Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
You can have keepass on a USB drive, an exe version that doesn't require install, along with your db.
You sure can.
But that's not perfect.
Often businesses will lock down their computers to prevent unauthorized software from running at all, not just installing.
And not lock down random external sites they see a user visiting every day that aren't related to their work functions? Sounds like the SOC needs to get better at their monitoring.
Like the other commenter said, typically websites are less locked down.
It's simpler to sandbox the browser and prevent unauthorized software from running than to block out most of the Internet and deal with complaints all day about the web restrictions
In my experience, locking down non-work sites is much less common than locking down USB devices and unknown executables. USB devices and random executables are more of a security risk as a USB drive can be used to exfiltrate data very quickly while an executable could contain ransomware, other malware, keyloggers, etc. Sites are sandboxed and limited in terms of what they can do.