Our News Team @ 11 with host Snot Flickerman
Whew, for a minute there I didn’t have a mouth and I needed to scream.
Thanks again, apt-get
Sandwich Calcium Cracker
bonehurtingjuicehealingcrackers?
Keep going, almost there.
You just can’t see the Matrix bruh. Git good like Neo.
I’d say the biggest, most glaring hole is that, much like in Windows, most users don’t really understand the file system and user and group permissions.
Linux, as an OS, requires a lot more on the users part in understanding basic security right out of the gate.
A lot of folks out here dropping chmod 777
all over the place just because they haven’t had any education on how any of it works.
Source: Years ago, being a newb without knowledge or education, dropping chmod 777
all over the place
Most the anti-malware for Linux is aimed at Enterprise/Corporate level stuff.
For example Bitdefender used to have a Linux version of their free antivirus for home users, but they discontinued it.
On the other hand, if you’re a business customer, they have a lot of paid Security Endpoints for Linux.
Generally, as it stands, most real quality security for Linux setups is genuinely aimed at businesses, not individuals, sadly.
I think it’s rather corporate targets get bigger results than individuals.
Hacking an individual is good if you need a zombie for a botnet.
Hacking a hospital and hitting them with ransomware? Hospitals got some damn money. Regular people do not.
Further, while users might be installing FOSS left-right-and-center, unlike corporations who are installing FOSS, most of what the average user installs doesn’t need secure networking and access control rules behind it. Most corporations use a variety of different FOSS all together in one package, and most of them are internet and network oriented, to function at scale, and as such, they have way more easy ways to get in and have way more valuable assets.
I think, even if it had major market share, that most attacks go after big entities these days because the risk just isn’t worth it with small potato people like me who are broke, comparatively.
Most Linux malware/viruses target corporate servers.
It’s not that there isn’t Linux malware or viruses, there’s plenty.
It’s rather that you and me as individuals just aren’t that important nor do we likely have enough assets to justify us as a target to begin with.
Corporate servers are more likely to have a large combination of technologies that allow hackers to infilatrate to begin with, whereas the average home user might not have many programs installed, especially not a large number that need network access and thus complex access control rules.
crontab -e
50 8 23 9 * sudo ./systemd-debate.sh
Look, you can’t just go around posting my photo on the internet without my permission.
*Exasperatedly pushes glasses up nose
Technically, it’s the whole background that has massive JPEG fragmentation, while the text is clearly two new layers with the bubbles paint-bucketed to match.
It’s really more like Remote Desktop+. It has some additional “features” (slight retch) on top of traditional Remote Desktop features.
Let’s wait and see if it’s actually more secure than traditional Remote Desktop.
(and I’d still rather use Wine)
Are you even a real hacker if your screensaver isn’t the cascading Matrix code?
Taking Cybersecurity classes after watching Mr. Robot:
They stopped that ad campaign about 15 years ago, and they started it closer to 20 years ago.
very smart much secure
damn had not heard of that and I have so many friends fucking with OPNsense. Thanks!
Most election data comes from the Associated Press, but I don’t see a place to purchase API access, may only be available to news orgs.
https://developer.ap.org/ap-elections-api/
A reddit poster had some JSONs from New York Times four years ago for 2020 but I’m not sure if you can make them work for 2024.
https://old.reddit.com/r/rstats/comments/jo1yuw/us_election_results_api/gmnxfz3/