mentally retarded user
kiwifarms.net
- Joined
- Aug 19, 2022
So you be sayin' they are Indian, but they are going further than simply editing the README.md
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.







most of the impressive CVEs were closed in the early 2000s and had thier fixes implemented fundamentally in all future software. Now all that's left are the "running this file with this program under x conditions will lead to privilege escalation"A lot of CVEs are also
RHEL (bigname) and derivatives (SME) are industry standard. Ubuntu never was and never will be standard for enterprise server infrastructure simply of how short their default support window is and the quality of their extended support window relative to its pricing.businesses which rely on coreutils
They market themselves as "industry standard" but when you look at the platforms the industry has actually standardized on, things look quite different, at least from my stand point. I have not personally encountered a single organization running RHEL. My alma mater was Ubuntu. The Fortune 500 I worked for refused to touch RHEL. The Microsoft shop I worked at used whatever shipped, which involved Debian, Alpine, and a couple more esoterics. Any pros here whose companies actually run RHEL or derivatives?RHEL (bigname) and derivatives (SME) are industry standard.
Every German firm I worked for used RHEL or CentOS when it was a thing. RHCSA as far as I am aware is still an informal hard requirement for junior technicians.The Fortune 500 I worked for refused to touch RHEL
You will use systemd and selinux and you will love it.At this point, given how much RedHat has pozzed the Linux neghole, I refuse to touch RedHat-upstream distroes.
All maintainers should aggressively require including a patch to fix the issue and a test case at bare minimum. It has been virtually impossible to tell the difference between a contributor and a mooch for a long time; and with the ramp-up of lusers over the decades, the return of gatekeeping curmudgeons is necessary for any project's health.But hey, he volunteers to write patches!
Yes. Most of my customers(Fortune 500) are primary RHEL. A couple are dipping their toes into Ubuntu, not sure if they're looking for paid support or not on those.Any pros here whose companies actually run RHEL or derivatives?
i'm not exactly opposed to the idea of bug reports in general. they can be valuable for less technical users to report bugs as long as they follow some simple criteria:All maintainers should aggressively require including a patch to fix the issue and a test case at bare minimum.
agreed, but i think the issue of retarded drooling subhumans submitting the shittiest patches imaginable has been a thing since before there was a decent free kernel to run the gnu system onand with the ramp-up of lusers over the decades, the return of gatekeeping curmudgeons is necessary for any project's health.
Yeah, this is a problem. I've worked with a lot of security folks who boil their job down to "run Rapid7/Nessus/Qualys/etc. on a box and give results", then they either resist or give me a blank stare when I look into their results and find false positives or point out the CVEs have mitigation so nbd. I've worked with a lot of SAs, being one myself, and the number who have zero clue about security, and the inverse, security folks who know fuck-all about operating system stuff, is staggering.A lot of CVEs are also
>if someone has access to your machine...
>if you run a shady file engineered in this exact way it could...
>if you happen to be in this very particular scenario and the next part in the memory is...
Yeah don't keep passwords unencrypted in the database, but if an attacker has to come down your chimney and stick a USB in your computer for it to work maybe you should mount a grate on it instead of putting locks on every single USB slot in your computer.
Maybe in Germany, but not here in Freedomland. I've only seen it for MSPs or the like where they use that as a selling point.RHCSA as far as I am aware is still an informal hard requirement for junior technicians.
I'm pretty sure at least the US government is running RHEL. I'm sure there are a lot of others using it too.Maybe in Germany, but not here in Freedomland. I've only seen it for MSPs or the like where they use that as a selling point.
Fujitsu built a COBOL.NET compiler in the mid 2000s to allow for migrating COBOL code from various old COBOL implementations onto windows servers. There are a lot of COBOL implementations. Almost all of them are not open source. For Javascript, Bun, Node and Deno are all in heavy use (although you can argue Deno/Node both use Vda - only GNAT is active (1 impl). Prolog/Forth/COBOL - lmao. JS - ok, maybe node & bun are active, independent and compatible. ML - which ML? sh - not general purpose. Java - they are all downstream from openjdk.
Yeah, this is a problem. I've worked with a lot of security folks who boil their job down to "run Rapid7/Nessus/Qualys/etc. on a box and give results", then they either resist or give me a blank stare when I look into their results and find false positives or point out the CVEs have mitigation so nbd. I've worked with a lot of SAs, being one myself, and the number who have zero clue about security, and the inverse, security folks who know fuck-all about operating system stuff, is staggering.
Cybersecurity class? The most bullshit IT profession out there. Has anyone worked in a single company where the IT security team wasn't horrifically incompetent? They almost never have a single developer. One security team tried to offer me a job because they literally had no one to write scripts, and were manually reviewing threat logs. Another company tried to push us to use Red Hat Enterprise over our current VM distros because the security was apparently better if you pay for overpriced IBM shitware. They also mandated Crowdstrike/Falcon, because they were retarded.
I am not surprised at all this was in a security class. Anyone decent at it is not working in any official capacity and just makes money off of bug bounties and real software development.
US public sector is running whatever as they don't require vendor-specific certificates. Instead they want a multivendor generalized CompTIA certificate. US DoD wants Security+/CySA+ for example.US government is running RHEL
RHEL also employs a very large number of kernel and userspace maintainers.RHEL (bigname) and derivatives (SME) are industry standard. Ubuntu never was and never will be standard for enterprise server infrastructure simply of how short their default support window is and the quality of their extended support window relative to its pricing.
RHEL offers 10 years of support for their releases by default plus 3 years of extended maintenance where ubuntu typically does 5 by default +5 extended maintenance for paid customers +2 legacy for corporate where you have to demand fixes from them. It also comes without any ham-fisted decisions inexperienced retards can approve and push through much to the displeasure and inconvenience of end clients.
The "eventually" is the problem, you have to get through 30 layers of "Please saar to be sending us SOS Report". You mean the one I attached when I opened the case because I'd know you'd ask? My rule is I should be able to fix the problem before RH does or I'm not doing my job correctly. It's more fun when you open the support request with "Here's the SOS Report. Here's the kernel patch. Please to be sending to someone competent." And it does finally hit the kernel 6 months later.You can hate RedHat an IBM if you want, but if you are a large customer and have a support contract with RHEL and have a kernel issue. Chances are that the guy eventually helping you sort it out is the maintainer for that kernel subsystem.
Security "research" is an invented profession that has no real merit to its existence. Maybe it meant something 10 or 15 years ago, but now it is simply an academic masturbation ring. Your average junior pentester can outpace most corporate or other self-proclaimed "researchers" in vulnerability detection, assessment and triage by orders of magnitude, faggots like this guy just refuse to accept that simple truth and continue to ride their undeserved high horse. Joanna Rutkowska, the founder of the QubesOS project, is a great example of a real security researcher. Even freaks like Francis Rowe are hundreds of times the "security researchers" these people claim to be.Security is important, but 99% of "researchers" are brainless. The FFmpeg bug for example could NEVER happen because that codec is only used for the first 20 frames of some obscure game. There would NEVER be an instance where you would just run this on a random video file, and there's probably like 10 people still playing that game today.
The most baffling thing about this specific guy is that he's not some random jeet updating github readmes, but someone with a very long standing career in cybersecurity. His real name is Thomas Dullien, and some of his exploits range from working for Google to hosting Black Hat Briefings seminars, both of which are, by all metrics, very prestigious achievements for a cybersecurity professional. After reading one of his papers regarding the nature of security vulnerabilities and an attempt to provide a theoretical exploit classification framework, I can confidently say that this man is a snake oil salesman. His writing is the sort of bloated buzzword salad that plagues most of modern academia, complex for complexity's sake and so that the author can jerk himself off over how smart he sounds.Thread begins here. https://x.com/halvarflake/status/1986682054273007816
Can confirm. RHEL and SUSE are the two big names in a lot of EU institutions. As far as certs go CCNA, Sec+ and RHCSA for sysadmin, especially in fin/tech or govt.Maybe in Germany, but not here in Freedomland. I've only seen it for MSPs or the like where they use that as a selling point.
the only true way to have a secure computer is to consciously design every part of it to be secure, every step of the way. this goes from the lowest-level security features (the operating system) up to completely safe interfaces for programs and libraries (and remember, never trust anybody's input more than you absolutely have to) and even up to system configuration defaults (it's good to fail safe) and up to admins (they need to know not to do retarded things) and users (the hardest part a lot of the time, they sure love falling for <NEW GAME> CRACK NO WEERUS.exe)Security "research" is an invented profession that has no real merit to its existence. Maybe it meant something 10 or 15 years ago, but now it is simply an academic masturbation ring. Your average junior pentester can outpace most corporate or other self-proclaimed "researchers" in vulnerability detection, assessment and triage by orders of magnitude, faggots like this guy just refuse to accept that simple truth and continue to ride their undeserved high horse. Joanna Rutkowska, the founder of the QubesOS project, is a great example of a real security researcher. Even freaks like Francis Rowe are hundreds of times the "security researchers" these people claim to be.
that's a very low estimate, i would bet at least 25 years agoMaybe it meant something 10 or 15 years ago
his real name is jason hall, and some of his exploits range from working for blizzard to making 2 indie games with his 20+ years of gamedev experienceHis real name is Thomas Dullien, and some of his exploits range from working for Google to hosting Black Hat Briefings seminars, both of which are, by all metrics, very prestigious achievements for a cybersecurity professional.
it's amazing what you can do with fancy box plots or whatever and complicated slangHis writing is the sort of bloated buzzword salad that plagues most of modern academia, complex for complexity's sake and so that the author can jerk himself off over how smart he sounds.
That is not unique to IBM/RedHat but how support works across the whole industry.The "eventually" is the problem, you have to get through 30 layers of "Please saar to be sending us SOS Report". You mean the one I attached when I opened the case because I'd know you'd ask? My rule is I should be able to fix the problem before RH does or I'm not doing my job correctly. It's more fun when you open the support request with "Here's the SOS Report. Here's the kernel patch. Please to be sending to someone competent." And it does finally hit the kernel 6 months later.
The problem is that these are usually Fortune 100 companies with large expanses of RedHat. The escalation is still "eventually". They just don't seem to care any more.If you are a very important customer with a big support contract, you get escalated to these people very quickly.