linux

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

MiddledAgedGuy, (edited ) in Manjaro OS

I haven’t seen this mentioned yet, and there’s a good number of responses so maybe I’m up in the night, but it seems to me Manjaro’s philosophy is somewhat counterintuitive to Arch’s. Arch pointedly obfuscates system internals as little as is reasonable to “keep it simple” from a system perspective. Manjaro simplifies things for the user but creates additional obfuscation. I can see some people who value Arch’s approach being less than amenable to that.

But that’s not a reason to not use it. If Manjaro’s approach appeals to you, use it.

BTW, I don’t use Arch (at the moment)

cm0002, in why does the poster image of c/linux have 3.8mb?

It’s not 1999 anymore, 4MB is nothing and a very common size for a decent quality image file

Disonantezko,
  • I usually use Lemmy at my smartphone with 4G that was released 3 years ago, I’m happy with it, and I don’t need other one more new and expensive.
  • The area of 4G is very congested, then the connection is slower in peak hours.
  • Only rich people has last medium and high end smartphone with 5G, and live in area with that coverage.
  • I live now in downtown, and just got slow fiber connection 3 months ago, there are a lot buildings with only ADSL in this area, and it’s the capital.
  • Maybe you are lucky, with good connection.
  • Is not so hard to optimize the image for everyone in the world, and maybe put a link to original big image of you want.
  • There’s a lot of ways to optimize, like changing resolution, reduce colors, clean image. And compression, using webp lossy 95% you got a very small file that looks very close to the original, usually got less than 1MB.
  • Today’s web is very bloated for no reason, and very slow in old computers. Browsers are the main RAM eaters.
juli,

You’re welcome to visit me in germany. I’ll show you german internet. Vietnam has faster internet.

Pantherina, in 7 Ways to Tweak Sudo Command in Linux

I.e. how malware could easily catch your Sudo password without root access.

Peeps, bad news, Linux is damn insecure.

By simply placing an alias in your bashrc they could already grab your sudo password.

Another bad news, this Windows “okay” Button without any password is actually more secure.

digdilem,

Either you’re trolling - in which case, sod off back to Reddit - or you have a woeful misunderstanding of how Linux user permissions work.

Please explain how someone might “simply change” someone else’s .bashrc without either already having access to that user account, or root access on the whole machine?

IAm_A_Complete_Idiot, (edited )

The idea is malware you installed would presumably run under your user account and have access. You could explicitly give it different UIDs or even containerize it to counteract that, but by default a process can access everything it’s UID can, which isn’t great. And even still to this day that’s how users execute a lot of processes.

Windows isn’t much better here, though.

Pantherina,

Regarding Windows all I read is that this “admin permission dialog” is launched in some form of sandbox where no software can access it. Not sure about faking input devices though, and I am also not promoting Windows for Security

IAm_A_Complete_Idiot, (edited )

True, but that doesn’t necessarily matter if I can compromise the privileged app instead. I could replace it, modify it on disk, or really any number of things in order to get myself a hook into a privileged position.

Just injecting code in some function call which launches malware.exe would do the trick. Ofc signature checks and the like can help here - but those aren’t a given. There’s any number of ways you can elevate yourself on a system based off of user security if your threat model is malicious processes. Linux (and windows) will stop users from accessing each other’s crap by default, but not processes.

Or: supply chain attacks. Now your official app without any modifications is malicious.

sudneo,

If you containerize, the application (malware) will run under the user configured in the image, unless you override it, and in a separate mount namespace, unless you change that, which makes the “alias sudo” trick extremely unlikely.

Even running under a separate user anyway prevents almost fully the attack you mention, unless the separate user has root privileges or the DAC_OVERRIDE capability is assigned to the binary (assigning it requires CAP_SYS_ADMIN).

In short, the attack you mention is a common persistence and privilege escalation vector, which is relatively easy to detect (watch for changes to shell profiles), although preventing it requires some care. I just want to point out that in single-user machines (e.g. personal computers) escalating to root is anyway fairly unnecessary, given that all the juicy stuff (ssh keys, data, etc.) is anyway probably running under/owned by that user.

IAm_A_Complete_Idiot,

Yep! You can also get pretty far even without containers. At the end of the day containers are just sandboxing using namespaces, and systemd can expose that pretty trivially for services, and tools like bubble wrap / flatpak let you do it for desktop apps. In an ideal world every package would only use the namespaces it needs, and stuff like this would largely not be a concern.

Pantherina,

Nearly all tools (with flatpak and portals progressing into better directions but probably never finished) have rw permissions everwhere.

The modern OS threat model is not other users, as private users mostly have single user systems. It is malware and software doing nasty things.

On Linux this always worked out somehow, but grabbing your sudo password is not hard, just alias sudo to a script reading your argument, reading your password, and piping the password to the real sudo. You dont even notice it but that script just got your sudo password.

Dont know what Reddit has to do with that

ReversalHatchery,

It’s not about someone, it’s about something. A lot of us aren’t (only) using Linux as a server OS, but for desktop too, and desktop usage involves running much more different kinds of software that you simply just can’t afford to audit, and at times there are programs that you can’t choose to not use, because it’s not on you but on someone on whom you depend.

Then it’s not even only that. It’s not only random shit or a game you got that can edit your bashrc and such, but if let’s say there’s a critical vulnerability in a complex software you use, like a web browser, an attacker could make use of that to take over your account with the use of a bashrc alias.

ShortN0te,

I.e. how malware could easily catch your Sudo password without root access.

Peeps, bad news, Linux is damn insecure.

By simply placing an alias in your bashrc they could already grab your sudo password.

Another bad news, this Windows “okay” Button without any password is actually more secure.

In other words: a compromised system at the User level can easily compromised at the admin level if there are no additional checks/measures in place. Same for Windows. Just change the link to a Programm you commonly need the press OK to to you maleware. Profit.

IAm_A_Complete_Idiot,

The proper way to handle issues like these is process level permissions (i.e. capability systems), instead of user level. Linux CGroups, namespaces, etc. are already moving that way, and in effect that’s the way windows is trying to head too. (Windows has its own form of containerization called AppContainers, which UWP apps use. Windows also has its own capability system).

Atemu, in What distro would you recommend for a 32-bit old Acer One laptop?
@Atemu@lemmy.ml avatar

See if you can get the memory upgraded. DDR3 SO-DIMMs should be dirt cheap.

I’d also get a cheap SSD aswell, especially if this is for a child who might not be very careful with the machine.

Doll_Tow_Jet-ski,

Hmmm yeah I hadn't thought about upgrading the laptop, that's a big idea, and indeed it should be super cheap

LeFantome,

I use super old hardware as well. An SSD will blow your mind.

AlijahTheMediocre, in Zorin OS 17 Beta Released with Quick Settings, Spatial Desktop, and More

Opensource has a forking problem. So much time spent maintaing projects with only a few tweaks differentiating them.

Mint at least improves upon Ubuntu significantly and undoes a lot of their unpopular corporatey decisions. Zorin is literally just Ubuntu with a different face.

krash, in Surface Go 2 with 4GB Ram and 4425Y worth it?

I have the Go gen 1 with 4 Gb ram, for the exact same user cases ad you described.

The compatibility with Linux is great, but be mindful that you need a Windows installation to boot from USB (!). But the pen and touchscreen works out of the box.

The performance though is not the best, boot can take some time. I’d say forget about YouTube. But light coding and non-demanding websites could work. The form factor is great though… 😊

OP, if you’re interested in buying a used one, we could perhaps arrange something, if you live in Europe? Message me in that case.

PS. A Linux surface community would be great, I’d happily join it!

Prunebutt,

Thank you, but the other comments have dissuaded me from getting a 4GB device. ;)

aBundleOfFerrets, in Winewayland.drv: part 11: Mouselook support · Merge requests

neat

Euphoma, in web/low memory alternatives to Krita and GIMP please

Aggie.io is pretty good, it supports pressure sensitivity and layers. It also has online collaboration.

01adrianrdgz,
@01adrianrdgz@lemmy.world avatar

wait but there is one thing that I need to know!! The “Magma” version of Aggie gives you a commercial license, does that mean that the free version of Aggie will not let you do that?? So that means no commissions or selling your art?? Oh no!!

Euphoma,

I think magma is something else, the tos on aggie.io doesn’t mention anything about copyright.

GFGJewbacca, in Best Linux Distro for a tablet?

I’ve been running Nobara on my Surface Pro 4, which is based on Fedora. It comes with all the surface drivers built in, which really helps. It’s been working pretty well for me.

Pantherina, in Xenia wouldn't suggest that :c

Every site sees your UA lol. Dont use Google Chrome. Why would you, use Brave or Ungoogled Chromium if you need to.

01adrianrdgz,
@01adrianrdgz@lemmy.world avatar

I understand but I would like to manage all of my files and backup my chrome Linux and by the way, Xenia would suggest that any browser is ok and any operating system too because in the end, all software companies work with each other.

infinipurple,

You are utterly delusional.

maniel, in OpenSSH is about to change. (For the better.)

Isn’t elliptic curves cryptography sensitive to quantum computers attack? Shor’s algorithm etc

qaz, (edited ) in One of these 6 will become Plasma 6. Wallpaper Which one do you prefer?

1, 5, 2, 6, 3, 4 (Descending appeal, Left to right, Top to bottom)

HumanPerson,

Are they numbered the same way as reading? If so, I agree.

qaz, (edited )

Yes

sxan,
@sxan@midwest.social avatar

Weird. Me too.

cbarrick, in Integrity and config errors Ubuntu

X.509 certs are commonly used in TLS/HTTPS.

Why is one needed in your boot process?

Is your drive encrypted?

Another_username,

I have no idea why it’s needed. I’m a noob so maybe I fucked it up somehow haha

My device isn’t encrypted.

Another_username,

I was trying to install a docker container at one point. Could this be it?

cbarrick, (edited )

Did you try to set up that container to serve HTTPS?

It sounds like you have some service configured to serve HTTPS, and it’s having trouble starting because the cert is broken.

Only that particular service will be broken. The rest of the system is fine.

Check systemctl status --failed for more info.

Edit: I’m only talking about the X.509 error. The AMD error is probably related to your hardware.

Another_username,

I was setting up the containers to fix a problem when using wine, but found a different solution. I checked the system status. 0 units failed and x.509 isn’t mentioned

lemann,

X.509 certs are commonly used in TLS/HTTPS.

Why is one needed in your boot process?

Don’t know why but I found this funny

merthyr1831,

Secure boot uses them

Retiring, in Requesting advice on converting a Laptop Keyboard from QWERTY to Colemak-dh
@Retiring@lemmy.ml avatar

I don’t know where you are from, and what laptop you are using, but as others have said: use keyboard stickers. Just search for „colemak dh stickers [your laptop model]“

Adanisi, in I use linux for the same reason I wear fuzzy socks and sweaters
@Adanisi@lemmy.zip avatar

Ah, the freedom to modify software as you wish. Got to love it.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • linux@lemmy.ml
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #