On 2/23/20 5:00 AM, Curt wrote:
I never understood the actual procedure for unmounting when gvfsd was
doing it;s thing, nor how to prevent the whole mess in the first place
(short of doing without gvfsd, et al).
Well, at any rate, I can only believe your deal here (*completely*
unrelated to
Hi Raj,
Quoting Raj Kiran Grandhi (2020-02-24 03:41:00)
> Since upgrading to Buster, the search functionality for some packages
> like python-numpy-doc and python-matplotlib-doc is no longer working.
> The search page just displays the progress indicator graphic without
> generating any
Philippe LeCavalier wrote:
>> > Sophos has ai learning and threat analysis mitigation tactics built in.
>>
>> In which way does it make my statement false?
>>
>> And more importantly, are there known cases where it detected an attack
>> before the corresponding security hole had been found? How
Since upgrading to Buster, the search functionality for some packages
like python-numpy-doc and python-matplotlib-doc is no longer working.
The search page just displays the progress indicator graphic without
generating any results. This is an issue for me as my primary work
computer has no
I've bent my system bad. When I boot, it comes up in the CLI -- not in
slim, to XFCE. It does the regular login and the .bashrc tricks, and
startx starts XFCE just fine.
I was trying to get my router to copy its config to the TFTP dir, and I
did something from how-tos on the 'Net (all kinds of
On Sun, Feb 23, 2020, 17:28 Stefan Monnier wrote:
> >> > defense in depth / layered defense... would you recommend having a
> Linux
> >> > anti-malware?
> >> No. All those only try to recognize known threats. When a threat is
> >> known, the security hole it exploits is also known, and the fix
>> > defense in depth / layered defense... would you recommend having a Linux
>> > anti-malware?
>> No. All those only try to recognize known threats. When a threat is
>> known, the security hole it exploits is also known, and the fix for it
>> already exists as well, so updating your
On Sun, Feb 23, 2020, 15:13 Reco wrote:
> Hi.
>
> On Sun, Feb 23, 2020 at 02:07:00PM -0500, Philippe LeCavalier wrote:
> > On Sun, Feb 23, 2020, 14:04 Stefan Monnier
> wrote:
> >
> > > > defense in depth / layered defense... would you recommend having a
> Linux
> > > > anti-malware?
> >
Hi,
udisksctl -b unmount /dev/sr0
seems to work for the user who has problems with sudo umount.
I write "seems" because feedback is still a bit sparse.
Unmounting by directory name turned out to be too much prone to user
error. I am not sure whether it would work on that system.
Have a nice
On Fri, Feb 21, 2020 at 09:58:10PM -0600, Mark Allums wrote:
Explain this, then:
george@martha:~$ udisksctl unmount -b /dev/sdb1
Unmounted /dev/sdb1.
george@martha:~$ sudo e2fsck -c -c -k -p -f -C 0 /dev/sdb1
/dev/sdb1 is in use.
e2fsck: Cannot continue, aborting.
Can you repeat this, but
Hi.
On Sun, Feb 23, 2020 at 02:07:00PM -0500, Philippe LeCavalier wrote:
> On Sun, Feb 23, 2020, 14:04 Stefan Monnier wrote:
>
> > > defense in depth / layered defense... would you recommend having a Linux
> > > anti-malware?
> >
> > No. All those only try to recognize known threats.
Hi.
On Sun, Feb 23, 2020 at 08:31:59PM +0100, l0f...@tuta.io wrote:
> 23 févr. 2020 à 18:02 de recovery...@enotuniq.net:
>
> > Clever, but not any filesystem supports ACL.
> > And you would have created a problem by your own hands if you're doing
> > backups (depends on a type of a
I agree with this deeply. It's surprising the amount of machines I see
that have some fancy subscription-based and expensive AV but have the
firewalls, SELinux, UAC disabled along with weak filesystem and sharing
ACLs.
It's fine to get a good AV running on the system but they don't detect
Hello,
Thanks for your answer :)
23 févr. 2020 à 18:02 de recovery...@enotuniq.net:
> Clever, but not any filesystem supports ACL.
> And you would have created a problem by your own hands if you're doing
> backups (depends on a type of a backup, of course).
>
Interesting... but I'm using ext4
On Sun, Feb 23, 2020, 14:04 Stefan Monnier wrote:
> > defense in depth / layered defense... would you recommend having a Linux
> > anti-malware?
>
> No. All those only try to recognize known threats. When a threat is
> known, the security hole it exploits is also known, and the fix for it
>
> defense in depth / layered defense... would you recommend having a Linux
> anti-malware?
No. All those only try to recognize known threats. When a threat is
known, the security hole it exploits is also known, and the fix for it
already exists as well, so updating your distribution to the
Ivan Jurišić wrote:
> My choice is ClamAV. Easy for use and configure.
>
but without commercial antivirus database updates, you can not do much.
I also think those are usable for servers and businesses with multiple
users. Otherwise it simply does not pay off.
Hi Philippe,
Philippe LeCavalier wrote:
>I definitely disagree with merely doing backups and updates. You could
>say the same for any OS. That is no means of keeping yourself safe.
I agree. I have not witten about backups & updates - they are obvious
and so not worth to mention.
--
mlnl
On Sun, Feb 23, 2020, 6:03 AM mlnl wrote:
>
> I think, it is more important & usefull to audit & harden/secure your
> system, kernels (KSPP), services and applications with IDS/IPS (e. g.
> Samhain), MACs like AppArmor, systemd-analyze security unit, secured
> sudoers file, use of additional 2FA
On Sun, Feb 23, 2020, 07:03 mlnl wrote:
> Hi l0f...@tuta.io,
>
> l0f...@tuta.io wrote:
>
> >Considering the fact I am human so not perfect at all + other notions
> >like defense in depth / layered defense... would you recommend having
> >a Linux anti-malware?
>
> I have used clamav, linux
Hi.
On Sun, Feb 23, 2020 at 05:31:21PM +0100, l0f...@tuta.io wrote:
> What is the best practice please to allow a program to write its logs into my
> home folder?
Normally I follow "give the asking one whatever's asked" rule, but here
I just have to ask - what exactly you've achieved
Hi,
What is the best practice please to allow a program to write its logs into my
home folder?
So far for example, I've configured msmtp to write logs into
/home/l0f4r0/.msmtp.log.
By default, msmtp doesn't have any write permission for this file so I have
managed this case by affecting msmtp
On Sun, Feb 23, 2020 at 11:40:36PM +1030, heman wrote:
> Hi,
>
> I've read https://www.debian.org/Bugs/Reporting
> but it is still completely unclear to me how I can report what I
> consider to be a bug or flaw with the debian docker image [...]
That depends on where you got this Debian docker
Hi,
I've read https://www.debian.org/Bugs/Reporting
but it is still completely unclear to me how I can report what I
consider to be a bug or flaw with the debian docker image, as it is
not a package, but a container image created from multiple packages.
(from reading the page at the above URL it
Hi l0f...@tuta.io,
l0f...@tuta.io wrote:
>Considering the fact I am human so not perfect at all + other notions
>like defense in depth / layered defense... would you recommend having
>a Linux anti-malware?
I have used clamav, linux malware detect with 3rd party repos like
sanesecurity just for
didier gaumet a écrit :
Justement. Il me semble que le mieux, là-dedans, c'est Requires...
(Google Groups a l'air toujours dans la panade alors je te réponds
directement à partir de l'archive mail trouvée sur le net)
Je peux avoir mal compris la page man de systemd.unit(5) mais ce que
j'en
On 2020-02-23, Mark Allums wrote:
> On 2/22/20 8:36 AM, Curt wrote:
>> On 2020-02-22, Mark Allums wrote:
But does not require superuser, if udisks2 mounted it on your user's
behalf in the first place.
>>> Explain this, then:
>>>
>>> george@martha:~$ udisksctl unmount -b
Le dimanche 23 février 2020 00:40:05 UTC+1, Anastasios Lisgaras a écrit :
[...]
> I don't want to tire you out, but I would love to learn my operating
> system thanks to this misfortune. If they were in my position a system
> administrator or a software developer or a hacker about Debian
>
Bonjour
Je viens de passer la commande: dpkg-reconfigure mate-media
mate-media-common libmatemixer0 libmatemixer-common
ET CA FONCTIONNE :D :D. J'ai a nouveau du son
Merci a tous pour votre aide.
Cordialement
Hugues
Le sam. 22 févr. 2020 à 12:27, a écrit :
> Le samedi 22 février 2020
> Justement. Il me semble que le mieux, là-dedans, c'est Requires...
(Google Groups a l'air toujours dans la panade alors je te réponds
directement à partir de l'archive mail trouvée sur le net)
Je peux avoir mal compris la page man de systemd.unit(5) mais ce que
j'en retire c'est que :
-
On 2/22/20 8:36 AM, Curt wrote:
On 2020-02-22, Mark Allums wrote:
But does not require superuser, if udisks2 mounted it on your user's
behalf in the first place.
Explain this, then:
george@martha:~$ udisksctl unmount -b /dev/sdb1
Unmounted /dev/sdb1.
george@martha:~$ sudo e2fsck -c -c -k
My choice is ClamAV. Easy for use and configure.
Dana 2020-02-23 09:47, l0f...@tuta.io je napisao(la):
Hi,
I understand the pro of having a Linux antivirus on a Linux server, especially
a mail or file server.
However I'm writing to you here for a personal Linux workstation (Debian 10)
and I
Hi,
I understand the pro of having a Linux antivirus on a Linux server, especially
a mail or file server.
However I'm writing to you here for a personal Linux workstation (Debian 10)
and I think I have a rather safe higiene on the internet globally already (I'm
really careful on what I click
On Sun, Feb 23, 2020 at 09:47:18AM +0100, l0f...@tuta.io wrote:
> Hi,
>
> I understand the pro of having a Linux antivirus on a Linux server,
> especially a mail or file server.
> However I'm writing to you here for a personal Linux workstation (Debian 10)
> and I think I have a rather safe
34 matches
Mail list logo