I’ve read your update but try Terminator. You use alt + arrow keys to navigate multiple on screen terminals, create new ones with ctrl+e/o and its my favourite. I highly recommend giving it a try!
I’ve read your update but try Terminator. You use alt + arrow keys to navigate multiple on screen terminals, create new ones with ctrl+e/o and its my favourite. I highly recommend giving it a try!
I’m thinking data entry for threat hunters, and integrations with our other platforms apis but I couldn’t say anything specific. SSDs are a good shout, I might have tried setting it up with hdds if you hadn’t said.
Did you find it easier to add connectors in seperate docker containers or within the main octi container?
It feels like there’s a pretty high ceiling for this platform and the data you can generate. Do you find it easy to create good data? Do you have any habits?
I’m pretty keen to learn so feel free to answer what you can.
So save files exist. Also custom user content. So the hash will change accordingly. Plus some cheats don’t require a modification of game files anyway, they use memory analysis to get, say, the location of other player objects, then they manipulate local information to give the player an advantage. This is how aim hacks and wall hacks work.
Cheats are hard to prevent for the sole reason of you don’t own the computer they could be running on. You can’t trust the user or the machine, and have to design accordingly. This leads many to the “solution” that is kernel level anticheat, it gives total access to the system.
Really don’t care much about my cv. This program is a great way to learn about the STIX protocol so no idea what you mean about “no actionable skills”. STIX is an interesting information sharing method, the program is well designed to educate the user on it and seeing the format it imports and exports data will teach me a buttload.
More to the point, maybe could you be less cynical and share some advice. I’m not going to flex my qualifications cos they’re mediocre but I’ve got smart people around me who just don’t know this particular program and I’m interested to hear from those who do.
Do you run this program at work or at home? Have you learned anything interesting from using it? Are there avoidable mistakes I could not repeat from hosting it? Answers to those questions would be very useful.
I dont see myself doing too much configuration with connectors to begin with which brings some of the difficulty down. I was asking to see if others run anything similar in their home configuration. I’ve met people who run MISP from home before so it sounded feasible to me.
I was also looking for the community aspect of this, I already knew they had a docker-compose config. I wanted to know who had attempted this before and what they’d learned, that sort of thing.
Only man I’ve ever seen pick shit from between his toes and eat it while having a philosophical discussion about FOSS.
10/10 agree with the ideology and think he’s an amazing programmer 0/10 agree with his culinary recommendations
In the update settings she can reset her apt sources back to “default”. It’s not too hard and there’s a gui throughout the process (from memory).
The package conflicts is an interesting one, if you have the time to post one of these on lemmy I’m sure someone will suggest a fix. It’s probably a apt install --fix-broken
or something simple (hopefully) but I’m sure we could work it out.
Totally agree that these are annoying issues though. See if you can use Nala, it’s a TUI front end for Apt and it’s got some nice user changes like if you run upgrade it updates and upgrades. It also has a fetch feature which finds nearby sources, so you’re always downloading from the closest/fastest source.
I recommend this to everyone I meet in tech, it’s really good to learn linux and file system skills
Cyber security guy here: we care about 22 for SSH, 443 and 80 for Web traffic, 3389 for RDP and 21 for FTP. Everything else we google and we all have to google 21 and 3389 because we all forget them half the time anyway.
This is a great explanation, pretty much what I would have said
Fair enough. I used to use Manjaro and it broke, cannot remember why. I moved to ubuntu sometime later and I’ve never left. Some would say that makes me a bad linux user, I would say I use an operating system that gets out of my way and let’s me use it. Use whatever tool gets the job done fastest!
Personally, no, i havent used manjaro in years. However, it’s frequently spoken about problem in the community so im sure someone else can help you. Or you could look up people talking about it.
Not the above poster but Manjaro routinely pushes out broken packages, has had a number of issues with security (not renewing their tls certificates for their website) and is all around not stable. Arch is a predictable unstable, manjaro is an unpredictable unstable attempt at stable.
I mean how the community refers to him. I’ve never read a thread where someone called Linus a BDFL, I have with python. If they do, they do. Just haven’t seen it myself.
So I did miss that Linus is in the article, but the reference to him says he was awarded the title, which makes it sound like an honour rather than a hierarchical system. I don’t believe that he’s ever been anything other than the projects owner/founder but I’m happy to learn if I’m wrong.
Youre thinking of python I reckon -link to wikipedia
I work in cyber security. Loads of businesses will do all the cybersecurity stuff using a combination of tools on Azure and security OS’s like Kali and Parrot.
Not the shark fucker but could you send me the guide on how to do this? I would love to set this up. Also does it work for multiple accounts?
The Windows network troubleshooter is black magic from the depths of hell itself and is very opinionated and selective in choosing which issues to fix and whether you’ll need to bargain your soul to recieve said fix. I have red hair and find it doesn’t bother bartering with me, but your mileage may vary.
All goof, enjoy your alternatives!