Did you try just a basic connection? Or is your target box using Network Level Authentication? (I've heard most Linux clients don't play well with this)
Ohhh...they're fucking around with FreeRDP? Why?! Even for someone who comes from Windows, how did they not just go 'fuck this, there's got to be a better way' and spend 5 more minutes Googling to find Remmina?
Can confirm. SSH is the standard under Linux. OP will be happy to note that Windows has an inbuilt SSH client since Windows 10 that functions nearly identical to its Linux equivalent.
I can believe it. Because OP is trying to make Linux work like Windows. Note how for remote access, they jump straight to RDP and don't even bother with SSH. Which Windows 10/11 has a native client for.
I mean, 2 girls 1 cup would have never been on any TV station. Real decapitations probably not either. Some of the graphic war footage we see today, some of it might be on TV but the real gory stuff, not really.
That stuff was available. You just had to go out of your way to go see it. The same mostly applies to today's internet.
iPhone is a bit different. Rather than just being the object name, they incorporated said object name into their naming style. OpenAI were trying to trademark GPT - the literal name of the technology they were using.
You would think you’d already have problems if someone’s managed to compromise one or more of your containers without you knowing though whether they can get the host or not
True, but the security idea behind being in a containerised environment is that your problems aren't immediately made worse by the fact that your database server is on the same machine as your web application - since they'd both be on separate but networked containers.
What if anything do people do about anti virus in containers?
The real threat to containers isn't AV-detectable malware, but Remote Code Execution (RCE) exploits.
Containers are best used as single purpose installations. With that configuration, it isn't easy to get non-standard executables - including malware - onto a container.
Most RCE exploits also don't involve the dropping of malware files onto the file system. There are some that do, but that issue is better handled in other ways.
Why? Well AVs only do something about binaries they know or think to be malware. A well crafted, customised Cobalt Strike beacon (aka: malicious remote control software) will blow through any resistance an AV has to offer.
So what do we do? Remember what I said that containers are best used as single purpose installations? Therefore you know exactly what executables should be running, making it trivial to set up executable whitelisting. That means that any executable not on the list will not run.
But even that isn't completely bulletproof. It won't do much against web shells, in which case your best detection mechanism is to look for applications calling /bin/bash or /bin/sh that shouldn't be.
The problem there is that what people come to learn about the Windows OS becomes ingrained into them as "how to use a computer".
Almost all of that goes out the fucking window when you jump to a non-Windows OS, but especially Arch.