Threads

This profile is from a federated server and may be incomplete. Browse more on the original instance.

"Combokeys" instead of hotkeys. [Feature/new command suggestion]

Title. Basically, “if a street fighter gamer and a linux tryhard had a baby” where a combination of keys is issued to run a command/script rather than a single or a simultaneous stroke of two or more. i.e left, down, left, right arrow keys, R_CTRL to run Firefox. Right, right, Up, right arrow keys, delete to power off the...

Alright, I'm gonna "take one for the team" -- what is with the "downvote-happy" users lately?

Title. “lmao internet points” and all, but what is the point of participating in a community that sees assumptions and other commonly non-harmful commentaries/posts as “bad” this easily? Do folks in here are really that needy of self-validation, even if it means seeking such from something completely insignificant like...

How exactly "secure" is a container with all capabilities dropped, distroless, with a custom rootfs directory, a static, single binary with chmod set at 100 and file ownership pointed to non-root u...

ser*, and said non-root user being “nonexistant” (i.e set via ENV)? Can such container -STILL- be exploited/breached through malicious means? Forgot to mention that its a DOCKER container @ title, but there you have it. Just curious....

Anyone want to try this "nyancat" docker image? It's pretty big -- 23kIB. :^) (hub.docker.com)

Long, short story: CLI animation with some minor annoyances. “Handcrafted” most of em out of the .c file, followed by a bunch of gcc flags. Made it distroless, and this came up. Then my “sharing itch” started after checking the memory usage of the container at a whooping 0 bytes. (I know it must be way more than that,...

Non-root user that (suddenly) has elevated privileges in a specific command (only). [Have I been hacked?]

Title. Long,short story: creating or editing files with nano as my non-root user gives (the file) elevated privileges, like I have ran it w/ sudo or as root. And the (only) “security hole” that I can think of is a nextdns docker container running as root. That aside, its very “overkill” security-wise (cap_drop=ALL,...

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #