I am but a cog in a machine. A lazy one though.

If you are new on Lemmy, check out: https://lemmyverse.net/communities for communities to join!

  • 4 Posts
  • 71 Comments
Joined 2 years ago
cake
Cake day: July 31st, 2023

help-circle


  • I’m obviously limited to my own bubble, but my friends / aquintances consist mostly of “tech aware” people and they have been getting cozy with Fedora and Linux Mint due to the BuyFromEU/BuyFromEurope movement.

    I know from a few schools that they use ChromeBooks since corona pandemic (they were handing them to kids so everyone could equally attend remotely) and they just kept using them since they had them when they returned to classrooms. I don’t know how widespread this is and don’t know if chromebooks count towards linux desktop stats?




  • I had a look and determined I need bit more time for this all than just today (long work day and a lot of additional info + need to get into lemmy-ui codebase a bit).

    You’ve got some good points there, thank you! I’m not a UI or UX expert but it’s a bit of a challenge reducing the amount of clicks and still keeping it mobile friendly without creating a screen full of options with several scrolls needed to reach the actual search, but I agree the goal should be less-actions.

    I think once I have a bit of a grasp on the project I’ll try and submit my suggestion.





  • I’m not a UI or UX expert, but I wonder if it would make the search page nicer if instead of the search target (form select) would be tabs instead of a dropdown since it is distinct selection from the other filters in the search?

    using bootstrap tabs (I didn’t put any effort into styling just added bootstrap tabs and removed the form select butto dropdown):

    Search but with tabs for form select instead of button dropdown

    Edit: now that I think about it, the tab might be kinda confusing unless also the other dropdowns are slightly altered to give more context in the current form selection tab, e.g. (text changes):

    In community... "Any", From creator ... "Any"

    But yeah I just wanted to throw out ideas, I’m not sure about them myself. The search inside a community is nice addition!






  • What the hell

    Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed.

    “At first glance, it’s hard to believe that this is actually valid JavaScript,” the Veracode Threat Research team said. “It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work.”

    Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server (“firewall[.]tel”).

    This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domain (“cdn.audiowave[.]org”) and configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB (“i.ibb[.]co”).

    “[The DLL] is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it,” Veracode said. “It ultimately builds up in memory YET ANOTHER .NET DLL.”

    Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account control (UAC) using a combination of FodHelper.exe and programmatic identifiers (ProgIDs) to evade defenses and avoid triggering any security alerts to the user.

    The newly-downloaded DLL is Pulsar RAT, a “free, open-source Remote Administration Tool for Windows” and a variant of the Quasar RAT malware.

    Honestly, at this point the hacker deserves to empty my bank account.


  • If it’s something that is not very popular/known I do actually look at the code, but never all of it.

    I check:

    • most recent commits
    • for something that might have been hidden before one of the releases
    • deeper into utility files
    • look for suspicious patterns in code that might be trying to hide something. Mostly for/in external network call related code

    This is of course very superficial and in general I try to avoid obscure projects that are not popular and well known.