bit188 posted:i haven't installed fail2ban but i turned off password authentication for ssh and just manually add keyfiles between my computers
id love to do this but in the mean time its just for my wheel users while i have to host shell access and email to ppl with regular password for convenience' sake.
Petrol posted:soon you will be able to download electronic books in a completely secure environment
i took this to mean i was going to be added to the pdf subforum and i am very excited
Morpheus jumps from one building to another a long distance away
Neo: Whoa.
bit188 posted:i took this to mean i was going to be added to the pdf subforum and i am very excited
i think i got owned lmao. gomen
Edited by graphicalUSSRinterface ()
bit188 posted:bit188 posted:
i took this to mean i was going to be added to the pdf subforum and i am very excited
i think i got owned lmao. gomen
Edited by bit188 (tomorrow 09:38:54)
welcome to the pdf forum, brother
parabolart posted:Computers are so fukken dumb lmao, nerds, Fuck and Destroy!! *plays Hearthstone for a solid 18 hours*
is he still doing this
stegosaurus posted:i have a four year old lenovo laptop that runs like total ass, i think im going to try putting a linux on it. or a mac os. someone suggest somet hing
the thinkpads i use every day are almost 7 years old and they run great with linux
they've ruined linux by making it work properly
bit188 posted:the thinkpads i use could probably run win10 fine though so maybe you don't have enough ram, try 8-16gb+ssd
this. if you're complaining about an old laptop's speed and it's still using an hdd bump it up to ssd and you'll definitely get more life out of it. i have an old lenovo netbook (x120e) that's running win7 with no problems.
Horselord posted:i installed arch linux because i figured it'd turn everything into the computer equivalent of locksports but it just works. you just read the wiki and do what it says and it's fine
they've ruined linux by making it work properly
arch "just works" way better than ubuntu i've found
bit188 posted:arch "just works" way better than ubuntu i've found
yea seriously, i even plugged an old monoprice drawing tablet in and it worked immediately. this laptop has weak af usb ports and can't handle unpowered hubs under windows but arch doesn't give a shit
tears posted:im going to put a sticker on my laptop
i just did that https://imgur.com/a/5cxnO
toyotathon posted:how many years have yall be at linux/coding. i've run ubuntu the past year and started my first non-excel coding project, how long until i'm cranking out perl and whatnot
I was a programmer for a while, went to school for it too. So I'd say about 8 years, but I've been working as a fry cook for a couple years now.
If you're looking for a place to start check out Arduino. It's pretty accessible, plus you can integrate it into other projects if you're a DIY type, tons of documentation for beginners too. Also, it's in C, which is a good mother language to learn programming with, even if it is a bit of a steep learning curve/minefield. Is good for you, make strong.
Anything you know about perl, even its name, should be forgotten.
Dear @AppleSupport, we noticed a *HUGE* security issue at MacOS High Sierra. Anyone can login as "root" with empty password after clicking on login button several times. Are you aware of it @Apple?
— Lemi Orhan Ergin (@lemiorhan) November 28, 2017
i took a piccy of computer for social media purposes
For Guri, that Faraday-busting technique caps off an epic series of data heist tricks, some of which he describes as far more "exotic" than his latest. The Ben-Gurion team started, for instance, with a technique called AirHopper, which used a computer's electromagnetism to transmit FM radio signals to a smartphone, a kind of modern update to the NSA's Tempest technique. Next, they proved with a tool called BitWhisper that the heat generated by a piece of malware manipulating a computer's processor can directly—if slowly—communicate data to adjacent, disconnected computers.
In 2016, his team switched to acoustic attacks, showing that they could use the noise generated by a hard drive's spinning or a computer's internal fan to send 15 to 20 bits a minute to a nearby smartphone. The fan attack, they show in the video below, works even when music is playing nearby.
More recently, Guri's team began playing with light-based exfiltration. Last year, they published papers on using the LEDs of computers and routers to blink out Morse-code like messages, and even used the infrared LEDs on surveillance cameras to transmit messages that would be invisible to humans. In the video below, they show that LED-blinked message being captured by a drone outside a facility's window. And compared to previous methods, that light-based transmission is relatively high bandwidth, sending a megabyte of data in a half an hour. If the exfiltrator is willing to blink the LED at a slightly slower rate, the malware can even send its signals with flashes so fast they're undetectable for human eyes.
using it as a back-up web server for readmarxeveryday.ml and occasional desktop alternative to my main PC