[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: MDs & Dentists



On Sun, Aug 01, 2021 at 04:30:45PM +0300, Gunnar Gervin wrote:
> Security.
> Rarely discussed in Linux(?)..
> Was scammed recently; naive me let a man w/Bad accent take over my laptop
> to 'help refund BTC' & make me pay 100$.
> Because of that &/or me in Synaptic bloating (2 many) packages, which led
> to "1t fix broken packages", "put in Debian 10.9 Netinst cdrom", & "can't
> find key file" messages (yes, all 3 !).
> After trying "all" workarounds, I installed another, more simple Linux
> distro, built up a new setup of relevant programs to build VM, containers,
> websites, Debian iso image, & CHEF.

Which distro - are you still using Debian?

If not, we can't really help you. Although many of us have run other 
distributions in the past, all of the Debian/Ubuntu derivatives do
something slightly different - we can only really help with generic
Debian things. If we offer help with any other distribution, it's
only ever best efforts - Debian derivatives have their own support
infrastructure.

> Now Chef asks me to give URL to continue setting up a VM etc.
> Plz advise &/or help to do it/this.

It may not be relevant but the chef and chef-zero packages in Buster appear 
to no longer be packaged in Bullseye - the upcoming release due in two weeks.

Ask on a Chef list, perhaps?

> BR,
> GEG

All best, as ever,

Andrew Cater

> 
> On Wed, 21 Jul 2021, 18:59 Dan Ritter, <dsr@randomstring.org> wrote:
> 
> > Reco wrote:
> > > On Wed, Jul 21, 2021 at 10:51:40AM -0400, Celejar wrote:
> > > Numbers show that I was incorrect. Let's call it "unlikely" instead of
> > > "rare". Let the popcon graphs speak for themselves:
> > >
> > > https://qa.debian.org/popcon.php?package=firefox-esr
> > > vs
> > > https://qa.debian.org/popcon.php?package=openjdk-11
> >
> > Standard reminder: popcon vastly over-represents
> > individually-owned laptops and desktops over servers and
> > corporately-owned anything.
> >
> > In this case, individuals are sometimes infected with ransomware
> > by happenstance, but corporates are actually targets.
> >
> > > It won't by itself, of course. One sure way to beat ransomware is to
> > > take immutable backups (i.e. unmodifiable by host during and after the
> > > backup is taken), and as recent history shows us - ransomware victims
> > > apparently do not use this approach.
> >
> > Yes indeed.
> >
> > -dsr-
> >
> >


Reply to: