• 2 Posts
  • 17 Comments
Joined 5 months ago
cake
Cake day: February 17th, 2024

help-circle


  • At the terminal, go to the directory that contains the mount point for the disk (so if the mount point is /mnt/disk go to /mnt.

    Run ls -l. This should list everything in /mnt with the owners and permissions. If your mount point (in this example disk) is owned by user and group root, then you just need to change ownership of the mount point and the disk attached.

    With the disk attached, run sudo chown -R user:user disk

    Replace each instance ofuser with your system username (if you’re not sure what you’re username is run whoami and it will tell you), and replace disk with your mount point directory.

    Here’s what this does:

    • sudo: escalates your privileges to run the chown command
    • chown: the utility that allows you to change ownership of files and directories
    • -R: tells chown to change ownership recursively
    • user:user specifies the user and group that will own the files/directories you are modifying.
    • disk: specifies the file(s)/directories you want to change ownership for.

  • You do need to be careful, but you can check for errors after editing /etc/fstab by running the command sudo mount -a. With the drive attached but not mounted. (Also good practice to use the UUID of the drive in the fstab entry)

    That command runs through etc/fstab and attempts to mount everything it is instructed to mount if it is not already mounted. And if there is an error it will let you know.

    If you run sudo mount -a and you get no output in the terminal, then there are no errors, your drive should now be mounted, and you should be fine for reboots and it should mount on startup as expected.











  • I’m really happy to be hosting my own password manager.

    Regarding baserow, I use it in a couple of ways. First is as a replacement for Google Sheets. For my use case, I only ever really used sheets as a dumb database, (home inventory, etc…) so I don’t need the spreadsheet parts of the spreadsheet much.

    The other thing I use it for is a backend for my automations for data. Baserow has wonderful api documentation right in the gui, and I use that a lot with data logging for myself.






  • harsh3466@lemmy.mltoLinux@lemmy.mlXZ backdoor in a nutshell
    link
    fedilink
    arrow-up
    21
    arrow-down
    7
    ·
    edit-2
    3 months ago

    I don’t understand the actual mechanics of it, but my understanding is that it’s essentially like what happened with Volkswagon and their diesel emissions testing scheme where it had a way to know it was being emissions tested and so it adapted to that.

    The malicious actor had a mechanism that exempted the malicious code when built from source, presumably because it would be more likely to be noticed when building/examining the source.

    Edit: a bit of grammar. Also, this is my best understanding based on what I’ve read and videos I’ve watched, but a lot of it is over my head.