• 1 Post
  • 185 Comments
Joined 2 years ago
cake
Cake day: June 23rd, 2023

help-circle




  • 520@kbin.socialtoLinux@lemmy.mlLinux for Kids?
    link
    fedilink
    arrow-up
    4
    ·
    1 year ago

    I learned to program when I was 10 on a Commodore 64. And we would wear an onion on our belt which was the style at the time… Sorry, where was I?

    Totally get that, but we live in a much more dangerous and predatory computer landscape these days. It would be foolish not to take some precautions.


  • 520@kbin.socialtoLinux@lemmy.mlLinux for Kids?
    link
    fedilink
    arrow-up
    12
    arrow-down
    2
    ·
    edit-2
    1 year ago

    Standard Ubuntu should have you covered.

    One word of warning though, don’t be too egregious with the parental controls. If your kids are motivated enough, they will find a way around it.

    Education really is your best weapon here. Tell them about the dangers of the modern web and computing.




  • In the long term it might have a bad effect on the market, as it further helps to cement Microsoft’s control over multimedia APIs, since game developers now have little incentive now to target anything other than DirectX…

    However, there are others that would argue that Microsoft’s control over multimedia APIs was fully cemented since decades ago, and developers have never had much incentive to target anything other than DX since then.

    Back in 2014, Valve tried to bring Linux gaming to the spotlight by offering solid and targetable APIs for developers to port their games. This approach failed hard, and most games had serious deficiencies because most publishers would rather stick a half-assed DX wrapper (like DXVK only infinitely worse) than actually do the work for a proper port.

    So, with only a handful of games and what did appear was usually worse than on Windows, releases stopped coming after a year or so.

    This is why we have DXVK and Proton today.





  • You would think you’d already have problems if someone’s managed to compromise one or more of your containers without you knowing though whether they can get the host or not

    True, but the security idea behind being in a containerised environment is that your problems aren’t immediately made worse by the fact that your database server is on the same machine as your web application - since they’d both be on separate but networked containers.

    What if anything do people do about anti virus in containers?

    The real threat to containers isn’t AV-detectable malware, but Remote Code Execution (RCE) exploits.

    Containers are best used as single purpose installations. With that configuration, it isn’t easy to get non-standard executables - including malware - onto a container.

    Most RCE exploits also don’t involve the dropping of malware files onto the file system. There are some that do, but that issue is better handled in other ways.

    Why? Well AVs only do something about binaries they know or think to be malware. A well crafted, customised Cobalt Strike beacon (aka: malicious remote control software) will blow through any resistance an AV has to offer.

    So what do we do? Remember what I said that containers are best used as single purpose installations? Therefore you know exactly what executables should be running, making it trivial to set up executable whitelisting. That means that any executable not on the list will not run.

    But even that isn’t completely bulletproof. It won’t do much against web shells, in which case your best detection mechanism is to look for applications calling /bin/bash or /bin/sh that shouldn’t be.