• 0 Posts
  • 72 Comments
Joined 4 years ago
cake
Cake day: January 17th, 2022

help-circle











  • utopiah@lemmy.mltoLinux@lemmy.mlAntiviruses?
    link
    fedilink
    arrow-up
    0
    ·
    7 days ago

    Thanks, it’s quite interesting but again IMHO it relies on bad practices. If you’ve been compromised and you “restore” (not in an sandboxed environment dedicated to study the threat) then you are asking for trouble. I’ll read a bit more in depth but the timeline I see 1987, 1998, 2017 show me this is a very very niche strategy, to the point that it’s basically irrelevant. Again it’s good to know of it, conceptually, but in practice proper backups (namely of data) remains in my eyes the best way to mitigate most problems, attacks and just back luck (failing hardware, fire, etc) alike.


  • utopiah@lemmy.mltoLinux@lemmy.mlAntiviruses?
    link
    fedilink
    arrow-up
    0
    ·
    7 days ago

    12 years ago I took “Malicious Software and its Underground Economy: Two Sides to Every Story” and it was quite interesting not so much for the technical aspect (which was still nice) but for the economical aspect that is often underappreciated. The core idea was that scammers or hackers might be doing it for fun, as you did, or learning, as I did… but the ones who keep on doing it sustainably make money out of it, consequently they are predictable. Namely they need repeatable methods that scale or that target a specific group. I really recommend taking a similar class but anyway, the big picture here is sure, maybe AV would miss such things and yet it wouldn’t really matter because nearly nobody does that and/or it wouldn’t propagate much.


  • utopiah@lemmy.mltoLinux@lemmy.mlAntiviruses?
    link
    fedilink
    arrow-up
    0
    ·
    7 days ago

    That doesn’t make much sense to me, one backup data, not executables or system. Even if they were to be saved in the backup then they wouldn’t get executed back.

    Anyway, that’s still conceptually interesting but it’s so very niche I’d be curious to hear where it’s being used, any reference to read on where those exist in the wild?



  • It’s not just for Linux but :

    • there is an error message somewhere

    It’s fundamental because instead of saying “It doesn’t work!” and get no useful help, people must think of it as an investigation (or whatever get them going) looking for clues. Until you get the right message and can provide the right context (e.g. what computer are you using, what OS version, etc) then you get generic help which is like looking for a needle in a haystack. Sure it’s not entirely impossible if you are both lucky and patient but you are doing yourself and others a huge disservice.

    Before Linux maybe they were used to black boxes but here, nobody is intentionally trying to hide away anything from you!

    PS: bonus, notes are basically free. Jolt down notes about anything and everything you are learning. Don’t just “use” a computer, LEARN how to use a computer.




  • You did. Well my point is that nobody needs this kind of equipment in the first place anyway because 99% of “useful” stuff done by an average officeworker isn’t actually LLM it’s usually STT. The rest, e.g. GenAI with videos is for shit&giggles, vibe coding doesn’t work except few super tiny narrow cases (e.g. transforming a file quickly without caring for 100% accuracy and when converters don’t already exist) and last but not least genAI on text itself is mostly used for spam, scan and cheating at school.

    So… please don’t felt “left behind” if you can’t self host this kind of tools, it seems to me it’s nearly never justifiable!