• 2 Posts
  • 57 Comments
Joined 2 years ago
cake
Cake day: June 14th, 2023

help-circle
  • So we’re bashing the people who installed Linux now if they used something else first? What, if they’ve ever used windows we should send them to the Gulag? Wtf is this take? Like hey you dumb fucking person who finally figured out how to get away from the corporate software you were taught to use in high school, you are FuCkInG iGnOrAnT for putting yourself in this position in the first place!!1!

    Let’s not talk about the multi billion dollar industry spent locking people into an ecosystem from day 1, because blaming high schoolers and teenagers for not switching to an OS best know for running web servers is an awesome use of our time.

    Speaking from experience: no one thinks about operating systems as much as we do. We are not the norm. Most people don’t want to use the computer to begin with, but conceded its faster than hand writing everything. The guy who paved my driveway will never install Arch, because he only uses the computer to get paid. My office’s cleaner doesn’t understand how computers can even be unsafe.

    When I went to primary school we had windows computers. Same thing in high school. In uni, because I did comp sci, I used Linux and found it was better for me. 350 people went through first year with me. Most of them continued using Windows, although a good chunk used Mac too. Like 10 of us used Linux. It is easier not to switch and that’s not going to change. So can we stop having a go at people for not having the same interests as us, because that’s the only difference.



  • Yeah so targeting individuals or specific organisations is pretty hard. It sounds dumb but how do you get someone’s phone number if they don’t give it to you? Its hard unless you’re determined tbh which most people aren’t.

    Most hackers setup watering hole style attacks, or use phishing which is roughly the same concept. Basically they cast a wide net and see what they can grab, like the browser credentials of Debra from accounting who knows everything about compound interest and nothing about opening an .exe file in an email. There are some big game hunting groups, and the LinkedIn breach made some waves (see the fappening), but your run of the mill discord-as-a-c2 style hacker isn’t going after rich people.

    Someone “hacking a phone” likely put a kitchen scale iPhone app on the app store, which when first opened asks for permissions for microphone, camera, text messages, contacts and file storage, and sends all that information to Argentina for a week or so until their app gets banned.

    Also, the most likely person to hack your phone seems to be someone in your household, abusive parent or spouse sorta thing. Most common devices to get hacked are laptops, usually windows. Its just kinda hard to hack a phone. Unless you know a lot about compressed image formats and the iPhone messages app apparently because NSO made like 5 zero days in a row out of that.










  • Lol what part about that said sex worker/chat line? Well, you got me: For only $99.90 per hour I’ll talk to you about zero trust best practice that’ll get you rock hard. You’ll be begging me for a vulnerable endpoint to appear in my network sooooo bad. And I might even let you phish one of my users but I’ll make you my bitch first.

    I’m really not sure of that’s what sex chat lines are like but I think it’d do something for half of lemmy…


  • My first question is storage, how much do they come with and how easy is that to upgrade? Cos my pc is a tower I can easily upgrade by adding bigger drives and I’ve got like 3 full size drive bays plus some smaller ssd holder things. Point is I’m a little space conscious and while I’m happy to investigate, I’ve got space in my pc for any extra storage requirements.




  • In terms of learning tech, I’m not looking to learn in the traditional “home lab” sense. I work in cyber, and the vms I’d be running are likely different from a regular home lab. I’d be learning how to make a windows domain and how to attack/defend/configure. Realising now I should have said that in the post.

    I do like the idea of having a server rack but I don’t have any storage space for that so it’s a future idea at the moment. Hence upgrading the tower to effectively be a server but also gaming.



  • I’m a nerd with a thing for punishing myself so setting up a small fake corporate environment that I can hack or configure would be fun. There’s a tool called velociraptor that you can use to hunt over multiple devices which I want to learn.

    Also just learning how to configure a domain, group policy, etc. I’d do like an 8 computer network if I had a machine that could run it. Setting up something like network segmentation, then “hacking” in and configuring attacker infrastructure sounds fun if not, again, totally overkill for what I want to do. I’d be phishing myself at the end of the day but it’d be fun to try.



  • Idk dude, depends what you want to do. If you want to SSH, sure, use the terminal. RDP apps work for me. My gnome de has decent menus for pretty much everything, except sound. I’ll admit that was weird. Turns out though, you can install a gui though so not an issue. Haven’t found a thing I want to do that didn’t have a gui yet. Been using it on every pc I own for about 3 years now.


  • Fuck yes. I switched to Linux after Windows got all control freaky over my task bar. On Linux I can have 30 task bars if I want, 100 task bars. I can setup a mouse-task bar that opens radially around my cursor. On mac I can put that shit left, right, bottom, which is something, and i can resize it which is the bare fucking minimum.

    On Windows? Bottom. Full width. Don’t like it? Fuck you. Shut up and cope.

    Oh but there’s a registry hack to… nope. Not dealing with that shit again after I tried to make the fucking icons smaller AND IT BROKE THE TASK BAR.

    Love that proprietary feeling, those crisp millions of dollars of development being used to innovate and develop a robust and perfected operating system.