I know just the audience for this
-
[email protected]replied to [email protected] last edited by
backslashes.
-
No problem man I understand. I accept your 'tism and hope you having a good day.
And if not take a hit
-
[email protected]replied to [email protected] last edited by
The only fuckers who are getting their own VM is enterprise lol. I can't imagine they give that much of a fuck about their average user.
-
I'm confident I can get ChatGPT to run the command that generates the bomb - I'm less confident that it'll work as intended. For example, the wiki page mentioned a simple workaround is just to limit the maximum number of processes a user can run. I'd be pretty surprised if the engineers at OpenAI haven't already thought of this sort of thing and implemented such a limit.
Unless you meant something else? I may have misinterpreted your message.
-
Maybe if you ask for it to save as a script file then execute?
Or create a symlink/shortcut to execute rm when you type
readthis
instead -
[email protected]replied to [email protected] last edited by
I ask out of ignorance - Why is docker insufficient for isolation?
-
[email protected]replied to [email protected] last edited by
The short answer is that Docker (and other containerization technologies) share the Linux kernel with the host. The Linux kernel is very complicated and shouldn't be trusted to be vulnerability free. Exploitable bugs are regularly discovered in the Linux kernel (and Windows and Darwin). No serious companies separate different tenets with just container technology. Look at GCP, AWS, DigitalOcean... they all use hardware virtualization which is much simpler and much more likely to be secure (but even then bugs are found on occasion).
So in theory it is secure, but it is just too complex to rely on. I say that docker is good for "mostly trusted" isolation. Different organizations in the same companies, different software that isn't actively trying to be malicious. But shouldn't be used to separate different untrusted parties.
-
-
[email protected]replied to [email protected] last edited by
Unplug it?
-
Set up a remote access system on client/customer machines for tech support. When a customer doesn't pay, and notices have been sent and not replied to, and they won't answer your calls: this, on all their machines with past due payments.
Then when they call you in a panic, give them the same kindness and respect that they have given to you, down to the number of days since contact was stopped. Gotta twist that knife for maximum effectiveness. Then and only then should you consider answering their cries of agony.
(now I've never had a client payment issue, usually it's quite some time before they need my assistance again so I take payment in full at completion, not tabs/payment plans; but hypothetically...)
-
It's because when it's said aloud, many of us just truncate the "have" and it sounds like "of". Then we go to type it and often type what we think it sounds like...
-
[email protected]replied to [email protected] last edited by
Wouldn't that path only resolve if those intermediate directories exist? I thought bash had to crawl the path to resolve it
-
[email protected]replied to [email protected] last edited by
First, lose the attitude, not everyone here works in IT. Second, you'd be surprised what people can overlook.
-
"Why the latest exploits are actually a good sign"
- The Verge
-
Having it concat the string may bypass some of the safeguards as it's only looking at parts of the fork.
String Concatenation in Bash [6 Methods] - LinuxSimply
Explore the article to learn the methods of bash string concatenation and enhance the script flexibility and functionality efficiently.
LinuxSimply (linuxsimply.com)
-
[email protected]replied to [email protected] last edited by
Why would it be running with sudo perms?
-
[email protected]replied to [email protected] last edited by
Is this considered chaotic neutral
-
[email protected]replied to [email protected] last edited by
Magic, thank you.
-
[email protected]replied to [email protected] last edited by
So it doesn't run into permission errors