• 2 Posts
  • 56 Comments
Joined 1 year ago
cake
Cake day: June 14th, 2023

help-circle





  • Always back up your stuff, but after doing so, the process is pretty much boot to bios, set boot priority with linux usb at the top, and away you go.

    If you have secure boot enabled, you might have to enter a pass code or passphrase but otherwise its identical to traditional bios. If you want secure boot, which prevents someone else from doing this process to your machine, re enable after you’ve installed nvidia drivers otherwise you’ll have to provide it your secure boot password during and sometimes it likes to break.



  • So reading up on the evolution of whales for arguments sake has me realising all dolphins and whales are (as mentioned) from the same family.

    Your traditional whale fits into “Baleen Whales (Mysticeti)” which have “soft, hair like structures on the upper mouth” and there are 16 species and 3 families.

    Meanwhile there are also “Toothed Whales (Odontceti)” with 76 species and 10 families. They are smaller, actively hunt and almost always live in pods.

    The most surprising thing I’ve learned is that the Baleen Whales typically have two blow holes…??? Also they do not echolocate but they do sing/chat.

    So almost all your traditional large whales fit into the Baleen category and the traditional dolphin fits into the Toothed category. So there are key differences between them, but the overall family is whale.

    This is a dumb argument huh










  • I’m thinking data entry for threat hunters, and integrations with our other platforms apis but I couldn’t say anything specific. SSDs are a good shout, I might have tried setting it up with hdds if you hadn’t said.

    Did you find it easier to add connectors in seperate docker containers or within the main octi container?

    It feels like there’s a pretty high ceiling for this platform and the data you can generate. Do you find it easy to create good data? Do you have any habits?

    I’m pretty keen to learn so feel free to answer what you can.



  • Not who you asked, but did you ever hear of Valiant and their kernel level anti cheat.

    This is not a 1:1 comparison but anticheat software running in the kernel has the ability to monitor all other processes due to its permission levels. It can monitor all scheduled tasks and infer from that information.

    Drivers need similar access but for different reasons, they need access to os functionality a user would absolutely never be granted. This is because they interface directly with hardware and means when drivers crash, they generally don’t do it gracefully. Hence the BSOD loop and the need for booting windows without drivers (i.e. safe mode) and the deletion of the misconfiguration file.


  • Really don’t care much about my cv. This program is a great way to learn about the STIX protocol so no idea what you mean about “no actionable skills”. STIX is an interesting information sharing method, the program is well designed to educate the user on it and seeing the format it imports and exports data will teach me a buttload.

    More to the point, maybe could you be less cynical and share some advice. I’m not going to flex my qualifications cos they’re mediocre but I’ve got smart people around me who just don’t know this particular program and I’m interested to hear from those who do.

    Do you run this program at work or at home? Have you learned anything interesting from using it? Are there avoidable mistakes I could not repeat from hosting it? Answers to those questions would be very useful.