I just tried a few fonts on my old Kobo, as I’ve done a few times here and there, and I always end up back with a serif font. I’m not sure why, but I have suspicion that reading paperbacks and newspapers before ereaders existed has trained me to read faster with serif fonts.
- 0 Posts
- 452 Comments
non_burglar@lemmy.worldto
Selfhosted@lemmy.world•[SOLVED] HandBrakeCLI (via ARM) incorrectly marking first subtitle track as "Forced"English
2·11 hours agomkvmake pulls the Forced flag from its source, so it’s likely that your DVDs have a set flag for certain subs. You can use mediainfo to check this on your mkv files.
Mkv is simply a container format, which means you can probably unset the forced flag with mkvmake directly without having to unpack all the streams and remux them.
Handbrake is amazing, but it does have a LOT of controls, so there’s only so much hand-holding it can do when you start looking behind the curtain of how av files work.
non_burglar@lemmy.worldto
Selfhosted@lemmy.world•What's the advantages/disadvantages to hosting Nextcloud with Docker vs the Package Center on a Synology?English
2·11 hours agoYou will still have to make sure that port numbers don’t conflict
I’m sure I read you’re comment wrong, but you are aware that each docker container has its own tcp stack, right?
Context, man.
If you’re looking for something, use more words. If you’re x11/Wayland trolling, this is weak.
non_burglar@lemmy.worldto
Linux@lemmy.ml•The Quest for Reasonably Secure Operating Systems
22·2 days agoSure, but if the compromise stays within its own app, like for a browser, sandboxing won’t help.
The bulk, and I mean like 95% of the compromises I see are normal employees clicking on things that “look legit”.
Excel is now wrapped in a browser. Discord, almost all work apps are all wrapped in a browser. So you can be completely locked down between apps like grapheneos, but if you are choosing to open links, no amount of sandboxing is going to save you.
This is why we deploy knowbe4 and proofpoint, cause people are a liabilities, even to themselves.
non_burglar@lemmy.worldto
Linux@lemmy.ml•The Quest for Reasonably Secure Operating Systems
21·2 days agoSure, but op chose to follow a link. You can be sandboxed to high heaven and still get pwned if you make choices like that. Discord is particularly rife with this.
non_burglar@lemmy.worldto
Linux@lemmy.ml•The Quest for Reasonably Secure Operating Systems
10·2 days agoOK, I’ll bite… How exactly?
non_burglar@lemmy.worldto
Linux@lemmy.ml•The Quest for Reasonably Secure Operating Systems
2·2 days agoYep.
I was hoping not to sound too harsh, I’ll have to work on that.
non_burglar@lemmy.worldto
Linux@lemmy.ml•The Quest for Reasonably Secure Operating Systems
221·2 days agoYou aren’t going to like this:
Because if you got yourself pwned by a malicious link in discord, your account highjacked, etc., then having discord in a vm, container, chroot, jail, or whatever won’t help you on the server-side api abuse that got you pwned. In this case, you yourself should have been more vigilant.
From your article, and with respect, I think its nice you’re thinking more about security, but you’re mixing up quite a few concepts, and you should probably make smaller moves toward security that you actually understand, instead of going all-in on qubes with only a vague concept of the difference between sandboxing and paravirtualization.
The idea itself is fine (not getting into how not cool it is that a vendor holds the key to your bitlocker-encrypted disk once secure boot is turned on).
But so is WEP for WiFi, but no one uses that anymore because it’s considered compromised.
some are
65% of all TPM keys is “some”, I suppose. But that’s not the issue. Keys leak, it happens. The more troubling part is that Microsoft will cheerfully use the leaked key on your affected TPM and you’ll get the “safe” check mark in your next audit.
And this was warned about in 2011 when it started rolling out.
As for FUD, I don’t have a “fear” angle here. I can’t tell you how to live your life, use secure boot if you feel safe doing so.
non_burglar@lemmy.worldto
Linux@lemmy.ml•The Quest for Reasonably Secure Operating Systems
241·3 days agoI don’t understand… Your motivation for a secure operating system was from an incident where you were nearly social engineered? How will a “more secure” os help you with that?
If everyone has a copy of my passwords and authenticator keys, that wouldn’t suddenly make 2 factor auth a compromised idea.
Not sure how this relates. If you’re saying it was a good idea at the outset, then sure… If the keys hadn’t almost all been leaked by AMI and Phoenix. MS was supposed to have created a Microsoft Certified hardware vendor program for this, which fell apart pretty quickly.
Secure Boot is a joke, both practically (there are many, many tools in use to bypass it) and in my professional circles, it is considered obsolete like WEP. My audit controls for Secure Boot demand that an endpoint management solution like InTune is deployed.
You don’t have to take my word for it, obviously. I’m not trying to tell you how to live your life.
Secure Boot keys are considered compromised.
If you are recommending secure boot as a security measure, you should stop doing so.
non_burglar@lemmy.worldto
Selfhosted@lemmy.world•Umami is vulnerable - upgrade immediatelyEnglish
10·4 days agoThank you!
non_burglar@lemmy.worldto
Selfhosted@lemmy.world•Umami is vulnerable - upgrade immediatelyEnglish
32·4 days agoThanks.
For severe incidents like this, please post the most appropriate link, in this case https://github.com/umami-software/umami/issues/3852
Admins in self hosted usually don’t have that much experience with real, active compromise and may panic, let’s help them as much as possible.
I will add that Umami itself is not compromised, but vulnerable. That is a somewhat misleading title.
What was the vector? Did you have umami exposed publicly?
non_burglar@lemmy.worldto
Selfhosted@lemmy.world•Umami is vulnerable - upgrade immediatelyEnglish
35·4 days agoLink? Did you discover this yourself? There is no actual info here.
Nice, and good job.
With respect:
- You are describing the init process, after the boot stuff is done. Not sure if you meant that or not.
- vmlinuz is the bootable kernel image distinct from the kernel itself. It contains the compressed bootable ELF kernel image (which itself contains bvmlinuz) and gzip decompress function, bsetup code, bbootsect system.map, and a handful of commands for the kernel image to bootstrap itself.
- Kernel space doesn’t stop once user space is allocated memory and initialized, they both run at the same time. Maybe I read that wrong, but it didn’t seem right to me.
I want to be careful here not to discourage you, this is great exploration!
I realize I’m handing out unsolicited advice here, but when I was first learning about Unix/Linux kernels in the Solaris and HP/UX days, the thing that helped the process “click” for me was compiling a kernel and building an ELF. And if you’re going to continue on this journey (which I hope you do), you should probably read a bit on memory segmentation and broadly about assembly instructions.
Good luck!
Your find statement is not creating a variable “file” because it’s missing the first part of the for loop. This:
find ./ -type f \( -iname \*.jpg -o -iname \*.png \) | while IFS= read -r -d '' file; doshould be this:
for file in "$(find ./ -type f \( -iname \*.jpg -o -iname \*.png \))"; doHowever, the above command would find all files in current and subdirectories. You can just evaluate current context much more simply. I tested the below, it seems to work.
#! /bin/bash echo "This script will rename all files in this directory with unique names. Continue? (Y/N)" read proceed if [[ "$proceed" == "Y" ]]; then echo "Proceed" for file in *.{jpg,JPG,png,PNG}; do echo "in loop" echo "$file" dir=$(dirname "$file") base=$(basename "$file") echo "'$dir'/'$base'" new_name="$dir/$(uuidgen -r)" echo "Renaming ${file} to ${new_name}" #mv "$file" "$new_name" #uncomment to actually perform the rename. done echo "After loop" else echo "Cancelling" fiYou could also find matching files first, evaluate if anything is found and add a condition to exit if no files are found.
Edit: who the fuck downvoted this, it literally works and the for loop was the issue.
Are you just reverse-engineering this for fun, or are you trying to learn how qemu builds on a bootstrap?
Sorry, that was presumptuous of me. ‘TCP stack’ just means each container can have its own IP and services. Each docker, and in fact each Linux host can have as many interfaces as you like.
You’re free to run a service on port 8000 on one IP and still run the same port 8000 on another ip on the same subnet. However, two services can’t listen on the port at the same ip address.