redcalcium

joined 1 year ago
[–] redcalcium@lemmy.institute 4 points 7 months ago (1 children)

I kinda assumed anyone who know how to install Linux on their laptop wouldn't have too much problem figuring out how VM works

[–] redcalcium@lemmy.institute 26 points 7 months ago (4 children)

Try running those adobe apps on a windows virtual machine. Use KVM with virt-managet instead of virtualbox. If the performance is acceptable for you, now you can use Linux as the primary os and only use the VM for adobe apps. VM boots faster too because you can just hit suspend and resume it again later.

[–] redcalcium@lemmy.institute 4 points 7 months ago* (last edited 7 months ago) (1 children)

The scanners should tell you the reason they flag a file. If it's marked as trojan, obviously don't run it. Cracks are usually marked as crack by most antivirus.

You can also upload the flagged files to virustotal to see what other antiviruses flag the files for.

[–] redcalcium@lemmy.institute 25 points 7 months ago

GPU passthrough works pretty well these days, but anticheats will detect you running inside a VM. Evading anticheats detection is a separate issue unrelated with gpu passthrough, usually involves getting the vm to look like a real hardware as much as possible (e.g. using real mac address, hiding kvm hypervisor signature, etc). It's quite a deep rabbit hole and I haven't actually tried it.

[–] redcalcium@lemmy.institute 2 points 7 months ago* (last edited 7 months ago) (3 children)

It's generally safe, but doesn't mean it's bulletproof as sites has been removed from the megathread in the past when they suddenly serve malwares or miners. Just use your common sense when downloading apps and games and scan them before installing.

[–] redcalcium@lemmy.institute 15 points 7 months ago (5 children)

Pirated apps are one of the top source for botnet operators to infect new machines and add them to their network. Try not to run any pirated app or game if you can, but if you can't avoid it, get it from trusted sources (e.g. directly from the cracker's homepage), not from random sources like TPB where anyone can upload anything.

[–] redcalcium@lemmy.institute 17 points 7 months ago (2 children)

Next: how do we know tailscale's network hasn't been backdoored?

[–] redcalcium@lemmy.institute 12 points 7 months ago (1 children)

I think you can send a SIGUSR1 signal to mumble process to tell it to reload the ssl certificate without actually restarting mumble's process. You can use docker kill --signal="SIGUSR1" <container name or id>, but then you still need to give your user access to docker group. Maybe you can setup a monthly cron on root user to run that command every months?

[–] redcalcium@lemmy.institute 1 points 7 months ago* (last edited 7 months ago) (2 children)

I haven't actually tried it though so I'm not sure how it compares with rsync.net. How easy it is to access snapshots on hetzner? On rsync.net, snapshots are stored under .zfs folder so it's very easy to access.

[–] redcalcium@lemmy.institute 33 points 7 months ago (4 children)

There is a certain thrill when you nuke your disk to install a distro you never tried before. I actually just nuke one of my laptop last night to try void linux.

[–] redcalcium@lemmy.institute 7 points 7 months ago

Stop threatening me with a good time!

[–] redcalcium@lemmy.institute 4 points 7 months ago* (last edited 7 months ago) (4 children)

Note that rsync.net includes free 7 days daily snapshot. Also, the main advantage over backblaze b2 for me is you can just sync a whole folder full of small files instead of compressing them into an archive first prior to uploading to a b2 bucket. This means you can access individual files later without the need to download the whole archive.

I still use b2 to store long term backup archives though.

view more: ‹ prev next ›