• 0 Posts
  • 25 Comments
Joined 6 months ago
cake
Cake day: May 20th, 2024

help-circle



  • This is true. If you have DMARC and your RUA set up (with a working email (or one that doesn’t bounce at least)) along with SPF and DKIM, Google and MS will accept your mail. The only time it won’t at that point is if your IP is in the same /24 as a known spammer but so long as the spam stops, you’ll fall off the list. Some of the common spamlists allow you to request your IP be removed by request and I can only recall one list that almost nobody uses that makes you pay for the removal though there may be more I don’t recall.







  • The problem is that even if everybody started fucking now, it wouldn’t change the fact that many countries including China are on pace to not be able to even maintain their current GDP in the 2030’s and other than doing something to replace human labor (bringing people in or automation) to maintain or increase their GDP, there is nothing else they can do. It is too late.

    Everyone is in trouble here but some are worse off than others. Especially when they’re going to have to figure out what to do with people that will be aging out of the workforce.



  • There are a couple of OEMs like System76 and Starlabs that sell laptops with Linux on them, provide tech support for customers and so on.

    And no, installing most distros aren’t hard. You just click the buttons to proceed and fill out the username and password box, select your time zone and select your wi-fi network if you’re using wifi.

    You can do manual partitioning but why would you if you don’t know what you’re doing?

    Installing software in the GUI is as easy as installing software from the Microsoft Store. Just search or look around and when you see something you want, just click the Install button.



  • Well it isn’t actually a confirmed case. Ruiu, the original person reporting the issue wasn’t sure exactly what the surface area of attack was at the start. Ruiu Dragos, who is a security researcher believed it infected via speakers.

    Eventually Errata CEO, Robert Graham, said that if he spent a year, he could build malware that did the same and that it was ‘really, really easy’

    Eventually, Ruiu noticed that the initial stage of infection was from one of his USB sticks.

    The speakers part comes in that he found that the packets transmitted between badBIOS infected machines stopped if he disconnected the internal speaker and microphone.

    Meaning, that sure, badBIOS may communicate data with each other via speakers but that it has never been proven that it could actually infect another machine via speakers. However, that hasn’t stopped articles from conflating things.


  • I get the sentiment but defense in depth is a methodology to live by in IT and auto updating via the Internet is not a good risk to take in general. For example, should Crowdstrike just disappear one day, your entire infrastructure shouldn’t be at enormous risk nor should critical services. Even if it’s your anti-virus, a virus or ransomware shouldn’t be able to easily propagate through the enterprise. If it did, then it is doubtful something like Crowdstrike is going to be able to update and suddenly reverse course. If it can then you’re just lucky that the ransomware that made it through didn’t do anything in defense of itself (disconnecting from the network, blocking CIDRs like Crowdsource’s update servers, blocking processes, whatever) and frankly you can still update those clients anyway from your own AV update server which is a product you’d be using if you aren’t allowing updates from the Internet in order to roll them out in dev first, phasing and/or schedules from your own infrastructure.

    Crowdstrike is just another lesson in that.





  • Needing to use command line for some things that should be a right click, not supporting right click, ambiguities galore when looking at a package repository, odd defaults in packages that one really wouldn’t expect to have to check (e.g. Selecting RDP connection in a Remote app, but it defaults the security to something other than RDP?)

    Sounds like you’re using a GNOME Desktop. You should give KDE Plasma a try instead. KDE Plasma basically gives you a Windows-esq experience without trying to install something like GNOME extensions.

    For a regular user there’s not much point into going into the command-line anymore.

    there’s problems like Libre Office devs …

    Sure but there’s also alternatives. LibreOffice doesn’t try to emulate Microsoft Office and they never really have. They won’t even try to be compatible with MS Office but rather they do with OOXML which Microsoft created for other Office suites to be compatible with it but then just never supported it very well. Some alternatives do however. WPS Office is perhaps the most popular alternative for this that does try to be compatible with MS Office and emulate its feel and features but ONLYOFFICE is also a contender.


  • Just a heads up, if you use an AMD GPU, the drivers are built into the Linux kernel itself by AMD engineers (and others helping/supporting/contributing to the kernel like themselves). So you don’t even have drivers to install, unless you’re one of the 10 people that want to use AMD GPUs for Machine Learning. Then you’d do a quick install of AMD PRO (those are proprietary so that’s why they aren’t built into the kernel).