• 0 Posts
  • 12 Comments
Joined 2 years ago
cake
Cake day: June 14th, 2023

help-circle
  • Most hacks interact with Linux because its in almost every corporate environment. People can still get scammed on Linux on their personal device too since rdp clients are compatible and a common method used. Linux Desktop is 4% market share (according to steam surveys?) but server infrastructure is largely Linux based, from firewalls to Web servers to database infrastructure. Most people host some form of Linux environment and lots of ransomware actors have Linux specific encryptors.

    Think of it this way: if the environment you just hacked has their corporate SQL database with all of their trade secrets sitting on Linux infra, and you’re a ransomware actor, you’re not going to give up and go hack someone else. Well, not if you’re any good I guess.

    The Linux community is better at finding and detecting this stuff due to more people looking at it and open source making it available etc. It’s attack surface (software that could be attacked) is still huge and the danger comes from outdated versions and misconfigurations just like anything else.

    Patch often, install from trusted sources, have backups. That’s really all you can do. Every environment has vulnerabilities. They sit at desks and push keys on the keyboard.


  • Yeah look that was the front page of the repo talking about how it has C/C++ and Fortran code, sorry for not reading the docs and finding out that yes they still use C/C++ and Fortran code in the form of OpenBLAS which is a dependency… f2py is just a method of doing the following:

    F2PY facilitates creating/building native Python C/API extension modules that make it possible

    • to call Fortran 77/90/95 external subroutines and >Fortran 90/95 module subroutines as well as C functions;

    • to access Fortran 77 COMMON blocks and Fortran 90/95 module data, including allocatable arrays

    from Python.

    Correct me if I’m wrong here but if you’re implementing an api for one programming language to talk to another then that means you have 2 programm-

    I wake up as a lizard. The meaning of kernels, subroutines and programming languages is already fading. I realise the rock I am lying on is slightly in a shadow and move into the sun. Might eat a bug later…







  • Always back up your stuff, but after doing so, the process is pretty much boot to bios, set boot priority with linux usb at the top, and away you go.

    If you have secure boot enabled, you might have to enter a pass code or passphrase but otherwise its identical to traditional bios. If you want secure boot, which prevents someone else from doing this process to your machine, re enable after you’ve installed nvidia drivers otherwise you’ll have to provide it your secure boot password during and sometimes it likes to break.




  • In the update settings she can reset her apt sources back to “default”. It’s not too hard and there’s a gui throughout the process (from memory).

    The package conflicts is an interesting one, if you have the time to post one of these on lemmy I’m sure someone will suggest a fix. It’s probably a apt install --fix-broken or something simple (hopefully) but I’m sure we could work it out.

    Totally agree that these are annoying issues though. See if you can use Nala, it’s a TUI front end for Apt and it’s got some nice user changes like if you run upgrade it updates and upgrades. It also has a fetch feature which finds nearby sources, so you’re always downloading from the closest/fastest source.