logoalt Hacker News

3abitonlast Thursday at 3:54 AM2 repliesview on HN

Is there an automated way of doing this?


Replies

3nplast Thursday at 5:15 AM

Two paths:

- Configuration management (ansible, salt, chef, puppet)

- Preconfigured images (NixOS, packer, Guix, atomic stuffs)

For a one-off: pssh

gus_last Thursday at 1:23 PM

restricting outbound connections by binary: OpenSnitch .

You can also restrict outbound connections to cryptomining pools and malicious IPs. For example by using IOCs from VirusTotal or urlhaus.bazaar.ch