@Ooops@kbin.social
@Ooops@kbin.social avatar

Ooops

@Ooops@kbin.social

@ooops2278:matrix.org

Trying to centralize my fediverse use with kbin but still with (rarely used) accounts on:

Lemmy: https://feddit.de/u/Ooops &
Mastodon: https://ruhr.social/@Ooops

This profile is from a federated server and may be incomplete. Browse more on the original instance.

Ooops,
@Ooops@kbin.social avatar

There's probably a chameleon there, but well camouflaged...

Ooops,
@Ooops@kbin.social avatar

You just type ZZ... then the program assumes you fell asleep trying to exit and stops.

Ooops,
@Ooops@kbin.social avatar

I'm still waiting for more distributions to include it to replace my old 3A+ home server.

Ooops,
@Ooops@kbin.social avatar

That's not a cat but quite obviously a rabbit.

Ooops,
@Ooops@kbin.social avatar

Yes, you can. But the usual setup is to have a file system root that is nothing but subvolumes, which you can then use and mount basically as if they were independent partitions. But when you don't create a root subvolume for your system root first, you install the system directly on the file system root alongside created subvolumes. This tends to get messy as strictly speaking the file system root is a subvolume, too. So now you have that with your system installed and all other subvolumes nested inside it.

Ooops,
@Ooops@kbin.social avatar

No, that buried deep in the box with suppressed memories. So thank you for reminding me.

Ooops,
@Ooops@kbin.social avatar

That's defintiely the wrong title.

No, it's not the user catching Linux in trying to pretend user friendliness witht the terminal.

It's Linux catching the user in still hating it when he gets the wanted user friendliness, for the sole reason of being conditioned to hate the terminal.

Ooops,
@Ooops@kbin.social avatar

Malware for desktop users is the low hanging fruit with little rewards. You just hear about it because it's so rediculous easy.

The real money is on servers, so that's were real money/work is invested to develop malware for much higher gains. How successful are they again?

Ooops,
@Ooops@kbin.social avatar

Also there is no incentive for companies to fix an exploit quickly. They will only release the fix with some scheduled update anyway or else people might notice that there was something worth fixing and that's bad for your stock price.

Ooops,
@Ooops@kbin.social avatar

The cruder the malware, the better your chances of running successfully in Wine.

Because throwing together some simple executable using inbuild windows functions is much easier than programming something well-build and hidden based on deeper system layers. So your random "I just encrypted all your files because you clicked this .exe, now send me bitcoin to get it back"-bullshit might work well on wine (which is why wine should be run as it's own user with no priviledges to access anything but your Windows programs).

Ooops, (edited )
@Ooops@kbin.social avatar

Of course not. There is a market for investing very little for some cheap malware and then putting it out there, waiting for the small amount of people (out of a billion of desptop users) falling for it. Also you go for the weakest link in defense, so scamming random desktop users is rarely a technical feat. It usually exploits the human, not the system.

But we also all know how money is actually distributed. So millions of random users being scammed for some money is still not the high reward scenario a server is. Much more work is invested there because the rewards are so much higher. And yet even then you often target people as the weak link. System security for a company is mainly user security. Teaching them to not fall for for scams as an entry way to the system. And there are a lot of professionals that basically made this their own social science of how I convey those things the best, how I enforce and regularly refresh those lessons, how to make people stick to best practices.

Are you trying to tell me this all happens in parallel to a technical server structure that actually isn't that safe but rarely exploited because nobody could be bothered to check for vulnerabilities as it's just Linux and the adoption rate is low?

Ooops,
@Ooops@kbin.social avatar

Distrowatch's source for popularity is how often the different distros are clicked on on their own homepage... which has the toplist featured prominantly on the start page.

So their ranking completely and utterly worthless, as it's prone to manipulation and once you basically pushed your distro to the high spots it's guaranteed to stay there as a rarely used but highly rated distro is of course attracting more clicks from people wanting to know what it's actually about... see: MX Linux being on their #1 spot forever.

Ooops,
@Ooops@kbin.social avatar

Not on Windows... but I prefer information displayed at the top and stuff I might need to click on at the bottom.

Although I decided that I rather have more space than two seperate bars, so it's all at the bottom at least for now...

Ooops,
@Ooops@kbin.social avatar

I could never get myself to using a track ball. An ergonomic mouse on the other hand...

Ooops, (edited )
@Ooops@kbin.social avatar

The Sway implementation (not Wayland as some DEs seem to run really smoothly) sadly is still completely hit or miss depending on your exact hardware setup. I have two device (both even with nvidia grphics sigh) and one of them is just a buggy and flickering mess.

Ooops,
@Ooops@kbin.social avatar

I know they officially don't. And I didn't try to say that Sway was bad in any way or that it is their fault. I was just stating facts about state of it with NVIDIA graphics (that kept me -as a long-term i3 user- from switching to Wayland).

My PC is hacked

I just received a call from an indian microsoft technician. He informed me that my PC is sending a ton of error messages to microsoft. Most likely it has been hacked, and he would help me by remoting in and fixing the problem for me. I just wonder… Is it my PopOs or my Manjaro PC that sends all this info to microsoft?

Ooops, (edited )
@Ooops@kbin.social avatar

Proper malware often still doesn't run. Cheap executables to encrypt your stuff and so on the other hand work well.

Which is why wine should be run as its own unpriviledged user...

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #