314
submitted 7 months ago by cyclohexane@lemmy.ml to c/linux@lemmy.ml

I thought I'll make this thread for all of you out there who have questions but are afraid to ask them. This is your chance!

I'll try my best to answer any questions here, but I hope others in the community will contribute too!

(page 5) 50 comments
sorted by: hot top controversial new old
[-] snooggums@midwest.social 3 points 7 months ago

I have windows PC with 6 drives, mostly SSD and on HDD that I assume are all NTFS. Two of the drives are nvme(?) attached to the mobo, and I only have one mobo with nvme slots. I have a number of older boards that top out at SATA connections.

If I install Linux Mint, can I format one nvme drive with whatever the current preferred linux formatting is, install Mint, and move the files from the other drives around as I format each one?

Or do I need to move all the data I want to keep to SATA drives, put them in a different windows box, and then copy them over using a network connection?

It's been a while and I'm guessing my lack of finding an answer means linux still doesn't work with NTFS enough to do what I'm thinking of.

[-] NateSwift@lemmy.dbzer0.com 2 points 7 months ago* (last edited 7 months ago)

It depends on exactly how you plan to do things. The Linux kernel supports reading NTFS but not writing to it. I’m not sure exactly how full your drives are, but you might be able to consolidate some before installing Linux.

There are a couple utilities that let your mount an NTFS file system for read & write, but I wouldn’t trust them for important data.

Edit: This is outdated as of like 2021. Don’t listen to me

load more comments (4 replies)
load more comments (5 replies)
[-] penquin@lemm.ee 3 points 7 months ago

This is the dumbest question ever, but here goes: I'm trying to use pika to make regular backups of my whole system to my synology Nas. So I'd choose "remote", but no matter what I enter after the SMB it doesn't take it. How do I back up to my synology Nas using pika? I like pika because the UI is fucking stupid simple, except this one little nugget.

load more comments (4 replies)
[-] cubeofcheese@mstdn.social 3 points 7 months ago

@cyclohexane Is there any risk for me to try installing Linux on my MacBook (intel) and are there specific distros that run better on a macbook?

[-] bloodfart@lemmy.ml 3 points 7 months ago

Check compatibility first. Some of em need a binary blob network driver that certain distros don’t ship by default. But yeah you can run Linux on Macs pretty good. What mb do you have and I can give better input?

load more comments (5 replies)
[-] blakeus12@hexbear.net 3 points 7 months ago

what is hyprland

why do ppl use the CLI for things like making and moving files? i find the GUI easier and faster as well as less prone to mistakes

what is wayland and xorg, and why does everyone argue about them

load more comments (7 replies)
[-] MojoMcJojo@lemmy.world 2 points 7 months ago

I want to turn a Microsoft surface go 2 into a kali linux machine. I would appreciate any guidance pulling this off. I want use it for learning it security stuff, partly for work but mostly for curiosity. Occasionally I run across malware, trojans, and I want to look under the hood to see how they work. I'm assuming Kali is the best tool for the job and that Lemmy is the place to go for tooling around with tools.

[-] d3Xt3r@lemmy.nz 2 points 7 months ago* (last edited 7 months ago)

Kali is a pentesting distro, it's not designed for malware analysis. The distro you'd want to use for malware analysis is REMnux, but it's mostly meant for static analysis. Static analysis is fine, but you may not be able to dig deep unless you're familiar with decrypting code and using tools like Cutter, Ghidra, EDB etc for debugging. Naturally you'd also need intimate low-level coding experience, familiarity with assembly language and/or Win32 APIs (or whatever APIs the malware is using). So this isn't an area a casual security researcher can just get into, without some low-level coding experience. But you can at least do some beginner-level analysis like analysing the PE headers and using some automated tools which employ signature-based detection, or you could analyse strings and URLs embedded in the malware; stuff like that.

Dynamic analysis is far more easier to get into and more "fun", but the problem is of course, with most malware being made for Windows, Linux is kinda irrelevant in this scenario. But you could still run Linux as a VM host and run the malware inside a Windows VM. The problem with running malware in VMs though is that these days any half-decent malware would be VM/context aware and may evade detection, so for accurate results you'd really want to run the malware on a real machine, and use tools like procmon, IDA, wireshark etc for analysis. But again, decent malware may be able to evade tools like procmon, so it can get quite tricky depending on how clever your malware is. You'd normally employ a combination of both static and dynamic analysis.

Industry pros these days often use cloud-based analysis systems which can account for many such scenarios, such as Joe Sandbox, Any.Run, Cuckoo etc. These offer a mix of both VM and physical machine based analysis. You can use these services for free, but there are some limitations of course. If you're doing this for furthering your career, then it's worth getting a paid subscription to these services.

Coming back to Kali Linux - it's not something you'd want to install permanently on physical machine, as its meant to be an ephemeral thing - you spin it up, do your pentesting, and then wipe it. So most folks would use it inside a VM, or run Kali from a Live USB without installing it.

There are also alternatives to Kali, such as ParrotSec and BlackArch, but really from a pentesting toolbox point of view, there's not much of a difference between them, and it doesn't really matter (unless you're a Linux nerd and like the flexibility Arch offers). Most industry folks use Kali mainly, so might as well just stick to it if you want to build up familiarity in terms of your career.

As for your Surface Go - you could install a normal daily-driver Linux distro on your Surface if you really want to, and then run Kali under KVM - which is personally how I'd do it. Running Linux on Linux (KVM) is pretty convenient has a very low performance overhead. You can also employ technologies like ballooning and KSM to save RAM, if your system has low RAM.

load more comments (1 replies)
load more comments
view more: ‹ prev next ›
this post was submitted on 09 Apr 2024
314 points (98.8% liked)

Linux

48376 readers
1793 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS