I do a little bit of everything. Programming, computer systems hardware, networking, writing, traditional art, digital art (not AI), music production, whittling, 3d modeling and printing, cooking and baking, camping and hiking, knitting and sewing, and target shooting. There is probably more.

  • 4 Posts
  • 139 Comments
Joined 2 years ago
cake
Cake day: June 4th, 2023

help-circle
  • golden_zealot@lemmy.mltoLinux@lemmy.mlAntiviruses?
    link
    fedilink
    English
    arrow-up
    2
    ·
    4 days ago

    Oh for sure - I think that this method has more efficacy in production environments ran by small businesses anyway, since best practices are rarely followed in many of them (until something happens that changes their mind on what they budget for haha), and even at that it is still a rare attack to see.

    I am unaware of this type of attack ever occurring on a persons personal network, most likely because so few end users make backups, there is no need to go through the trouble of doing this, making this method useful only in highly targeted attacks.

    We are definitely in agreement on proper backups still being the best method to recover from the vast majority of problems - even this one, depending on the backup solution.


  • golden_zealot@lemmy.mltoLinux@lemmy.mlAntiviruses?
    link
    fedilink
    English
    arrow-up
    2
    ·
    4 days ago

    They usually embed themselves in within the system files and have some scheduled job that basically checks for the criteria - if you are only backing up and restoring user data then it’s a non-issue, but if you do a full recovery including the system files/the system scheduler etc, then it can happen, and it is often necessary to backup executable and system files for production environments (true, not so much for individual users and their systems).

    When I was working in an IT shop, one of our clients was ransomwared with this method. The saving grace for us in that instance is that our backups were going to a product that allowed you to easily break open and dissect the compressed backups pre-recovery, so we were able to determine where the malicious files were and kill them before pushing the backups. Of course we only noticed that it was in the backups after we had tried to push the backups once already, so it was quite the timely process - I think I worked for something like 18 hours that day.

    You can read about such malware if you search for “timebomb malware” or “malware does not execute until date” etc.

    The attack is not super common anymore, but still happens.

    For example, here is an article discussing time bomb methods on linkedin.

    https://www.linkedin.com/pulse/time-bombs-malware-delayed-execution-any-run

    Another on the knowbe4 blog:

    https://blog.knowbe4.com/ransomware-can-destroy-backups-in-four-ways


  • golden_zealot@lemmy.mltoLinux@lemmy.mlAntiviruses?
    link
    fedilink
    English
    arrow-up
    1
    ·
    4 days ago

    There are viruses that are time-bombs. They specifically don’t do really do anything until some criteria is met in the future, such as the current date being beyond a specific date, at which point they proc. They do this in order to make sure they are in your backups when you restore them so that they immediately run when recovery is completed and the system is booted.





  • golden_zealot@lemmy.mltoLinux@lemmy.mlWhy?
    link
    fedilink
    English
    arrow-up
    11
    ·
    16 days ago

    I was not about to put up with windows co-pilot or recall and had already put up with enough ads and bugs.

    I had been running Debian on my laptop for a year without a problem and then finally Windows 11 started doing this when I was trying to update:

    Click check for updates? Same result. Wait a week and try again? Same result.

    I could no longer trust that the OS was secure from even 3rd parties, so I pulled the trigger and installed Debian 12 - later upgrading to Debian 13 when it released.

    There just is never any going back now - Linux is just waaaaaaay too good.

    Now I just need something similar to happen with phones.


  • Helix, Kakoune, build Codium from source would be my suggestions.

    I use Helix now mainly - I use Codium if I need a graphical editor for something, or one of it’s plugins.

    At work the systems use VSCode but I use the Dance plugin with Helix bindings to get some of that functionality back.


  • golden_zealot@lemmy.mltoLinux@lemmy.mlArtix Linux drop support for GNOME
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    25 days ago

    On two versions of debian on two computers I have tried to use wayland and both times I have had really bad graphical problems and lag/stuttering of multiple visual elements. I’m sure it is fine when it works, but my problem with Wayland is that for whatever reason, it just does not work on my systems.

    Each time, this was on fresh installs of the operating system as well, so I have no idea why it doesn’t like me.











  • I’ve used powershell in previous jobs and if you learn it really well I cannot deny it is super powerful.

    For a college project, a friend of mine somehow made a hexadecimal file dumper with it, with formatting and everything (think like what you would see in wireshark) in one, reasonably long, line of powershell.

    However I’m just not a big fan of it personally for syntactical reasons (even with the syntax being super logical) and much prefer bash, or other unix-like native shells. I’ve been thinking about taking zsh for a spin recently to see what it’s like.