Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)
Posts
1
Comments
180
Joined
3 yr. ago

  • Did you try just a basic connection? Or is your target box using Network Level Authentication? (I've heard most Linux clients don't play well with this)

  • Ohhh...they're fucking around with FreeRDP? Why?! Even for someone who comes from Windows, how did they not just go 'fuck this, there's got to be a better way' and spend 5 more minutes Googling to find Remmina?

  • You say that like OpenCL hasn't been an option for years now.

  • You mean like they 'revealed' (read: lied about) UNRWA having ties to Hamas?

  • It's also frankly not something they should have to do either.

  • No. They're installing an RDP server (that is, you connect to the Linux box via RDP, not the other way around), not a client like Remmina.

  • That performance was peak Eurovision though! I have never been so entertained by an entry before!

  • Can confirm. SSH is the standard under Linux. OP will be happy to note that Windows has an inbuilt SSH client since Windows 10 that functions nearly identical to its Linux equivalent.

  • I can believe it. Because OP is trying to make Linux work like Windows. Note how for remote access, they jump straight to RDP and don't even bother with SSH. Which Windows 10/11 has a native client for.

  • Funny how it's never the upper class that has to give.

  • As they fucking should. Identity theft is no joke.

  • I mean, 2 girls 1 cup would have never been on any TV station. Real decapitations probably not either. Some of the graphic war footage we see today, some of it might be on TV but the real gory stuff, not really.

    That stuff was available. You just had to go out of your way to go see it. The same mostly applies to today's internet.

  • iPhone is a bit different. Rather than just being the object name, they incorporated said object name into their naming style. OpenAI were trying to trademark GPT - the literal name of the technology they were using.

  • Israel has been attacking long before 10/7. This is a conflict that's been going on for longer than pretty much everyone here has been alive

  • It's not whataboutism to point out the fact that barbaric acts have been going both ways for a long fucking time.

    Raping, murdering, taking hostages is never a workable solution to any problem.

    Who is even arguing this?

  • I'm sure the Palestinians don't want to live next to people that want to do, and have done, the same and much more to them.

  • You would think you’d already have problems if someone’s managed to compromise one or more of your containers without you knowing though whether they can get the host or not

    True, but the security idea behind being in a containerised environment is that your problems aren't immediately made worse by the fact that your database server is on the same machine as your web application - since they'd both be on separate but networked containers.

    What if anything do people do about anti virus in containers?

    The real threat to containers isn't AV-detectable malware, but Remote Code Execution (RCE) exploits.

    Containers are best used as single purpose installations. With that configuration, it isn't easy to get non-standard executables - including malware - onto a container.

    Most RCE exploits also don't involve the dropping of malware files onto the file system. There are some that do, but that issue is better handled in other ways.

    Why? Well AVs only do something about binaries they know or think to be malware. A well crafted, customised Cobalt Strike beacon (aka: malicious remote control software) will blow through any resistance an AV has to offer.

    So what do we do? Remember what I said that containers are best used as single purpose installations? Therefore you know exactly what executables should be running, making it trivial to set up executable whitelisting. That means that any executable not on the list will not run.

    But even that isn't completely bulletproof. It won't do much against web shells, in which case your best detection mechanism is to look for applications calling /bin/bash or /bin/sh that shouldn't be.

  • How about DirtyCOW?

  • So when people say 'force a reboot' there are two things it can mean:

    1. a reboot is required for updates to actually take effect. Linux sometimes does this for things like the kernel.
    2. the OS forces you to stop everything you are doing and reboots the machine. I have only ever seen Windows do this. Not Linux, not even MacOS.

    This might be where the confusion is coming in. @rtxn is referring to number 1 but the rest of us are referring to number 2