• 0 Posts
  • 7 Comments
Joined 1 year ago
cake
Cake day: October 19th, 2024

help-circle

  • No you are in a thread about numerous war crimes that led to the kidnapping of a country’s leader and overthrow of a sovereign nation. As well as the plundering of the wealth for an entire country.

    The well aCtUALly here is people sidelining the war crimes discussion into an endless debate about red and blue. The factv is basically every US president since WW2 has been guilty of war crimes and all americans can do is argue about red and blue.

    She made it clear she was an imperialist by refusing to condemn a genocide that was being carried out with US weapons and sold to the genocidal regime under her tenure as vice president.

    To be clear Trump is a pedophile rapist war criminal as well. Please dont dismiss me as an apologist for either of them.



  • I used vanilla arch as a daily driver for about 3 years and I loved it. but started to need a more ephemeral OS and switched to atomic fedora and centos/Alma precisely for the defaults. So i know you asked about cachyOS and I dony have an answer there. So you can skip the rest of this if that is all you wanted. Im not saying RHEL or bust. Each person has their own needs and i highly recommend just going and doing the hard things yourself to learn, but I get it that it isnt possible for everyone.

    What defaults? Several. 1st SELinux. 2nd ability to select old kernels on boot. 3. Firewall enabled out of the box.

    Sure you can do a lot of additional hardening and nothing is to stop a simple bash script from setting these up on Arch, but I figured I only know a little bit and those have saved my ass multiple times. So there are probably other things the folks in that ecosystem have figured out that I dont know about yet.




  • Here is the thing, does the corporate entity you work with use Microsoft? Then your password is stored as an NTLM hash in NTDS.dit. That means you are using MD4.

    Has anyone in your organization clicked a phishing link? It only takes one weak link to get in. Then it only takes one (Maybe 2) bad configuration for a malicious actor to escalate privileges. Then dump the whole organization passwords from the Domain Controller.

    Hope you aren’t reusing passwords anywhere.