Idk, probably not around kids…?
Idk, probably not around kids…?
This advice feels a lot like something that should be stuck on a wall rather than posted as a comment in a conversational subreddit. It’s kind of like reminding people on posts about alcohol and partying not to drink and drive - unprompted. Reminders like this are great, but setting and context are important, otherwise you drive people away from the conversation.
A cultured individual indeed, they’re my favourite band
I see a potential fellow days n daze enjoyer…?
Frequency analysis? Tokenisation? Not sure if either of those are what you mean
Always back up your stuff, but after doing so, the process is pretty much boot to bios, set boot priority with linux usb at the top, and away you go.
If you have secure boot enabled, you might have to enter a pass code or passphrase but otherwise its identical to traditional bios. If you want secure boot, which prevents someone else from doing this process to your machine, re enable after you’ve installed nvidia drivers otherwise you’ll have to provide it your secure boot password during and sometimes it likes to break.
After 3-4 years of using python I’m bumping you up to a 7 so I can fit in at a 5. Congrats on your upgrade. I’ve never contributed to open source but I’ve fixed issues in publocly archived tools so that they aren’t buggy for my team. I can see errors and know what likely caused them and my code literacy is decent. That being said, I think I’m far from advanced.
Not defending windows 11 in any way, but on install, when you get to the “login to your microsoft account” screen, if you open command prompt (ctrl + f10 i think) and open the network utility - type ncpa.cpl
, then you can find and disable your network adaptor. Close cmd and the network utility and click back. It will ask you to create a local user.
I’ve done this a couple of times and it hasn’t forced me to create a Microsoft account yet (I use a lot of windows vms). If this no longer works on win11, apologies, it used to.
Run it in your head, find the edge cases yourself, fix the bug… weakling.
Or do what I do in real life which is patch in new bugs and even a security flaw or two.
I saw this, said wtf, left this post and it was 2 down…
Yeah like if it even partially functions as intended, it is not a brick. I once attempted flashing firmware to a motherboard, only for my power to go out midway through. Kaput, $200 down the drain, I no longer had an electronic device, I had the world’s most expensive paperweight.
All goof, enjoy your alternatives!
I’ve read your update but try Terminator. You use alt + arrow keys to navigate multiple on screen terminals, create new ones with ctrl+e/o and its my favourite. I highly recommend giving it a try!
I’m thinking data entry for threat hunters, and integrations with our other platforms apis but I couldn’t say anything specific. SSDs are a good shout, I might have tried setting it up with hdds if you hadn’t said.
Did you find it easier to add connectors in seperate docker containers or within the main octi container?
It feels like there’s a pretty high ceiling for this platform and the data you can generate. Do you find it easy to create good data? Do you have any habits?
I’m pretty keen to learn so feel free to answer what you can.
So save files exist. Also custom user content. So the hash will change accordingly. Plus some cheats don’t require a modification of game files anyway, they use memory analysis to get, say, the location of other player objects, then they manipulate local information to give the player an advantage. This is how aim hacks and wall hacks work.
Cheats are hard to prevent for the sole reason of you don’t own the computer they could be running on. You can’t trust the user or the machine, and have to design accordingly. This leads many to the “solution” that is kernel level anticheat, it gives total access to the system.
Not who you asked, but did you ever hear of Valiant and their kernel level anti cheat.
This is not a 1:1 comparison but anticheat software running in the kernel has the ability to monitor all other processes due to its permission levels. It can monitor all scheduled tasks and infer from that information.
Drivers need similar access but for different reasons, they need access to os functionality a user would absolutely never be granted. This is because they interface directly with hardware and means when drivers crash, they generally don’t do it gracefully. Hence the BSOD loop and the need for booting windows without drivers (i.e. safe mode) and the deletion of the misconfiguration file.
Really don’t care much about my cv. This program is a great way to learn about the STIX protocol so no idea what you mean about “no actionable skills”. STIX is an interesting information sharing method, the program is well designed to educate the user on it and seeing the format it imports and exports data will teach me a buttload.
More to the point, maybe could you be less cynical and share some advice. I’m not going to flex my qualifications cos they’re mediocre but I’ve got smart people around me who just don’t know this particular program and I’m interested to hear from those who do.
Do you run this program at work or at home? Have you learned anything interesting from using it? Are there avoidable mistakes I could not repeat from hosting it? Answers to those questions would be very useful.
I dont see myself doing too much configuration with connectors to begin with which brings some of the difficulty down. I was asking to see if others run anything similar in their home configuration. I’ve met people who run MISP from home before so it sounded feasible to me.
I was also looking for the community aspect of this, I already knew they had a docker-compose config. I wanted to know who had attempted this before and what they’d learned, that sort of thing.
Only man I’ve ever seen pick shit from between his toes and eat it while having a philosophical discussion about FOSS.
10/10 agree with the ideology and think he’s an amazing programmer 0/10 agree with his culinary recommendations
Eucalypt scented products are very common in Australia so we tend to get those a lot. Thankfully I love the smell of Eucalypt