joshcodes

joined 1 year ago
[–] joshcodes@programming.dev 1 points 3 months ago

I'm thinking data entry for threat hunters, and integrations with our other platforms apis but I couldn't say anything specific. SSDs are a good shout, I might have tried setting it up with hdds if you hadn't said.

Did you find it easier to add connectors in seperate docker containers or within the main octi container?

It feels like there's a pretty high ceiling for this platform and the data you can generate. Do you find it easy to create good data? Do you have any habits?

I'm pretty keen to learn so feel free to answer what you can.

[–] joshcodes@programming.dev 2 points 3 months ago

So save files exist. Also custom user content. So the hash will change accordingly. Plus some cheats don't require a modification of game files anyway, they use memory analysis to get, say, the location of other player objects, then they manipulate local information to give the player an advantage. This is how aim hacks and wall hacks work.

Cheats are hard to prevent for the sole reason of you don't own the computer they could be running on. You can't trust the user or the machine, and have to design accordingly. This leads many to the "solution" that is kernel level anticheat, it gives total access to the system.

[–] joshcodes@programming.dev 2 points 3 months ago

Not who you asked, but did you ever hear of Valiant and their kernel level anti cheat.

This is not a 1:1 comparison but anticheat software running in the kernel has the ability to monitor all other processes due to its permission levels. It can monitor all scheduled tasks and infer from that information.

Drivers need similar access but for different reasons, they need access to os functionality a user would absolutely never be granted. This is because they interface directly with hardware and means when drivers crash, they generally don't do it gracefully. Hence the BSOD loop and the need for booting windows without drivers (i.e. safe mode) and the deletion of the misconfiguration file.

[–] joshcodes@programming.dev 1 points 4 months ago

Really don't care much about my cv. This program is a great way to learn about the STIX protocol so no idea what you mean about "no actionable skills". STIX is an interesting information sharing method, the program is well designed to educate the user on it and seeing the format it imports and exports data will teach me a buttload.

More to the point, maybe could you be less cynical and share some advice. I'm not going to flex my qualifications cos they're mediocre but I've got smart people around me who just don't know this particular program and I'm interested to hear from those who do.

Do you run this program at work or at home? Have you learned anything interesting from using it? Are there avoidable mistakes I could not repeat from hosting it? Answers to those questions would be very useful.

[–] joshcodes@programming.dev 1 points 4 months ago

I dont see myself doing too much configuration with connectors to begin with which brings some of the difficulty down. I was asking to see if others run anything similar in their home configuration. I've met people who run MISP from home before so it sounded feasible to me.

I was also looking for the community aspect of this, I already knew they had a docker-compose config. I wanted to know who had attempted this before and what they'd learned, that sort of thing.

[–] joshcodes@programming.dev 3 points 4 months ago

Only man I've ever seen pick shit from between his toes and eat it while having a philosophical discussion about FOSS.

10/10 agree with the ideology and think he's an amazing programmer 0/10 agree with his culinary recommendations

https://piped.video/watch?v=Rhj8sh1uiDY&t=11

[–] joshcodes@programming.dev 6 points 4 months ago

Eyyyy, I'm on Mint!

[–] joshcodes@programming.dev 10 points 4 months ago (8 children)

My bad, what linux distro you running?

[–] joshcodes@programming.dev 68 points 4 months ago (11 children)

Nice try Microsoft, I still don't like your monthly "small" ui changes that hide the features I use and add extra "get copilot now" buttons

[–] joshcodes@programming.dev 7 points 5 months ago

I'll go so far as to say that you shouldn't click any links coming from a business via text. Nor should you call a number that starts with anything other than 1300 (again, if solicited by text). Go directly to the banking app or mygov and call the number on the contact/support page.

If the fraud department rings then get the name of the caller, hang up, call the number in their app or on their site and tell them you just had a call. If they don't know you, you just dodged a scam. Otherwise, continue and listen to them. If the fraud department thinks you're being scammed, they're probably right.

[–] joshcodes@programming.dev 3 points 5 months ago (1 children)

In the update settings she can reset her apt sources back to "default". It's not too hard and there's a gui throughout the process (from memory).

The package conflicts is an interesting one, if you have the time to post one of these on lemmy I'm sure someone will suggest a fix. It's probably a apt install --fix-broken or something simple (hopefully) but I'm sure we could work it out.

Totally agree that these are annoying issues though. See if you can use Nala, it's a TUI front end for Apt and it's got some nice user changes like if you run upgrade it updates and upgrades. It also has a fetch feature which finds nearby sources, so you're always downloading from the closest/fastest source.

[–] joshcodes@programming.dev 12 points 5 months ago

Highly recommended Automate the Boring Stuff. It'd a free tutorial on YouTube and you learn things like printing, using numbers, then opening files and manipulating data. It's useful straight away.

view more: ‹ prev next ›