NaibofTabr

joined 2 years ago
[–] NaibofTabr@infosec.pub 5 points 20 hours ago

The [Super]+[P] combo might be useful. This is for display switching, it should rotate between:

  • internal only
  • external only
  • extend display
  • duplicate display
  • display off (all)

On KDE you can hold down [Super] and rotate through the options by tapping [P]. I'm not sure how this is normally configured on Unity/Gnome, it may require selecting an option with the arrow keys and then pressing [Enter].

[–] NaibofTabr@infosec.pub 2 points 1 day ago (3 children)

My main reasons are sailing the high seas

If this is the goal, then you need to concern yourself with your network first and the computer/server second. You need as much operational control over your home network as you can manage, you need to put this traffic in a separate tunnel from all of your normal network traffic and have it pop up on the public network from a different location. You need to own the modem that links you to your provider's network, and the router that is the entry/exit point for your network. You need to segregate the thing doing the sailing on its own network segment that doesn't have direct access to any of your other devices. You can not use the combo modem/router gateway device provided by your ISP. You need to plan your internal network intentionally and understand how, when, and why each device transmits on the network. You should understand your firewall configuration (on your network boundary, not on your PC). You should also get PiHole up and running and start dropping unwanted inbound and outbound traffic.

OpSec first.

[–] NaibofTabr@infosec.pub 14 points 1 day ago (3 children)

Inside you there are two muppets...

[–] NaibofTabr@infosec.pub 1 points 2 days ago

Skynet is Made in China. That figures.

[–] NaibofTabr@infosec.pub 7 points 2 days ago

A suspect was self-identified as 25-year-old Guy Edward Bartkus, a citizen of Twentynine Palms, California. Bartkus described himself as a pro-mortalist, saying people did not give consent to exist in his manifesto. He reportedly left a 30-minute audio recording in which he explained his reasoning behind the attack.

Apparently not political or religious extremism, just a proper nutjob.

[–] NaibofTabr@infosec.pub 17 points 3 days ago* (last edited 3 days ago) (1 children)

Oh, Steve Gibson gave an excellent description of this in Security Now two weeks ago:

Security Now #1023: Preventing Windows Sandbox Abuse

and this is the Tom's Hardware article he's referencing:

Unpowered SSD endurance investigation finds severe data loss and performance issues

Steve is an expert in this field, he makes SpinRite, which is probably the best tool on the market for drive health testing and repair.

[–] NaibofTabr@infosec.pub 38 points 3 days ago (2 children)

Might makes right is always the problem, whether you're talking about anarchy, or hierarchy, or some kind of distributed system - some actor will use force to inflict harm for their own benefit (in contrast to inflicting harm to defend others). I believe the study of human history tells us that this always happens, it is not preventable. So the question becomes, how do we build systems that can protect people from harm without concentrating power that may itself be abused?

  • Expecting everyone to protect themselves is not a viable option. That way lies barbarism, where the weak are left to perish.
  • I'm very open to ideas about resisting force with something other than equivalent force, but I'm not sure what that would actually look like in practice. What do you do when the bandits show up in town and start shooting and looting, other than shoot back?

If you diffuse power horizontally, there is no vacuum to fill. There’s just shared responsibility.

I'll just point out, this was the original concept behind the US Constitution. Whether it's worked as intended is... debatable.

[–] NaibofTabr@infosec.pub 3 points 3 days ago

May your marinara never stick to your spaghetti!

 

My introduction to this was through the video, so it felt appropriate to share here. I'm sure this is a reupload and I saw it somewhere else earlier than 2012.

You can actually play with it on the creator's website:

https://www.jamesweb.co.uk/windowsrg

 

Using only pieces from the original set.

 

This popular successor to the original Turbo Encabulator has now been itself succeeded by the impressive Hyper Encabulator. There seems to be no end to clever innovation in the important field of encabulation.

 

Don Hertzfeldt

view more: next ›