There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

This profile is from a federated server and may be incomplete. Browse more on the original instance.

damium ,

Right image, but under those each one below would also be wearing large pants covering each side of the subtree.

damium ,

As someone who also has produced code that looks like random characters spewed onto a terminal while using fpdf, I feel this one.

damium ,

It can still have issues with potential attacks that would redirect your client to a system outside of the VPN. It would prevent MitM but not complete replacement.

damium ,

Likely you needed to include the intermediate cert chain. Let’s encrypt sets that up automatically so it’s quite a bit easier to get right.

How do scammers overtake a youtube account with 2fa enabled

Saw a video of a youtuber that got his account overtaken which has 2fa enabled (not sure which method but I’m thinking sms). He says he didn’t get phished, downloaded anything and his session cookies weren’t stolen and I believe him. The only clue is that he received a sms otp from google but was invalid when he inputted...

damium ,

There is also SMS passive reading using LEO intercept. Hacked police email accounts are used to gain access to carrier systems where they use “imminent threat” no warrant lookups to pull the SMS in real time.

SMS is a terrible form of 2FA, better than none but not by much.

Upgrade vs Reinstall

I’m a generalist SysAdmin. I use Linux when necessary or convenient. I find that when I need to upgrade a specific solution it’s often easier to just spin up an entirely new instance and start from scratch. Is this normal or am I doing it wrong? For instance, this morning I’m looking at a Linux VM whose only task is to run...

damium ,

Your experience may depend on which distro you use and how you install things. If you use a distro with a stable upgrade path such as Debian and stick to system packages there should be almost no issues with upgrades. If you use external installers or install from source you may experience issues depending on how the installer works.

For anything complex these days I’d recommend going with containers that way the application and the OS can be upgraded independently. It also makes producing a working copy of your production system for testing a trivial task.

damium ,

I’n Windows it is not stored in a keyring but instead in the registry. This has basically the same security threat model as a local key file.

The ssh-agent on Linux will do what you want with effectively the same security. The biggest difference being that it doesn’t run as a system service but instead runs in userspace which can make it easier to dump memory. There are some other agent services out there with additional security options but they don’t change the threat model much.

Does `cp -v` print out the file name when it starts copying it or when it's done?

So if I had a cp -v operation fail, is the last file name it printed out the last successful file copy, or is it the failed partially copied file? If you had to ensure all files are copied correctly without overwriting anything, would deleting the last filename that was printed from the destination folder delete the partially...

damium ,

My memory of the cp command is that attributes such as file times were transferred at the last step. I think this would make rsync safe in most situations where a system crash wasn’t involved.

damium ,

I’ve had a system in the late 90s with a 3dfx voodoo card. Also had a laptop with a SIS card from the early 2000 era.

The voodoo card was THE card to have it it’s day (mine was an older second hand system though). The SIS card… for some reason they decided that standard VESA mode probing wasn’t a thing they supported and would hardware crash when that API was used. I eventually got it working in Linux after patching xfree86 to not attempt probing when loading the VESA driver.

damium ,

I think I remember running into that as well but for whatever reason I couldn’t get accelerated-x working with the opengl libraries I was using for school. Likely the issue was just a lack of understanding on my part as I don’t think I had a good grasp of the Linux library loader until well after I graduated.

damium ,

If you want an automated system that can protect against ransomware your backups need to be hosted in some way where the backup server has control of the retention and not the client (NAS, local disk, etc are not sufficient). If your NAS supports automated snapshots that can’t be deleted by the backup user it can mostly fill this gap but may need to be checked for how it handles snapshots when the disk fills.

For self-hosted solutions I’ve used BURP, Amanda, and Borg backup in the past but have switched to Proxmox backup server as my VMs all run in Proxmox. You still need to consider full disaster recovery scenarios where both your primary and backup system fail. For this PBS sports both tape and remote server replication.

There are also many cloud solutions that do this automatically. For cloud I would always use them in tandem with some kind of local backup.

For all of these they should have an admin account that has strong protection and doesn’t share credentials with any of the primary systems.

Weird error copying MKV file

I have some locally stored media i was copying between drives and one mkv file gave this error error reading ‘video1.mkv’: Input/output error and only copied 176/256 MiB; the copied file plays the video only up to a certain point before abruptly closing; I can play the original file fine albeit there is a noticeable hitch at...

damium ,

It’s very likely that your disk is failing.

dd if=/path/to/file.mkv of=/new/file/path.mkv conv=noerror,sync bs=4k

Should give you a file with just the damaged bits missing.

damium ,

My steam deck also unlinks family libraries with almost every os update. It might be an issue of overzealous hardware validation but it could also just be a bug.

Thanks to dust I deleted a 70 gig file on my drive

Dust is a rewrite of du (in rust obviously) that visualizes your directory tree and what percentage each file takes up. But it only prints as many files fit in your terminal height, so you see only the largest files. It’s been a better experience that du, which isn’t always easy to navigate to find big files (or atleast...

damium ,

PTSD from the days long ago when X11 error log would fill up the disk when certain applications were used.

damium , (edited )

The underutilized post pre increment operator.

damium ,

Are they on a local disk? Thunar doesn’t render any thumbnails for remote storage by default.

damium ,

When rsync copying the active root I like to bind mount / to /mnt/root_fs first. This avoids the issue with needing to exclude folders with sub-mounts and will expose files to copy that might be hidden by the mounts.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • lifeLocal
  • goranko
  • All magazines