this post was submitted on 09 Apr 2024
313 points (98.8% liked)

Linux

56329 readers
794 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 6 years ago
MODERATORS
 

I thought I'll make this thread for all of you out there who have questions but are afraid to ask them. This is your chance!

I'll try my best to answer any questions here, but I hope others in the community will contribute too!

(page 7) 50 comments
sorted by: hot top controversial new old
[–] jaybone@lemmy.world 2 points 1 year ago (4 children)

Question about moving from Ubuntu to Debian - Package updates and security updates...

On Ubuntu, I seem to get notifications almost every week about new package updates. (Through the apt UI)

On Debian, I don't see this.

I can run apt update and apt upgrade

On Ubuntu, I see this pull a bunch of package data from various package repo URLs.

On Debian, I only see this pulling package data from two or three repo URLs at debian.org

Mainly I am concerned about security updates and bug fixes. Do I need to manually add other repo sources to the apt config files? Or does debian update those repos regularly?

[–] bloodfart@lemmy.ml 1 points 1 year ago

They’re updated regularly. Take a look at your etc/apt/sources on both. Debian has everything coming from their servers, Ubuntu has a bunch more.

If you’re going Ubuntu -> Debian be prepared to switch to testing or enable some packages from testing or even use an alternate install method for some software (yt-dlp).

[–] lemmyreader@lemmy.ml 1 points 1 year ago

Are you using Ubuntu Long Term Release or not ?

  • I'm subscribed to Ubuntu and Debian announcements via email, and I see much more often Linux kernel updates for Ubuntu than for Debian. It makes me wonder whether the Debian kernel is slimmed down, and that Ubuntu is focused on Enterprises with their kernel.
[–] wolf@lemmy.zip 1 points 1 year ago* (last edited 1 year ago)

I wonder, if you are asking two different questions:

  1. Why don't you receive notifications about updated packages?
  2. Two: Security and bugfixes

For 1. it depends which desktop environment you use, Gnome/KDE have this update notifications out of the box, for other DEs (Xfce, LXDE, etc.) you might need to enable this with the installation of synaptic or similar.

For 2. Debian stable does not ship bugfixes but Debian stable ships security fixes. I highly recommend to subscribe to Debians Security mailing list, especially for security fixes concerning browsers and other stuff.

Edit: I have enabled automatic updates and I still receive regular notifications via Gnome Software, at least once per week.

[–] lemmyvore@feddit.nl 1 points 1 year ago* (last edited 1 year ago)

Debian favors stability over anything else so the packages are thoroughly tested before release and then only upgraded for security issues, until the next release 2 years later when everything gets an update.

Ubuntu favors releasing more recent package versions constantly throughout the period between major releases.

You can install packages on Debian from the backports repo if you occasionally need an package to be a more recent version.

Another option is to install apps from Flatpak. The apps in Flatpak have their own separate dependency system and can be used on any distro.

If neither of these works for you and you find yourself constantly wishing packages were newer you may want to consider a different distro.

Some people switch their Debian from stable to testing to get similar updates to Ubuntu. You can try that but please understand you may experience the occasional issues.

Be wary of adding external repos (that don't point to debian. org) because they can mess with the package dependencies and prevent you from upgrading to the next version when it comes out. (This also applies to Ubuntu.)

[–] MojoMcJojo@lemmy.world 2 points 1 year ago (1 children)

I want to turn a Microsoft surface go 2 into a kali linux machine. I would appreciate any guidance pulling this off. I want use it for learning it security stuff, partly for work but mostly for curiosity. Occasionally I run across malware, trojans, and I want to look under the hood to see how they work. I'm assuming Kali is the best tool for the job and that Lemmy is the place to go for tooling around with tools.

[–] d3Xt3r@lemmy.nz 2 points 1 year ago* (last edited 1 year ago) (1 children)

Kali is a pentesting distro, it's not designed for malware analysis. The distro you'd want to use for malware analysis is REMnux, but it's mostly meant for static analysis. Static analysis is fine, but you may not be able to dig deep unless you're familiar with decrypting code and using tools like Cutter, Ghidra, EDB etc for debugging. Naturally you'd also need intimate low-level coding experience, familiarity with assembly language and/or Win32 APIs (or whatever APIs the malware is using). So this isn't an area a casual security researcher can just get into, without some low-level coding experience. But you can at least do some beginner-level analysis like analysing the PE headers and using some automated tools which employ signature-based detection, or you could analyse strings and URLs embedded in the malware; stuff like that.

Dynamic analysis is far more easier to get into and more "fun", but the problem is of course, with most malware being made for Windows, Linux is kinda irrelevant in this scenario. But you could still run Linux as a VM host and run the malware inside a Windows VM. The problem with running malware in VMs though is that these days any half-decent malware would be VM/context aware and may evade detection, so for accurate results you'd really want to run the malware on a real machine, and use tools like procmon, IDA, wireshark etc for analysis. But again, decent malware may be able to evade tools like procmon, so it can get quite tricky depending on how clever your malware is. You'd normally employ a combination of both static and dynamic analysis.

Industry pros these days often use cloud-based analysis systems which can account for many such scenarios, such as Joe Sandbox, Any.Run, Cuckoo etc. These offer a mix of both VM and physical machine based analysis. You can use these services for free, but there are some limitations of course. If you're doing this for furthering your career, then it's worth getting a paid subscription to these services.

Coming back to Kali Linux - it's not something you'd want to install permanently on physical machine, as its meant to be an ephemeral thing - you spin it up, do your pentesting, and then wipe it. So most folks would use it inside a VM, or run Kali from a Live USB without installing it.

There are also alternatives to Kali, such as ParrotSec and BlackArch, but really from a pentesting toolbox point of view, there's not much of a difference between them, and it doesn't really matter (unless you're a Linux nerd and like the flexibility Arch offers). Most industry folks use Kali mainly, so might as well just stick to it if you want to build up familiarity in terms of your career.

As for your Surface Go - you could install a normal daily-driver Linux distro on your Surface if you really want to, and then run Kali under KVM - which is personally how I'd do it. Running Linux on Linux (KVM) is pretty convenient has a very low performance overhead. You can also employ technologies like ballooning and KSM to save RAM, if your system has low RAM.

[–] MojoMcJojo@lemmy.world 2 points 1 year ago

Thank you for such an amazing response. You've given me so many great threads to pull on. I'm going to have a great time diving into all this. Sincere thank you.

[–] PseudoSpock@lemmy.dbzer0.com 1 points 1 year ago (2 children)

How can I hide a pinned post without blocking the poster? It bothers me having this at the top of my list all the time, like some reminder on my phone I can't ack and make go away.

[–] d3Xt3r@lemmy.nz 2 points 1 year ago

Most third-party Lemmy clients should support this. For instance, if you're on Sync, you can just swipe it hide the post (assuming you've configured it that way).

[–] cyclohexane@lemmy.ml 2 points 1 year ago (1 children)

I'm sorry I don't know of any way to do that :( does it appear even when you're browsing your main feed??

[–] PseudoSpock@lemmy.dbzer0.com 1 points 1 year ago (1 children)

No, just at the top of the Linux community. I sort on New by default, looking for anything new Linux related... it's been slow news in there of late. I'll check if Voyager supports a method of doing it. Another user suggested Sync client. I'm usually on my desktop browser, though.

Thanks for checking. :)

[–] cyclohexane@lemmy.ml 1 points 1 year ago (1 children)

I just unpinned the post. I figured there may be others bothered by this, and plus its been enough weeks at this point. Thanks for voicing this to me :)

[–] PseudoSpock@lemmy.dbzer0.com 1 points 1 year ago

Shoot, I'm sorry. Thank you for doing that for me (and us, if there happen to be others). I do feel bad you felt forced to do that, though. :( I should just accept it is how it is until Lemmy devs a way. I'm sorry.

[–] venturi@lemmy.ml 1 points 1 year ago (1 children)

Is there any performance difference between KDE and GNOME?

[–] d3Xt3r@lemmy.nz 1 points 1 year ago
[–] mandos@lemmy.world 1 points 1 year ago (2 children)

what is the difference between Wayland and xorg, why would you choose one over the other?

load more comments (2 replies)
load more comments
view more: ‹ prev next ›