linux
Linux 10mo ago
Jump
As a normal, boring user that does nothing special other than browse the internet and the occasional "casual coding" -- what am I supposed to do with 32GiB of ram?
  • LLovegood LLovegood 10mo ago 83%

    Nothing, there is no reason to put that much RAM on your system if you don't even know what to do with it. "What is someone who only uses his car to commute supposed to do with a supercar?"

    4
  • LibreOffice Gives Me A Hard Time (UI issues)
  • LLovegood LLovegood 10mo ago 66%

    I don't have any of those problems but I use office suites very rarely and and I'm on linux.

    About the autopudate, you should use winget instead of having each app check for updates or having to it yourself for every app.

    I do think libreoffice looks old and has room for improvement, just not so enough for me to look for an alternative. I have read that onlyoffice looks better, but I have never tried it.

    1
  • how do i transfer voice recordings / notes from my iphone to my pc (linux)
  • LLovegood LLovegood 10mo ago 100%

    I no longer own that phone, what problem do you have?

    1
  • ¿'Onde los agarró el temblor, gente?
  • LLovegood LLovegood 11mo ago 100%

    Mi estado es tan poco relevante que ni los desastres naturales llegan

    1
  • how do i transfer voice recordings / notes from my iphone to my pc (linux)
  • LLovegood LLovegood 11mo ago 100%

    In iOS, apps can only acces a directory specific to them that no other app can read, there are no shared directories that all apps can acces or a way to make symlinks or something would help (at least i'm not aware of them). So I have to move my files from wherever i need them to use them (like a video player app whose directory is not visible to the file sharing app) to the directory of the app I use to share files, and viceversa when I share files from a computer to the phone.

    In android, I can give apps permission to read and write files on the general storage.

    I'm talking about files in general, I never tried to share voice notes specifically. If you only want to transfer files to the PC and not to the phone, I think the files app supports FTP. If you can access your voice notes from the files app, this is probably the best solution. File transfers lver USB on iphoes are extremely slow anyway.

    1
  • how do i transfer voice recordings / notes from my iphone to my pc (linux)
  • LLovegood LLovegood 11mo ago 100%

    Transfering files from an iphone is a nightmare, I used to transfer files using rsync in some app that worked as a linux container, but I first had to transfer the files to the app's storage.

    1
  • Tengo una duda...
  • LLovegood LLovegood 11mo ago 100%

    Basado solo en la apariencia yo diría que sí, no estoy tan mal.

    1
  • ¿Experiencia con torrents y quejas de provedores de internet?
  • LLovegood LLovegood 11mo ago 100%

    Nunca, he tenido telme e izzi. Aunque una cosa, con torrents públicos todos pueden sabaer lo que descargas, pero si usas trackers privados eso ya no pasa.

    https://iknowwhatyoudownload.com/en/contacts/

    2
  • ¿Cuál es su opinión de la Radiodifusión Pública que hay en México?
  • LLovegood LLovegood 11mo ago 100%

    No me importaría para nada si desaparece. Creo que nunca he escuchado nada de radio pública ni sr si existe. Si incluímos la TV entonces igual hace muchos que no veo algo producido por el estado o TV pública. Yo creo que desaparecerla sería una buena forma de recortar gastos no necesarios.

    2
  • ¿Cómo ayudar a mi amigo?
  • LLovegood LLovegood 11mo ago 100%

    !tip 100

    1
  • RIP Dino
  • LLovegood LLovegood 11mo ago 100%

    Se fue y se llevó todos los huachis.

    2
  • Un romantico
  • LLovegood LLovegood 12mo ago 100%

    🙄

    1
  • Un romantico
  • LLovegood LLovegood 12mo ago 100%

    Aún existe eso?

    1
  • 🐶🐶🐶
  • LLovegood LLovegood 12mo ago 100%

    My Chemical Romance

    1
  • A ver ¿Cuál es el peor?
  • LLovegood LLovegood 12mo ago 100%

    No salen, pero: Pointer con vidrios polarizados y pickups en general

    1
  • Aquí lo que sobra es varo
  • LLovegood LLovegood 12mo ago 100%

    Ya me imagino el sistema que controla esos drones hackeado para mostrar porno o slgo así

    3
  • linux
    Linux 12mo ago
    Jump
    Elección de distribucion rolling Linux
  • LLovegood LLovegood 12mo ago 100%

    Yo he usado manjaro, arch y actualmente uso artix en mis dos computadoras. Manjaro descártala, artix por lo general funciona bien pero eso de que no tenga systemd llega a genrar problemas dependiendo el software que uses. Arch nunca me dio ningun problema que no se solucionara facilmente o mo fuera culpa mía.

    5
  • ¿Cual de estos animes me recomiendan ver?
  • LLovegood LLovegood 12mo ago 100%

    A ver, cuál es uno no tan básico que no tenga 3000 episodios?

    2
  • Este es el CAMBIO que habrá en tu recibo de luz a partir del 1 de noviembre
  • LLovegood LLovegood 12mo ago 100%

    Alv, 8 párrafos que no dicen nada relevante a la noticia. Se parece a mis ensayos de la secundaria que le ponían mínimo de hojas y los llenaba de cosas irrelevantes.

    Tldr: a partir del 1 de noviembre le quitan el descuento que le dan a ciertos estados con temperaturas altas.

    3
  • How to use IRC at school?
  • LLovegood LLovegood 12mo ago 100%

    An ssh tunnel over port 8080 might work

    7
  • featherlessbipeds.substack.com

    Me hallé esa madre y ya voy a la mitad, lectura recomendada

    1
    0
    https://www.youtube.com/playlist?list=PLsSYUeVwrHBnAUre2G_LYDsdo-tD0ov-y

    Una serie de videos que explican cómo funciona y qué limitaciones tiene o tuvo XMR y cómo las solucionaron o hasta qué punto son problemas

    1
    0
    califato
    El Califato LLovegood 2y ago 100%
    Tetera
    1
    0

    Hace tiempo alguien pedía historias de nightdrivver, aquí hay una

    1
    0
    thehackernews.com

    October 13, 2022 Ravie Lakshmanan A previously undocumented command-and-control (C2) framework dubbed Alchimist is likely being used in the wild to target Windows, macOS, and Linux systems. "Alchimist C2 has a web interface written in Simplified Chinese and can generate a configured payload, establish remote sessions, deploy payload to the remote machines, capture screenshots, perform remote shellcode execution, and run arbitrary commands," Cisco Talos said in a report shared with The Hacker News. Written in GoLang, Alchimist is complemented by a beacon implant called Insekt, which comes with remote access features that can be instrumented by the C2 server. The discovery of Alchimist and its assorted family of malware implants comes three months after Talos also detailed another self-contained framework known as Manjusaka, which has been touted as the "Chinese sibling of Sliver and Cobalt Strike." Even more interestingly, both Manjusaka and Alchimist pack in similar functionalities, despite the differences in the implementation when it comes to the web interfaces. Alchimist C2 panel further features the ability to generate PowerShell and wget code snippets for Windows and Linux, potentially allowing an attacker to flesh out their infection chains to distribute the Insekt RAT payload. The instructions could then be embedded in a maldoc attached to a phishing email that, when opened, downloads and launches the backdoor on the compromised machine. The trojan, for its part, is equipped with features typically present in backdoors of this kind, enabling the malware to get system information, capture screenshots, run arbitrary commands, and download remote files, among others. What's more, the Linux version of Insekt is capable of listing the contents of the `.ssh` directory and even adding new SSH keys to the `~/.ssh/authorized_keys` file to facilitate remote access over SSH. But in a sign that the threat actor behind the operation also has macOS in their sights, Talos said it uncovered a Mach-O dropper that exploits the PwnKit vulnerability (CVE-2021-4034) to achieve privilege escalation. "However, this [pkexec] utility is not installed on MacOSX by default, meaning the elevation of privileges is not guaranteed," Talos noted. The overlapping functions Manjusaka and Alchimist points to an uptick in the use of "all-inclusive C2 frameworks" that can be used for remote administration and command-and-control. "A threat actor gaining privileged shell access on a victim's machine is like having a Swiss Army knife, enabling the execution of arbitrary commands or shellcodes in the victim's environment, resulting in significant effects on the target organization," the researchers said.

    1
    0

    ![](https://mujico.org/pictrs/image/1d47789d-914f-41ab-9c58-dbb413ef1310.jpeg)

    1
    0

    Ya saben, de darse cuenta cuando ya es muy tarde

    1
    0

    Menos de 100 páginas en inglés o español. Cuentos, no-ficción o lo que sea. Yo empiezo, les recomiendo Aura de Carlos Fuentes

    1
    0