520

joined 1 year ago
[–] 520@kbin.social 6 points 9 months ago* (last edited 9 months ago)

Can confirm. SSH is the standard under Linux. OP will be happy to note that Windows has an inbuilt SSH client since Windows 10 that functions nearly identical to its Linux equivalent.

[–] 520@kbin.social 45 points 9 months ago (5 children)

I can believe it. Because OP is trying to make Linux work like Windows. Note how for remote access, they jump straight to RDP and don't even bother with SSH. Which Windows 10/11 has a native client for.

[–] 520@kbin.social 1 points 9 months ago

I mean, 2 girls 1 cup would have never been on any TV station. Real decapitations probably not either. Some of the graphic war footage we see today, some of it might be on TV but the real gory stuff, not really.

That stuff was available. You just had to go out of your way to go see it. The same mostly applies to today's internet.

[–] 520@kbin.social 14 points 9 months ago (1 children)

iPhone is a bit different. Rather than just being the object name, they incorporated said object name into their naming style. OpenAI were trying to trademark GPT - the literal name of the technology they were using.

[–] 520@kbin.social 2 points 9 months ago* (last edited 9 months ago)

You would think you’d already have problems if someone’s managed to compromise one or more of your containers without you knowing though whether they can get the host or not

True, but the security idea behind being in a containerised environment is that your problems aren't immediately made worse by the fact that your database server is on the same machine as your web application - since they'd both be on separate but networked containers.

What if anything do people do about anti virus in containers?

The real threat to containers isn't AV-detectable malware, but Remote Code Execution (RCE) exploits.

Containers are best used as single purpose installations. With that configuration, it isn't easy to get non-standard executables - including malware - onto a container.

Most RCE exploits also don't involve the dropping of malware files onto the file system. There are some that do, but that issue is better handled in other ways.

Why? Well AVs only do something about binaries they know or think to be malware. A well crafted, customised Cobalt Strike beacon (aka: malicious remote control software) will blow through any resistance an AV has to offer.

So what do we do? Remember what I said that containers are best used as single purpose installations? Therefore you know exactly what executables should be running, making it trivial to set up executable whitelisting. That means that any executable not on the list will not run.

But even that isn't completely bulletproof. It won't do much against web shells, in which case your best detection mechanism is to look for applications calling /bin/bash or /bin/sh that shouldn't be.

[–] 520@kbin.social 3 points 9 months ago

How about DirtyCOW?

[–] 520@kbin.social 3 points 9 months ago* (last edited 9 months ago)

So when people say 'force a reboot' there are two things it can mean:

  1. a reboot is required for updates to actually take effect. Linux sometimes does this for things like the kernel.

  2. the OS forces you to stop everything you are doing and reboots the machine. I have only ever seen Windows do this. Not Linux, not even MacOS.

This might be where the confusion is coming in. @rtxn is referring to number 1 but the rest of us are referring to number 2

[–] 520@kbin.social 4 points 9 months ago* (last edited 9 months ago) (1 children)

They don't. They discourage it on the consumer end, but that also has good safety reasons behind it. They go a little too far in pushing people to Play Store over other app stores, and require basically any phone with Google Services to have Play Store, but that's a different matter.

They've never tried to dictate rules on what sideloaders, both on the supplier and consumer side, can and can't do like Apple has.

The closest they've ever done to this is use Play Protect against apps like Lucky Patcher. And that's a piracy app that, among other things, patches other applications to do things like bypass Google's payment systems and disable ads.

[–] 520@kbin.social 37 points 9 months ago (10 children)

They literally don't though. They don't try to police sideloaded apps or georestrict other browsers

[–] 520@kbin.social 12 points 9 months ago (3 children)

I've never seen a distro force a reboot, Windows style. Only ever advise people to reboot.

[–] 520@kbin.social 35 points 9 months ago* (last edited 9 months ago) (1 children)

You're going to to still have problems, owing to the fact that torrent protocol doesn't download files sequentially (edit: some clients do have this option but it can slow your downloads dramatically). It doesn't download the first 5 seconds, then the 5 seconds after that, but rather 5 second bits at random parts of the movie.

view more: ‹ prev next ›