• 0 Posts
  • 53 Comments
Joined 2 years ago
cake
Cake day: June 10th, 2023

help-circle








  • No, there are other ways to get access to your machine without needing it. In general you can classify vulnerabilities as either code execution or privilege escalation, a code execution vulnerability allows an attacker to execute code on your machine, a privilege escalation allows him to break barriers that you might have imposed on him.

    For example, if you’re running service X as root, and someone manages to find a way to use something on service X to execute code, they might get a reverse shell to your box and run anything there. So you might set service X to run as your user instead of root, now that vulnerability is less important because it only compromises your user, but the attacker could use this one in conjunction with the other one to gain control of your user, then escalate to become root.

    If this is something you’re interested in, there’s a cool website called hackthebox where you have to do these sort of things for real. If you want to have an idea on how it looks, there are some excellent videos here showing walkthroughs for many of them he boxes, I recommend checking something labeled easy since these boxes can get quite complex, but it will give you a good idea of the steps attackers need to take to compromise your system




  • Hey, yeah, I know the feeling, every time I lose an already typed reply I completely lose motivation to rewrite it.

    Yeah, my pinky strain issue is completely gone, I also used to have some more pain on my wrist which made me go through a very similar journey to you, I took many steps for it to the point where nowadays my setup is (in order of what I think has made the largest impact)

    • Using i3/sway as my WM for a keyboard centric usage
    • Switching to Colemak and learning touch typing properly
    • Split ortholineal keyboard (crkbd)
    • Trackball instead of mouse

    I’ve also got a height adjustable desk and a good chair to prevent issues with my back, and my monitors use an arm to be in the right position. It was a slow process of making one change here, few months later another z etc, but this has been my setup for a few years and all of my pains in wrist, lower back, neck, etc have disappeared. I figured if I’m going to ve sitting in front of a computer typing stuff for 8h a day I need to make that as comfortable as possible to be able to do it for longer.


    As for emacs with evil mode I was sure that ci" would work, that’s basic vim functionality, what I’m less sure would work is more complex stuff for which I use plugins, e.g. <space>srq" (Surround Replace Quotes with ") to replace the next quotes for " (e.g. changing var = 'some text' to var = "some text"). That same plugin allows me to also do <space>srb[ to Surround Replace Bracket/Braces with [ (to change the surrounding [, (, or { to [ ). Another plugin allows me to move to any part of the screen in 4 keystrokes, I press s the two characters of where I want to move, and a third disambiguation character and the cursor moves there. Those are advanced usages that I think will be difficult to reproduce in emacs, plus plugins will not incorporate the basic ideas for movements.

    May I ask why emacs in evil-mode instead of Nvim?


  • playing Ultima Online (MMO)

    I once was bored in front of a piano so I learnt (by trial and error) to play stones (the login music), then I did the same with a guitar. So yeah, leave me alone with an instrument long enough and I’ll learn this song eventually hahahaha.

    playing Gunbound (artillery game)

    There’s a game I completely forgot about, I used to love the boomerang one.



  • Nibodhika@lemmy.worldtoSelfhosted@lemmy.worldPlex has paywalled my server!
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    3 days ago

    Yes I am, but I don’t want to give full control of my network drive to a closed source application because it paywalled me out of being able to access my media on my local network. It’s ridiculous that I have to do that. It breaks ECI, and is a security risk. And yeah, it’s a bit paranoid, but the fact that they can fix it with a simple config and put that behind a paywall is VERY worrisome, so I now need to pay if I want to isolate Plex from the host where it’s running.


  • Yup, that’s exactly the problem I have, it’s ridiculous that it doesn’t let me stream from a local network just because it thinks that it’s local network is only the docker one, it should be fairly simple for Plex to figure out it’s accessible via a direct connection and it doesn’t need to route through the Plex servers for this. But it won’t get fixed because it pushes people to pay, hell from what people are saying here the config to fix this is paywalled so they create a problem for which they sell you the solutions.