Was für ein bescheuerter take... kann auch nur aus Deutschland kommen. Dann ist das Schweinenackensteak halt 1-2€ teurer. Ja und. Ist immer noch 5€ billiger als es sein müsste wenn für Arbeiter, Natur und vor allem die Tiere faire Bedingungen herschen würden.
Iss halt ne Scheibe Brot zu deinem Fleisch. Oder ... Gott bewahre ... grill eine Aubergine und ein Erbsen-Protein Schnitzel...
You DONT want to turn it off. Digital forensics work WAAAAAAY better if you have a memory dump of the system. And all the memory is lost if you turn it off. Even if the virus ran 10h ago and the program has long stoped running, there will most likely still be traces in the RAM. Like a hard drive, simply deleting something in RAM doesn't mean it is gone. As long as that specific area was not written over later it will still hold the same contenta. You can sometimes find memory that belonged to a virus days or even weeks after the infection if the system was never shut down. There is so much information in ram that is lost when the power is turned off.
You want to 1: quarantine from network (don't pull the cable at the system, but firewall it at the switch if possible) 2: take a full copy of the RAM 2.5: read out bitlocker keys if the drive is encrypted. 3: turn off and take a bitwise copy of the hard drive or just send the drive + memory dump to the forensics team. 4: get coffee
The western hemisphere isn't just the Americas. It includes half of europe...
There are quite a few people in the western hemisphere that don't even bat an eye when they walk past a 1000 year old building on their way to work every day.
For me the oldest building is just a random house from the 13 century.
I have set it up in a way where all the packets have to go through their VPN and if they don't, they get dropped before they leave my PC.
That is the function of a firewall and not of the VPN. As I understand portmaster it does both. But that is not normal VPN behavior.
VPNs are not magic. They are a piece of software that encrypt traffic and send it to a special server. They do that by creating a virtual Internet connection (think like pluging in an additional Ethernet cable or connection to an addition WiFi at the same time). Everything that is sent through the virtual connection is encrypted. Your system now has (at least) two valid Internet connections (one real and one virtual). For every packet it sends it needs to decide which connection it should send it from. This is decided by something called the routing table. When you start the VPN it will put two routes into the table.
- traffic going to the VPN server goes through the real connection (so the encrypted VPN traffic is routed correctly)
- everything else goes through the virtual connection (the VPN tunnel where it gets encrypted)
The attack described is a way how a network router can add a new route into your devices routing table to basically override the second route from the VPN. The route is still there, there just is another one that has a higher priority.
A VPN is not the ultimate authority over your network traffic. It is just another program sending and recieving taffic.
There is a famous experiment , where a person gets 100$, and have to offer an arbitrary percentage of that to a stranger. If the stranger declines, both get nothing.
From the strangers perspective, getting offered even 1$ is a win, but the vast majority rejected anything below 30%
1.1
By design nothing in the chain can be altered. But of course you could have a block indicating "person X is now person Y". But you can always read that Y was at some point X (and at what point the change happened). That would not be good, as it would be a public ledger of all trans people. It would also make things like witness protection impossible because inserting a block "today in 2024, person W was born in 1974" is very suspicious
Yeah the bird is on a flat roof maybe a garage or something similar on the same height or slightly below the window
> energy equals mass
That doesn't mean energy has a weight.
It means it is physically possible to transition energy to mass and vice versa. Sunlight hitting the earth does not add any weight.
Edit: turns out that part was wrong
Also, earth radiates heat out to space. At a rate of (aaaaaaaaalmost, because of the greenhouse effect) 100% of the energy we get from the sun. If it didn't, earth would be a few million degrees hot by now...
Can't remember exactly what happened but it involved changing permissions on /bin
/sbin
and similar. You know for security ...
In the end I didn't have permissions to run chmod
, su
or sudo
Fortunately there is little that can't be fixed by booting from a live image.
If you want any system to connect to you, you need to open a port. You don't need to do that for outgoing connections (the OS and your router will automatically open ports for the return connection). So if everybody connects to one central system, nobody needs to (explicitly) open any ports (except for the central connection point)
Most VPNs use UDP. So set up a wireguard, tailscale or openvpn.
But you still need to "open up the firewall". UDP still works on ports the same way as TCP. I do agree however, that exposing a VPN port is more secure than exposing a port for a game server, as you don't know about the security of that server software.
XXX
Or it was not really news worthy and got inflated by the media untill it was.
Can you verify the software running on an instance is the same as the one in the source code repository? You can't. Can you verify the instance isn't running code to read passwords from your login requests even if the code is the original open source code? You can't.
That's why (and for other reasons) you should never use a password for more than one site/service/instance.
Lemmy admins (admins in the Lemmy application) probably can't read your password. But everyone with admin rights on the server operating system can.
A drive label is just a string that can be set by any privileged process. Seems like this installation of the new distro didn't do that. Or you skipped a step in the install where you could have chosen the drive label.
If it is a bug in the installer or if you missed it, I can't tell.
But you can just change it in gparted or something else.
Corporations are doing a bad job at it as well. While Gouvernement standards tend to be slow and stagnant, the free market produces an incomprehensible sea of standards. Like with USB, HDMI, 3/4G signals, cat-X Internet cables. If a single global manufacturer decides to do things slightly different you get a new version of a standard that everybody has to be compatible with.
The thing that confused me when first learning about docker was, that everybody compares it to a virtual machine. It's not. Containers dont virtualize anything. They take a (single) process from the host OS and separate that into its own environment. All system calls, memory access, file writes etc are still handled by the same os (same kernel). However the process is separated both on the file system and process level. It can't see other processes outside of the container and it also doesn't see the real filesystem. It sees a filesystem provided by the container. This also means it sees different file and user permissions. When you run a alpine Linux docker container on an Ubuntu system, the container only containes the (few) files for alpine but no Linux kernel no desktop environment. A process inside that container only sees the alpine files and not the Ubuntu files. It also means all containers see a filesystem independent of each other and can use libraries and dependencies of different versions (they are only files after all).
For administration it makes running complex services easy. You define how to setup that service (what base Linux distro to use, what packages to install, what commands to run, and how to start the process). You can then be save to assume the setup of that service did not interfere with the setup of any other service. "Service 1 needs a certain system wide config changed? Service 2 needs that config in the default state? And both need a different version of the same library?" In containers you can have all at the same time because they each see a different version of the same config and library.
And all this is provided by the kernel itself. All docker does is provide an "easy" way to create and manage containers but could could do all of that using chroot, runc and a few other.
As a note, containers usually don't come with systemd as they don't need an init system. You would run the service directly inside the container and then use systemd outside the container to make sure the container is started/restarted, or just docker as it can already do that.
I found a great article demystifying containers recently
As has been the case for all UAVs of the past and they are still called "unmanned". Manned used to mean "person on board" and it obviously does not mean that anymore. A remote controlled drone is still unmanned.
Yes they want to differentiate it from a AI controlled drone but it's a stupid way to do so.
Lol when did "unmanned Areal vehicles" become "remotely manned". They are not manned that's the whole fuckin point.
It's even less. The Antilope converts 10% of grass to meat, the lion converts 10% of Antilope meat to lion meat. So it's 10% of 10% bringing us back to the root problem of everything... The 1%!!!!