I'm in need of a little Nerd-Pr0n... what little useful thing comes into your mind as tool of at the Linux command line? Not a super-nerdy command to sophisticated resolve a problem, but a tool for actual problems that would also be useful for n00bs to take their fear about using the CLI?
So curling wttr.in is a nice trick - but yesterday I discovered v2 of the service (probably around for a million years but new to me).
curl v2.wttr.in/Berlin
yt-dlp and wget to fetch files from the Intenets without having to open a browser were on the list yesterday as well, but I'm eager to (re)discover some other nice tools.
> If you installed a Linux system with disk encryption more than a couple of years ago, there's a decent chance it's using a weak key derivation function and someone who cares enough would be in a position to brute-force it. https://mjg59.dreamwidth.org/66429.html has more details and instructions on how to update to a better KDF.
Oft ist es richtig, eine Anforderung zu analysieren, bevor man sich mit möglichen Lösungen beschäftigt. Also, worum geht es hier? Man hat eine PDF-Datei, die man auf allen Seiten mit einem Wasserzeichen versehen möchte. Das Wasserzeichen ist ein diagonal verlaufender Text. Dabei soll das Wasserzeichen im Hintergrund liegen, damit die PDF-Datei nicht vom Wasserzeichen verdeckt wird. Somit muss die PDF-Datei transparent sein, damit das darunterliegende Wasserzeichen nicht von der PDF-Datei verdeckt wird.
Nachdem die Anforderung verstanden wurde, kann man nach möglichen Lösungen suchen.
My perception is that once there's $SOFTWARE Community Edition and $SOFTWARE Enterprise Edition, the sponsoring company will usually gradually suffocate the CE version in order to push users into buying licenses for the EE version. I'm not saying this is happening here, but if I were building a #NAS box, I'd keep that in mind when deciding what software stack to run on it.
200+ #npm and #pypi packages caught dropping #Linux cryptominers.
> These packages are largely typosquats of widely used libraries and each one of them downloads a Bash script on Linux systems that run cryptominers.
> It appears that both registries cleared the typosquats fairly quickly from their platforms before these could do more harm to developers.
This appears to be a characteristic behavior of #monero / #xmr #cryptocurrency users. This is by no means the first wave of mining attacks against servers.
> Researchers have unearthed a discovery that doesn’t occur all that often in the realm of malware: a mature, never-before-seen Linux backdoor that uses novel evasion techniques to conceal its presence on infected servers, in some cases even with a forensic investigation.
> On Thursday, researchers from Intezer and The BlackBerry Threat Research & Intelligence Team said that the previously undetected backdoor combines high levels of access with the ability to scrub any sign of infection from the file system, system processes, and network traffic. Dubbed Symbiote, it targets financial institutions in Brazil and was first detected in November.
Hypolite Petovan (hypolite@friendica.mrpetovan.com)'s status on Tuesday, 08-Mar-2022 10:14:49 EST
Hypolite PetovanI always have a faint feeling of danger every time I use screen(1) on #Linux. Because it is meant to be a seamless virtual terminal, there are no visual hints about the keyboard shortcuts required to leave a session for example. Even after pressing Ctrl+a, there's no indication screen is in command input mode, so it always comes as a surprise and a relief to me that the next command actually does what I expected.
It's a sense of dread similar to using vim(1), but at least vim shows the command as it's typed. On the other hand it's always very confusing when I forget to enter input mode and start typing text.
I just set up a tiny "stardust" VM on Scaleway, so now I have a privately controlled VPN server located in Amsterdam that only costs me ~ $1.50 USD per month.