/tags/Amiga" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Amiga</span></a> <a href="https://fosstodon.org/tags/SMB2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB2</span></a> <a href="https://fosstodon.org/tags/SMB3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB3</span></a> <a href="https://fosstodon.org/tags/remoteaccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>remoteaccess</span></a></p>
Royal Apps GmbH<p>Our <a href="https://dotnet.social/tags/QuickTip" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QuickTip</span></a> this week 💡&nbsp;Did you know that you can execute a Shadow Session directly from the Dashboard? </p><p><a href="https://dotnet.social/tags/RoyalTS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RoyalTS</span></a> <a href="https://dotnet.social/tags/RemoteDesktop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteDesktop</span></a> <a href="https://dotnet.social/tags/ShadowSession" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ShadowSession</span></a> <a href="https://dotnet.social/tags/ITAdmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITAdmin</span></a> <a href="https://dotnet.social/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://dotnet.social/tags/TechSupport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechSupport</span></a> <a href="https://dotnet.social/tags/SystemAdministration" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SystemAdministration</span></a> <a href="https://dotnet.social/tags/RemoteAccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteAccess</span></a> <a href="https://dotnet.social/tags/RDP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RDP</span></a> <a href="https://dotnet.social/tags/WindowsServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer</span></a></p>
Pyrzout :vm:<p>Attackers breached ConnectWise, compromised customer ScreenConnect instances <a href="https://www.helpnetsecurity.com/2025/06/02/attackers-breached-connectwise-compromised-customer-screenconnect-instances/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/06/02</span><span class="invisible">/attackers-breached-connectwise-compromised-customer-screenconnect-instances/</span></a> <a href="https://social.skynetcloud.site/tags/government" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>government</span></a>-backedattacks <a href="https://social.skynetcloud.site/tags/cyberespionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberespionage</span></a> <a href="https://social.skynetcloud.site/tags/remoteaccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>remoteaccess</span></a> <a href="https://social.skynetcloud.site/tags/ConnectWise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ConnectWise</span></a> <a href="https://social.skynetcloud.site/tags/techsupport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>techsupport</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/MSP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MSP</span></a></p>