I do a little bit of everything. Programming, computer systems hardware, networking, writing, traditional art, digital art (not AI), music production, whittling, 3d modeling and printing, cooking and baking, camping and hiking, knitting and sewing, and target shooting. There is probably more.

  • 7 Posts
  • 219 Comments
Joined 2 years ago
cake
Cake day: June 4th, 2023

help-circle

  • I need to be able to “RDP” into remote machines

    Remmina, do this every day for work from my Debian system.

    I also need to be able to setup a Hyper-V equivalent, to run other machines from my main laptop

    Virtual box or QEMU + KVM. I use QEMU + KVM, works really well.

    And for my media server (Plex), I need to understand the best way to setup a RAID5 or better across multiple drives.

    Recommend Jellyfin over Plex but in either case - if you want software RAID then use mdadm, this is how the RAID5 array on my jellyfin server works. Otherwise, there are compatible drivers for some hardware with actual hardware RAID5 arrays you can look up if you have such hardware.

    For reference, all my machines whether client or server run either Debian 12 or Debian 13.


  • Most people’s reasons in my experience demonstrate to me that they have a perception of Linux as it was 15+ years ago.

    I discussed switching to Linux with a group of friends in a voice chat some time ago, most were fairly open to it, and one or two have switched since, but mainly their reasons were time constraints, not wanting to go through the process of backing up files, and finding alternative software.

    One guy in particular brought up gaming, MS office, and some other particular software they used. I showed them protondb and every game they looked up was gold or higher, showed them libre office which they could not complain about since it generally works a lot nicer, and it turned out that other software was available as a .deb. After all of this, the reason they gave me was “but I like Windows”.

    Fair enough I guess, though they couldn’t really produce the reason as to why.

    Generally, people just don’t like any kind of change, even if it has the potential to make them a lot happier.


  • Not really, it probably took me under 30 minutes to look this up.

    A personal insult to me also isn’t an argument contrary to my claims about Switzerland, nor is it a defense of yours, so I will assume you admit you were incorrect in your claim about the country.

    Furthermore, it’s not even very good ad-hominem in that I never even claimed that firearms are a good thing. I only ever contested that Switzerland is cultured despite it’s highly permissive gun laws, and cited sources showing that they do engage in a lot of firearm sport, and have personal access to firearms in refutation of your anecdote.

    Since I never said anything about positive or negative effects of firearms themselves in this conversation, this means you have made an assumption about my personal point of view of firearms and are now using your own assumption as a counter argument to a topic we have not even discussed between ourselves at this juncture.

    This is called a straw man fallacy.

    To avoid that, it is best to stay on topic, in this case, whether or not firearms are accessible to the public for sport in Switzerland.

    Please either point out where I made the statement that guns are good etc. to show why I am a “gun nut”, or cite a source in reference to your claim about firearm accessibility in Switzerland if you want to support anything you have said thus far.

    Otherwise, feel free to just not reply to me.









  • That’s true, the problem with the original statement is that it is too broadly scoped by “knowledge”, implying that it is any and all knowledge. If I obtain the knowledge to write a singleton in object oriented programming while at work - even if the concept is applied to a work project, and later use the programming concept of a singleton in my own software, then they can’t do shit.

    A simpler example that shows that it’s too broadly scoped is that if I get trained and certified to use a forklift for a job, and later start my own company and have to use a forklift, there is no precedent for my original employer to come after me for using a forklift in my business operation just because I learned how to use a forklift while I worked for them.

    If the knowledge is proprietary or copyrighted or a trade secret and what I do uses any of that, or what I produce is a 1 to 1 product of that, then they can come after me.


  • golden_zealot@lemmy.mltoLinux@lemmy.mlAntiviruses?
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 month ago

    Oh for sure - I think that this method has more efficacy in production environments ran by small businesses anyway, since best practices are rarely followed in many of them (until something happens that changes their mind on what they budget for haha), and even at that it is still a rare attack to see.

    I am unaware of this type of attack ever occurring on a persons personal network, most likely because so few end users make backups, there is no need to go through the trouble of doing this, making this method useful only in highly targeted attacks.

    We are definitely in agreement on proper backups still being the best method to recover from the vast majority of problems - even this one, depending on the backup solution.


  • golden_zealot@lemmy.mltoLinux@lemmy.mlAntiviruses?
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 month ago

    They usually embed themselves in within the system files and have some scheduled job that basically checks for the criteria - if you are only backing up and restoring user data then it’s a non-issue, but if you do a full recovery including the system files/the system scheduler etc, then it can happen, and it is often necessary to backup executable and system files for production environments (true, not so much for individual users and their systems).

    When I was working in an IT shop, one of our clients was ransomwared with this method. The saving grace for us in that instance is that our backups were going to a product that allowed you to easily break open and dissect the compressed backups pre-recovery, so we were able to determine where the malicious files were and kill them before pushing the backups. Of course we only noticed that it was in the backups after we had tried to push the backups once already, so it was quite the timely process - I think I worked for something like 18 hours that day.

    You can read about such malware if you search for “timebomb malware” or “malware does not execute until date” etc.

    The attack is not super common anymore, but still happens.

    For example, here is an article discussing time bomb methods on linkedin.

    https://www.linkedin.com/pulse/time-bombs-malware-delayed-execution-any-run

    Another on the knowbe4 blog:

    https://blog.knowbe4.com/ransomware-can-destroy-backups-in-four-ways


  • golden_zealot@lemmy.mltoLinux@lemmy.mlAntiviruses?
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 month ago

    There are viruses that are time-bombs. They specifically don’t do really do anything until some criteria is met in the future, such as the current date being beyond a specific date, at which point they proc. They do this in order to make sure they are in your backups when you restore them so that they immediately run when recovery is completed and the system is booted.



  • golden_zealot@lemmy.mlto196@lemmy.blahaj.zoneRule
    link
    fedilink
    English
    arrow-up
    9
    ·
    edit-2
    1 month ago

    It’s the ending lyric of “In the Aeroplane Over the Sea” By Neutral Milk Hotel. (Thanks to @[email protected] for sending me better formatting for the lyrics.)

    In The Aeroplane Over The Sea

    Neutral Milk Hotel

    What a beautiful face I have found in this place
    That is circling all 'round the sun
    What a beautiful dream that could flash on the screen
    In a blink of an eye and be gone from me
    Soft and sweet
    Let me hold it close and keep it here with me

    And one day we will die
    And our ashes will fly from the aeroplane over the sea
    But for now we are young
    Let us lay in the sun and count every beautiful thing we can see
    Love to be in the arms of all I’m keepin’ here with me

    What a curious life we have found here tonight
    There is music that sounds from the street
    There are lights in the clouds, Anna’s ghost all around
    Hear her voice as it’s rolling and ringing through me
    Soft and sweet
    How the notes all bend and reach above the trees

    Now how I remember you
    How I would push my fingers through
    Your mouth to make those muscles move
    That made your voice so smooth and sweet
    But now we keep where we don’t know
    All secrets sleep in winter clothes
    With one, you loved so long ago
    Now he don’t even know his name

    What a beautiful face I have found in this place
    That is circling all 'round the sun
    And when we meet on a cloud, I’ll be laughing out loud
    I’ll be laughing with everyone I see
    Can’t believe how strange it is to be anything at all




  • No, I would not. Be careful with generalizations as they include all the people most negatively effected by the policies of the region. Criticizing “Alberta”? Completely fair. Criticizing all “Albertans”, people who didn’t choose to be born here, to have their families here? Very different, and a cohesion/division fallacy if you give it more than a passing glance.

    Saying that every person here is evil or stupid because of the choices of a government, ignoring those who voted against the government and then rolling the moral standing of both groups in with each other is an awful thing to do.