dhry, to ubuntu
@dhry@mastodon.social avatar

Uninstalled the snap of in , then installed it straight from .

Now I can't run it. sudo snap remove htop doesn't work either. Says it's already uninstalled.

Getting tired of having to google forums to fix problems for even the simplest thing in .

popey, to linux
@popey@mastodon.social avatar

Hey @itsfoss - This you?
What a difference a year makes, huh?

Bit weird. Maybe have a lie down.

Also It's FOSS, sorry, IT'S FOSS, GETTING IRRATIONALLY ANGRY ABOUT THE SAME SOFTWARE.

gregsie,
@gregsie@fosstodon.org avatar

@popey @itsfoss

I've never had an issue with apt not handling dependencies?

is true it does one thing well, there's no need for 'something else' or did I miss something in the last 30 years?

simplenomad, to infosec
@simplenomad@rigor-mortis.nmrc.org avatar

I sort of have opinions about TikTok and the ban, but not like everyone else...

https://www.markloveless.net/blog/2024/4/25/the-tiktok-implications

Konqi, to foss
@Konqi@mastodon.social avatar

I did miss this, this is so cool indeed, APT getting "ordered printout" is in order.

https://www.omgubuntu.co.uk/2024/04/apt-3-0-colours-columns-new-ui

@omgubuntu #FOSS #Ubuntu #Debian #Linuxmint #PopOS #APT #Linux #Desktop

governa, to ubuntu
@governa@fosstodon.org avatar

apt-fast: Speeds Up Package Downloads on

https://www.tecmint.com/fast-apt-download-packages/

kubikpixel, to IT German
@kubikpixel@chaos.social avatar

Weshalb wundert dies mich nicht und weshalb wird zB Russland immer noch unterschätzt? Sicherheit ist nicht so simpel, wie es viele verkaufen. Danke @evawolfangel für den informatieven Artikel:

»Neue russische Cyberwaffe entdeckt:
Russlands Geheimdienst hat offenbar ein neues Werkzeug entwickelt, um Firmen auszuspionieren. Es gibt nur wenige Spuren, denn die Schadsoftware löscht sich teils selbst«

📰 https://www.zeit.de/digital/2024-04/russland-schadsoftware-geheimdienst-angriff-cyberkriminalitaet


kubikpixel,
@kubikpixel@chaos.social avatar

Previously unknown Kapeka backdoor linked to Russian Sandworm APT:

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since 2022.

📰 https://securityaffairs.com/161987/hacking/kapeka-backdoor-linked-sandworm.html


parleur, to debian French
@parleur@mastodon.parleur.net avatar

Tiens, reçoit une grosse remise à jour graphique. C'est plutôt chouette.

br00t4c, to ubuntu
@br00t4c@mastodon.social avatar
gnulinux, to ubuntu German
@gnulinux@social.anoxinon.de avatar

Ephraims Wochenrückblick: KW 15, 2024

Auch in KW 15 ist in der FOSS Welt einiges passiert!

https://gnulinux.ch/ephraims-wochenrueckblick-kw-15-2024

RockyC, to debian
@RockyC@fosstodon.org avatar

APT 3.0 looks ALMOST as nice as Nala.

APT 2.9 Released: Debian's APT 3.0 To Have A New UI With Colors, Columnar Display & More https://www.phoronix.com/news/Debian-APT-2.9-Released

governa, to debian
@governa@fosstodon.org avatar

2.9 Released: 's APT 3.0 To Have A New UI With Colors, Columnar Display & More :debian:

https://www.phoronix.com/news/Debian-APT-2.9-Released

SteamPumkin, to debian
@SteamPumkin@mastodon.social avatar

Hell yes for version 2.9. Colours! Tabular output! It's a good day to be running

scy, to til
@scy@chaos.social avatar

that you can ask APT to install some packages and uninstall others in a single invocation.

To do that, add a + or - symbol to the end(!) of the package name(s). For example,

apt install neovim emacs-

or

apt remove neovim+ emacs

both do the same thing: Install Neovim and remove Emacs in a single operation.

youranonriots, to infosec Japanese
@youranonriots@kolektiva.social avatar

group Earth Preta has been using customized malware in its SMUGX spear-phishing campaign targeting victims in Asia. We’ve named these variants, DOPLUGS.

https://www.trendmicro.com/en_us/research/24/b/earth-preta-campaign-targets-asia-doplugs.html?utm_source=trendmicroresearch&utm_medium=smk&utm_campaign=022024_DOPLUGS

zkamvar, to ubuntu
@zkamvar@hachyderm.io avatar

I updated to 22.04 yesterday and got a little notification that my Firefox was being switched to . Weird flex, but okay.

Today, when I tried to open my local documentation with rustup doc --book, I got a page that said that the access to the file was denied.

It turns out that prevents firefox opening files in hidden folders and the best workaround is to create a symbolic link to a non-hidden folder. WTH?

https://askubuntu.com/a/1453605/853075

zkamvar,
@zkamvar@hachyderm.io avatar

@manpacket I saw this last week and finally made the switch when I found that could not open pages from the /tmp/ directory (snap: 2, me: 0)

https://blog.mozilla.org/en/products/4-reasons-to-try-mozillas-new-firefox-linux-package-for-ubuntu-and-debian-derivatives/

Everything works again!

eugenialoli, to linux
@eugenialoli@mastodon.social avatar

I don't understand what is the point of releasing an IDE via , when that flatpak doesn't include all the necessary dev tools, and it can't access the ones outside its sandboxing. Honestly. What's the point? I'm looking at you, .

Personally, I can't stand flatpaks or . is nicer just because it's just one delete away from within the file manager and doesn't leave crumbs everywhere. But overall, I prefer , and .

jedie, to linuxmint German
@jedie@chaos.social avatar

Weiß jemand zufällig, warum bei die mirrors ständig zurück gesetzt werden?!? Ist seid ein paar Wochen so...

grey, to China

Rumint is that the Change Healthcare was Chinese espionage that was caught and they overreacted and turned off all systems thinking ransomware was going to be deployed.

This fits with Chinese targeting of healthcare and pharmacies in the past. My assessment is that it could also be Russian long term staging or espionage as they are also known to target healthcare and pharmacies.

br00t4c, to random
@br00t4c@mastodon.social avatar

See Who's Sadly At the Top of Trump's Vice President Shortlist

https://www.theroot.com/see-whos-sadly-at-the-top-of-trumps-vice-president-shor-1851275707

moozer, to RaspberryPi
@moozer@mastodon.social avatar

I'm trying to make a image on my laptop.

Using the official Raspberry Pi OS Lite (32 bit, bookworm) image, I get this error when I try to update.

Any suggestions?
Anyone making raspberry images for bookworm? links?
Any apt gurus out there who can tell why it cannot "split" data and signature?

YourAnonRiots, to news Japanese
@YourAnonRiots@mstdn.social avatar
YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar
simontsui, to random

Hot off the press! CISA adds CVE-2023-43770 (6.1 medium) Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog.
🔗 (to be replaced later) https://www.cisa.gov/known-exploited-vulnerabilities-catalog

simontsui,

Why you should care about CVE-2023-43770:
ESET Research previously reported on 25 October 2023 that the Winter Vivern APT was exploiting a similar RoundCube cross-site scripting vulnerability CVE-2023-5631 as a zero-day against European overnmental entities and a think tank.

simontsui, to Cybersecurity

CISA, on behalf of the collective group of industry and government partners that comprise the Joint Cyber Defense Collaborative (JCDC), released JCDC’s 2024 Priorities. Similar to the 2023 JCDC Planning Agenda, JCDC’s 2024 Priorities will help focus the collective group on developing high-impact and collaborative solutions to the most pressing cybersecurity challenges.

🔗 https://www.cisa.gov/topics/partnerships-and-collaboration/joint-cyber-defense-collaborative/2024-jcdc-priorities

simontsui,

See related CISA blog: Extending the Breadth and Depth of our Partnerships - JCDC 2024 Priorities

2024 priorities are defined around three focus areas. The first focus area, Defend Against Advanced Persistent Threat (APT) Operations, aligns JCDC strategic and operational efforts to counter known and suspected APT campaigns that target critical infrastructure sectors with the potential to impact National Critical Functions. The second focus area, Raise the Baseline, encompasses JCDC efforts to improve the cybersecurity posture of critical infrastructure entities to reduce the frequency and impact of cyber incidents. The third focus area, Anticipate Emerging Technology and Risks, seeks to decrease the likelihood and impact of AI-related threats and vulnerabilities to critical infrastructure providers.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • thenastyranch
  • magazineikmin
  • tacticalgear
  • InstantRegret
  • ngwrru68w68
  • Durango
  • Youngstown
  • slotface
  • mdbf
  • rosin
  • PowerRangers
  • kavyap
  • DreamBathrooms
  • normalnudes
  • vwfavf
  • hgfsjryuu7
  • cisconetworking
  • osvaldo12
  • everett
  • ethstaker
  • GTA5RPClips
  • khanakhh
  • tester
  • modclub
  • cubers
  • Leos
  • provamag3
  • All magazines