• 0 Posts
  • 97 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle

  • CountVon@sh.itjust.workstoProgrammer Humor@lemmy.mlPunch cards ftw
    link
    fedilink
    English
    arrow-up
    48
    ·
    edit-2
    22 days ago

    One of my grandfathers worked for a telephone company before he passed. That man was an absolute pack rat, he wouldn’t throw anything away. So naturally he had boxes and boxes of punch cards in this basement. I guess they were being thrown out when his employer upgraded to machines that didn’t need punch cards, so he snagged those to use as note paper. I will say, they were great for taking notes. Nice sturdy card stock, and the perfect dimensions for making a shopping list or the like.










  • I’m sure there would be a way to do this with Debian, but I have to confess I don’t know it. I have successfully done this in the past with Clover Bootloader. You have to enable an NVMe driver, but once that’s done you should see an option to boot from your NVMe device. After you’ve booted from it once, Clover should remember and boot from that device automatically going forward. I used this method for years in a home theatre PC with an old motherboard and an NVMe drive on a PCIe adapter.






  • If you look at the Steam player charts for the game you’ll see when it’s working vs. when it’s not. Off-peak it works fine, but right now the player base is ramming up against their temporary player cap for hours at a time on-peak. If you try to connect when there are thousands of others also trying to connect, that’s when things go south. That was the case for much of the weekend.

    Edit: Here’s a chart illustrating what I mean:

    In the last 48 hours, player counts hit 400k at about 7pm Eastern UTC and just stayed there for 6-ish hours. That isn’t normal, almost all other player count charts show a gradual rise and fall over the course of a day. The devs implemented an artificial cap after they found that their servers bog down when there are too many active players, basically sacrificing the peak time login experience to preserve the in-game experience. If you try to connect while the active player count is pegged, you’re essentially joining a swarm of other players who are also trying to connect at the same time. That swarm is likely DOSing some aspect of their own login systems.




  • There are some viruses that have targeted Linux, but they’re rare compared to other platforms and their ability to spread is relatively low. One of the main reasons is just down to how software tends to be installed on each platform. Viruses have an easier time spreading on Windows or OSX where users are more accustomed to downloading an executable and running it. Once there’s a malicious running process, it has a comparatively high chance to spread because it can attempt to escalate its privileges either by exploiting a bug or socially engineering the user to click through a privilege escalation prompt. That entire workflow is practically nonexistent on Linux, users just don’t tend to download and execute random binaries. Instead most Linux software gets delivered in one of these ways, each of which has impediments that reduce the chance a virus could spread:

    • through an OS repo; it would be difficult for a malicious actor to get a virus through the release process and into a trusted repo
    • through a public source like Github; again it would be difficult for a malicious actor to get a virus into public source code without someone noticing
    • through a container image from an image library like DockerHub; I believe a malicious container would be sandboxed, making it hard if not impossible for that container to take over the host system
    • through an application image like a snap, flatpak or appimage; again, I believe these run in their own sandbox from which they would have difficulty breaking out

    There are some exceptions, for example some companies like Hashicorp will distribute their stuff as precompiled binaries. Even in that case you’re probably fine as long as you don’t run the downloaded binary as root. Users in the habit of downloading strange binaries from sketchy places and running them as root just aren’t very common among the Linux userbase. I’m sure there are some (and they should really stop doing that), but there aren’t enough of them to allow a virus to spread unchecked.


  • I don’t think dedicated antivirus software is really required anymore. I haven’t run third-party AV software on any of my systems in the last decade.

    On Windows, the built-in Windows Defender is good enough for most use cases. When it first launched Defender had a pretty bad track record at stopping viruses, but now it routinely ranks at the top.

    On Linux, antivirus software has never really been required. One major exception I can think of would be if you’re running a file server or mail server that talks to OSX or Windows systems. Even then the AV software isn’t really there to protect the server, it’s there to make sure you don’t pass malware or viruses to those non-Linux clients.