yeah i know. thanks. how do i get the fuck out of here. alternatively, euthanize me cap’n.
- 0 Posts
- 10 Comments
sludgewife@lemmy.blahaj.zoneto
Linux@lemmy.ml•rmlint: Extremely fast tool to remove duplicates and other lint from your filesystemEnglish
2·2 个月前oh! đ and þ are used for þat soubd right? but one is voiced and þe oþer isn’t i can never remember which… oh okay in Old English þey just used þ for boþ
i started with slackware ~2003 and moved to gentoo in 2005. it was very transparent to me as a newbie. use flags and compilation from source were way simpler to me than mysterious precompiled binaries. also ndiswrapper worked with my wireless chipset on gentoo. that helped
for my own sanity i will assume the audience of that page you linked is business customers given one of their examples is a .gov. im just residential. getting a static ip out here felt monumental in itself
it was apparently impossible for my isp. i have a very good deal on a static ip so reluctant to rock the boat
even if you get port 25 unblocked your IP won’t pass the sniff test. you must have a PTR record on the IP pointing to your domain for the large email hosts to accept mail from you. i use amazon SES to handle outbound because of this hurdle. it sucks
sludgewife@lemmy.blahaj.zoneto
Linux@lemmy.ml•Why disable ssh login with root on a server if I only log in with keys, not password?English
2·7 个月前no, if the attacker can change files in your account, they can read every byte you type in and respond with anything, including pretending to be a normal shell. im not sure how to prevent ssh from running commands in your shell
sludgewife@lemmy.blahaj.zoneto
Linux@lemmy.ml•Why disable ssh login with root on a server if I only log in with keys, not password?English
3·7 个月前which sudowill check$PATHdirectories and return the first match, true. however when you typesudoand hit enter your shell will look for aliases and shell functions before searching$PATH.to see how your shell will execute ‘sudo’, say
type sudo(zsh/bash). to skip aliases/functions/builtins saycommand sudomeh nvm none of these work if your shell is compromised. you’re sending bytes to the attacker at that point. they can make you believe anything


it now redirects to a different github account, researchxxl. issues are turned off. old pull requests are there so it looks like the repo was transferred