Jump to content

All Activity

This stream auto-updates

  1. Today
  2. V.T. Eric Layton

    can't enable mic in Window 11

    Well, I can't advise from first hand experience, but maybe this is what you're looking for: https://allthings.how/how-to-enable-or-disable-microphone-in-windows-11/
  3. I have a karaoke app that isn't listed in mic privacy settings under "Let desktop apps access your microphone". How can I enable mic for that app in Windows 11?
  4. So, basically... Fear, uncertainty and doubt (often shortened to FUD) is a propaganda tactic used in sales. I suspected this a bit. No fault on @Corrine's part in posting this, though. Always good to be aware of what's going on out there in Cyberland. Thanks, @securitybreach!
  5. I bet it's them pesky MS drones...
  6. Yesterday
  7. I hate to say it but it looks like sysdig is simply trying to advertise their product: Quoted from the end of article https://sysdig.com/blog/proot-post-explotation-cryptomining/ They claim that they discovered threat actors using Proot but give no proof, not even a CVE warning or anything. So this company found a vulnerability but never bothered to report it or anything? There wasn't even anything on Full Disclosure or any of the security lists. https://sysdig.com/opensource/falco/
  8. Oddly enough after searching, I seen no other article talking about this story besides bleepingcomputer which simply reposted the one from sysdig. The only other instance was NsaneForums.com and they just reposted the bleepingcomputer article of the sysdig one. I tried to find more stories by searching: linux proot hijack linux proot linux hijacked I seen older articles not related to the story but nothing on what sysdig reported. Also, the source linked on the bleepingcomputer website is simply a reshare of what sysdig claimed word for word. https://sysdig.com/blog/proot-post-explotation-cryptomining/ I find this strange as BleepingComputer is normally a credible site.
  9. If it is physical access, then it is a non-issue as there are lots of ways of getting into a unencrypted system with physical access. That and its an issue with Proot which is not installed on most distros by default as they use chroot instead. On to read more about it.
  10. True. I can access all unencrypted files on any system with the Porteus that I keep on a thumb drive on my wallet chain.
  11. Would this hack be of more interest in compromising server systems than desktop systems? It seems to me that if an attacker already has physical access to your machine you have more problems than Proot execution. Another example of all the hoops you have to go thru to hack a Linux system versus running some malware code in Windows.
  12. OK, after a little reading here and there online, I found that PRoot is nothing new. The application has been around for years. From everything I'm seeing, it can allow one to use PRoot to access an existing system where the root password has been forgotten or never previously known. Once in the Proot environment, a user can change the root password of the existing system. After rebooting, this would allow root access on the system. NOTE, though: PHYSICAL access to the machine is necessary to perform this "hack". I'm not sure how this "threat" above would be done on a remote system. For instance, in my case... a hacker would have to know my IP address (which changes with every new boot). They would then have to get past my router's firewall, and beyond that, my system firewall (IP Tables). Those would NOT be easy things to do, I don't believe. It would be much more difficult with a VPN, also. So, not being an expert in Linux, I'm not totally sure what's going on here. Maybe @securitybreach would be able to explain it better?
  13. Interesting, but a bit beyond my pay grade. I don't quite understand how this hack is done. The article doesn't give details, obviously.
  14. V.T. Eric Layton

    Skylake crashed --- will there be survivors !!!!

    That might work.
  15. Via Bleeping Computer at Hackers hijack Linux devices using PRoot isolated filesystems: More info at the referenced article.
  16. crp

    Skylake crashed --- will there be survivors !!!!

    You can't just lick the ends?
  17. ( not really Linux but there is no generic software forum and i think this is the closest forum ) Open-Source hoster has exhausted the volunteer base capabilities and will be kaput quite soon. Criminality involved? Perhaps not, but having the only person with access to the bank accounts disappear doesn''t look good.
  18. Last week
  19. UH...Houston we have a problem!
  20. V.T. Eric Layton

    Skylake crashed --- will there be survivors !!!!

    All you need is a volt meter and the pin-out/color code for your particular PSU; easily found on the Internet. - unplug the main connector from the PSU to the mobo (all voltages are present on that plug) - you can usually "activate" (turn on the PSU) by shorting two pins on the plug.... often the dark green wire & any black wire (GND). This fools the PSU into thinking it's receiving the "turn on" notice from the PSU. - once you have it powered up, you can check each of the voltages (+12, -12, +5, -5, etc.) I doubt, though, that this is a PSU issue. It still sounds to me like an intermittently working RAM socket... or possibly bad solder joint on the back side of the socket (quite a common problem in cheap crap Chinese stuff these days, sadly).
  21. V.T. Eric Layton

    Skylake crashed --- will there be survivors !!!!

    When booting up, do you hear your Post Beep? If so, how many beeps/duration are you hearing when the unit does NOT boot properly. Also, what is the manufacturer of your mobo. Beep codes can be VERY helpful in determining issues; at least pointing you in the right direction.
  1. Load more activity
×
×
  • Create New...