That’s a fun mistake to make. I had a similar thing happen with Kubuntu uninstalling my GPU drivers. I could never figure out what caused it.
Queer✨Anarchist Anti-fascist
That’s a fun mistake to make. I had a similar thing happen with Kubuntu uninstalling my GPU drivers. I could never figure out what caused it.
The world is full of creatives who make things without any expectation of income, but people create anyways. Look at open source software, or the many youtubers who don’t get enough views to get paid yet they post anyways. There’s quite a few journalists who operate solely on optional donations.
Fuck IP. Copyright is theft. IP kills.
Of course that kid grew up to be a cop
Inside you there are two wolves
I’ve run into the same problem with an API server I wrote in rust. I noticed this bug 5 minutes before a demo and panicked, but fixed it with a 1 second sleep. Eventually, I implemented a more permanent fix by changing the simplistic io calls to ones better designed for streams
Oops! I didn’t test my hand-written assembly code before hooking it up to a radiation gun, hopefully it isn’t possible to have my power variables underflow and cook a man
Women are the most beautiful people in the world and I love it
If I do DIY is that pirating, or compiling it myself
Absolutely.
I don’t have a CS degree, I have a Cybersecurity and Forensics one. But, I love programming, and between the overlap of the two degrees and and my advanced designation I ended up taking about 3/4ths of the classes needed to get a CS degree.
Diversifying helped so much with me becoming a well rounded developer. My assembly programming class, while optional for CS, was mandatory for me, made me a significantly better dev. That assembly knowledge got me to become a skilled debugger, which made my C++ classes 10x easier, and it helped me understand memory at a lower level, making the memory problems easier to diagnose and fix.
I convinced a CS friend to take one of my cyber classes, Reverse Engineering, and he found te components of the class where we analyzed a vulnerable program to find and exploit the vuln, or the bit where we tried and determined the bug based on malware that exploited it is insightful to learning to program securely.
Learning about the infrastructure used in enterprise during a Windows admin or Linux admin class will make it easier to write code for those systems.
From the cybersecurity perspective, many of my CS classes carry me hard. Knowing how programs are written, how APIs are developed, and how to design complex software lets me make more educated recommendations based on what little information I’m given by the limited logs I am given to investigate. Writing code that interfaces with linux primitives makes it easier to conceptualize what’s going on when I am debugging a broken linux system.
I have tons of experience with enterprise linux, so I tend to use Rocky linux. It’s similar to my Fedora daily driver, which is nice, and very close to the RHEL and Centos systems I used to own.
You are slightly mistaken with your assumption that debian is insecure because of the old packages. Old packages are fine, and not inherently insecure because of its age. I only become concerned about the security implications of a package if it is dual use/LOLBin, known to be vulnerable, or has been out of support for some time. The older packages Debian uses, at least things related to infrastructure and hosting, are the patched LTS release of a project.
My big concerns for picking a distro for hosting services would be reliability, level of support, and familiarity.
A more reliable distro is less likely to crash or break itself. Enterprise linux and Debian come to mind with this regard.
A distro that is well supported will mean quick access to security patches, updates, and more stable updates. It will have good, accurate documentation, and hopefully some good guides. Enterprise linux, Debian and Ubuntu have excellent support. Enterprise linux distros have incredible documentation, and often are similar enough that documentation for a different branch will work fine. Heck, I usually use rhel docs when troubleshooting my fedora install since it is close enough to get me to a point where the application docs will guide me through.
Familiarity is self explanatory. But it is important because you are more likely to accidentally compromise security in an unfamiliar environment, and it’s the driving force behind me sticking with enterprise linux over Nixos or a hardened OpenBSD.
As a fair word of warning, enterprise linux will be pretty different compared to any desktop distro, even fedora. It takes quite a bit of learning, to get comfortable (especially with SELinux), but once you do, things will go smoothly. you can also use a pirated rhel certification guide to learn enterprise linux
If anything, you can simply mess around in a local VM and try installing the tools and services needed before taking it to the cloud.
I work in Cybersecurity.
I wish I got a pay bonus for late shifts…
Since I work remote, the best bit about the late shifts (and weekend shifts) is I can just pop in wireless headphones, turn on an alarm for new alerts and just do chores until I get a phone call or an alert or two show up.
Or, if I have completed all my tasks and it is an exceptionally slow (or over-manned) weekend, i can read a book or play a game I can easily pick up and put down.
It almost makes up for the long day shifts that are non-stop work and occasionally chaotic
I love the late shifts.
Nobody is there. Nothing is happening. Everything is calm.
Marriage is a social construct not built upon love or companionship. It is just a social relation that is related to the two, with religious and legal backing to fortify it.
If you see marriage as a means to love and companionship, you are not gonna have a loving relationship. Love and companionship are completely viable (and I’d argue stronger) outside the strange little box that society tries to place it in
Fuck marriage.
I don’t think there is anything that a person of any gender can’t provide in a relationship. I do see that society shuns certain people from performing certain roles, but anyone can do any one of them.
If he is only ranting politics, he might not have anyone to talk politics with. Maybe he is the lone conservative, lapping up every scrap of talking points from Fox (or maybe Newsmax), but can’t spew them out around family who sees him as being crazy for watching Fox. If you aren’t pushing back, he probably sees you as safe, and if he is finding it hard for him to deal with political stressors, that’s probably why he is ranting and getting so emotional.
That DoS is funny because if the victim uses a cloud environment with scaling storage, it can become insanely expensive. It might not crash the machine or service, but their AWS bill might be a bit higher than expected.
I love their fake wood.
I was traveling sometime around 10 years ago when I waltzed into a music shop and looked around. I saw some neat instruments, and I remember seeing an upright bass that looked just a bit off.
Turns out it was made out of Aluminum and it was made towards the end of WWII to put on ships as a set of big band instruments to entertain sailors. The wood pattern was pretty slick, though just a bit off from what I’d expect.
This is why I did a “walkthrough test” when I had to write documentation on this sort of thing. I’m a terrible technical writer, so this shit is necessary for me.
I grabbed my friend who knows enough about computers to attempt this, but not enough about infrastructure to automatically know what I meant when I was too vague.
Took two revisions, but the final document was way easier to follow at the end
I’ve heard wazuh can do authenticated vuln scanning, but since I’ve scaled down my homelab and hardened it to a point that vuln scanning is not currently needed I’ve had no need to do so. I have a friend deploying wazuh at his job so I’m gonna have to reach out to him some time to learn how he is doing it once I start growing my lab again.
I use nuclei for networked vuln scanning, which is all I really need right now. Works well with community rules, but it is a cli application. I really like how I don’t need to deploy it on a dedicated device, I just run it using all rules on the subnets that I want to scan from my laptop, which I have plugged into a vuln-scanning network with open fw rules, and check back in half an hour. Once I get a few more raspberry pis, I’ll have one on such a network that I can just run a scan from.
Maia Arson Crimew, one of my favorite hackers, is in a webring https://maia.crimew.gay
I hope the interview was for stress ball tester, you’re a natural
I’ve written code that has generated logs like that. In my case, I had all of my 12 threads writing to a logger, and over the course of 2 hours it got to about 250gb, which was the remainder space on my drive