• 0 Posts
  • 33 Comments
Joined 2 years ago
cake
Cake day: June 26th, 2023

help-circle
rss
  • Lol naw TOW missile just looks like a gray puff when it blows up. Not as exciting unless the thing you’re hitting is full of fuel and ammo. Then the boom is what you think it would look like (fire ball and all that).

    Pink mist is for snipers. You’re so zoomed in from the scope you can actually see the splat and it looks like a pink mist. You can also achieve the same effect with large caliber weapons like a 25mm cannon. Interestingly enough, the Barrett .50 cal sniper that everyone knows is classified as a SASR, Special Application Scoped Rifle. Its not meant for people, its an “anti-material” weapon. You’re only supposed to use it to shoot out engine blocks.


  • Hurting people is wrong and should be avoided at all costs. Nothing cool about that.

    But when a tank is also full of fuel and ammo, the boom is much bigger lol

    I got lucky and shot around 15 to 20 for training. I lost track after 10. Some missilemen never get the chance to shoot one.

    Interestingly, I had that kill zone question asked to me by another higher up (different job) and it took me a long time to come to a conclusion. The kill radius is actually not defined in the manuals. There are zones for the shooter to ensure you don’t get hit with back blast, but usually it’s assumed that the vehicle you hit will be destroyed.

    Edit:

    To explain further, the missile doesn’t hit the target. It flys above it and uses the munroe effect to cause an implosion (not an explosion) that makes the vehicle explode from the inside out. First munroe charge punches a hole into the vehicle, second charge gets sucked in and blow it up from inside. YouTube munroe effect to see how that shape charge works.


  • People who play War Thunder want to know lol you can actually find cut outs that show the internals online. The TOW has been around for awhile.

    But the wires were for X and Y navigation. Theres an IR beacon that flashes out the back of the missile. The camera sees the beacon and when you move the controls the missile will follow. Theres a Russian T90 tank that has a defense system that spoofs the beacon. Looks like headlights, called the Shtora-1 check it out.

    Wire was made out of the thinnest, strongest metal I’ve ever seen. It would cut your boot if you snagged it and pulled, but it could be cut with scissors.

    If you lost a wire the missile would go erratic and would lose control depending on which wire was lost. Really depened on what youre trying to shoot over if you broke a wire. Can’t shoot over buildings.

    My favorite fact though, it flys above the tank! Search YouTube for a slow mo and you’ll see what i mean. Explodes from above.






  • The rules still apply to the host, just not inside the container. Docker is just ignoring the rules. If you block all ports but then have port 81 open like you do in that section of docker compose, you would think that UFW would block docker but thats not the case. Going to http://yourip:81/ will show then NPM gui, even if you specifically use ufw to block 81. If you only expose port 80 and 443, you should be fine. Your NPM container would have to be compromised then they would have to break out of the container.

    Also I think your issue is with your DNS. You should have an A record for the IP pointing to example.com and then a CNAME record pointing to sub.example.com









  • It shouldn’t mess with your current routing but if you’re running other VPNs you may run into issues.

    After you join the machines to the tailnet, each machine gets a new IP address ( only visible to other machines in the tailnet), by default it’s a 100.x.y.z you can check the tailnet for the device IP.

    Now you can keep the port closed on your router and it will still be accessible over the usual lan ip and port. But when you want to access remotely, turn on tailscale and connect using the tailnet IP.

    Another cool thing you can do with this setup is turn your home server into an exit node. By default it will only route things that are in the tailnet (100.x.y.z subnet). But if you turn your home server into an exit node you can funnel all your traffic back through the exit node. Instant free VPN back home!



  • Unencrypted HTTP can mean that anyone can see your traffic as it passes through their network. Your ISP will see that traffic. If you’re streaming pirated music and you’re in a country that cares about those things, might not go very well. From a security stand point though, you still wouldn’t want to trust the authentication on the open port. A vulnerability may exist that you don’t know about. It’s always better to keep them closed and add another layer or two between your home computer and the public.

    Tailscale let’s you tunnel into your home network without opening any ports, and it encrypts the traffic. Much safer way of doing it.