101
Millions of Docker repos found pushing malware, phishing sites
(www.bleepingcomputer.com)
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
Community Rules
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub
Notable mention to !cybersecuritymemes@lemmy.world
I haven't used Synology, so I'm not sure. So I'll just explain a bit how Docker works, which will hopefully give some context.
Terminology:
By default, the container doesn't have access to anything that's not explicitly passed to it, kind of like a VM, but without the expensive overhead a VM has.
So the issues could be:
For Synology and RustDesk specifically, I found this in the instructions:
If I had a Synology system to test with, I'd look into it for you, but that's the best I've got. I run my own DIY NAS (old PC running openSUSE Leap w/ BTRFS, Samba, and minidlna configured).
The other user on this thread pointed out, as you have, that they've updated the guide to include DSM 7s Container Manager, which is what I was originally trying it on to begin with. So, thanks to both of you, I now have a project to do this weekend to test out the updated guides! :)