Glorified network janitor. Perpetual blueteam botherer. Friendly neighborhood cyberman. Constantly regressing toward the mean. Slowly regarding silent things.

  • 0 Posts
  • 45 Comments
Joined 9 months ago
cake
Cake day: December 27th, 2023

help-circle







  • What else am I missing?

    Large scale manufacturers pre-installing Linux? Readily available multi-language support for home users? Coherent UI regardless of computer and distro underneath. Billions on lobbying money spent on politicians for favorable policy crafting? Billions spent on marketing campaigns to actually sell the idea to the masses who simply don’t care any of your points (or any technical reasons, privacy or anything else that might be top of mind of the current Linux userbase).

    I’d say Linux has a good chance of capturing 5-6% of the market in the coming years if lucky (I believe we’re somewhere around 4% at the moment), unless one of the big tech monopolies decides to start throwing money into it (Like Google did with Android)





  • These attacks range from phishing attempts to sophisticated malware intrusions. Website defacement attacks and Distributed Denial of Service (DDoS) attacks are often seen during significant events

    And these tactics can also be replicated elsewhere. Other countries worried about the impact of cyberattacks and disinformation campaigns on their elections and democratic institutions should be paying attention.

    These tactics are already being replicated elsewhere. This has been the normal Internet background noise for years. This is not news.
    However, just as in 2014 when Russia was preparing for Crimea annexation, the amount of targeted (cyber and kinetic) escalated. Same again before Ukraine invasion. That’s what we should be paying attention to - not everyday “millions of cyberattacks” or hybrid misinformation war - those are already happening. and should be handled as basic boring Internet hygiene.

    We should be building resilience against targeted pre-invasion cyber. We should be building ways to take down drones, we should be building robust satellite communication networks so we don’t have to rely on kindness of tech billionaires. We should find more robust ways of navigating because GPS is too easy target.

    In short, we should be learning from the Ukraine conflict, which is the first (and currently only) real live theater for cyberwarfare.







  • A symlink is a file that contains a shortcut (text string that is automatically interpreted and followed by the operating system) reference to another file or directory in the system. It’s more or less like Windows shortcut.

    If a symlink is deleted, its target remains unaffected. If the target is deleted, symlink still continues to point to non-existing file/directory. Symlinks can point to files or directories regardless of volume/partition (hardlinks can’t).

    Different programs treat symlinks differently. Majority of software just treats them transparently and acts like they’re operating on a “real” file or directory. Sometimes this has unexpected results when they try to determine what the previous or current directory is.

    There’s also software that needs to be “symlink aware” (like shells) and identify and manipulate them directly.

    You can upload a symlink to Dropbox/Gdrive etc and it’ll appear as a normal file (probably just very small filesize), but it loses the ability to act like a shortcut, this is sometimes annoying if you use a cloud service for backups as it can create filename conflicts and you need to make sure it’s preserved as “symlink” when restored. Most backup software is “symlink aware”.