Globb0
Legendary
Offline
Activity: 2674
Merit: 2053
Free spirit
|
|
February 26, 2020, 07:08:27 PM |
|
BEG, borrow or steal
|
|
|
|
|
|
In order to achieve higher forum ranks, you need both activity points and merit points.
|
|
|
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
|
|
|
Dabs
Legendary
Offline
Activity: 3416
Merit: 1912
The Concierge of Crypto
|
|
February 26, 2020, 07:15:42 PM |
|
How can mounting a USB stick on an AutoRun-disabled VM affect your host's BIOS? Honest question, I want to know.
Don’t lost track of the fact that USB is an acronym for Universal Serial Bus. That device could contain any number of USB endpoints, each implementing a different device class. What if one of the endpoints identifies as a Human Interface Device — for example a keyboard — and injects a number of commands to the system? From the users perspective, invisibly. Or even deeper, a bridge device, giving it access to the underlying I2C bus - maybe even the SMB? Yeah, but who is going to maintain the discipline required to ensure any potential infection does not spread from the separate PC to others in your stable? There is the Yubikey which types for you like a USB keyboard. There is that Rubber Ducky, which types like a USB keyboard and can type like it was there at 100 words per second or something as fast as a keyboard will accept, such as Windows-R, CMD, and do any number of commands from the command prompt. https://shop.hak5.org/products/usb-rubber-ducky-deluxeAs for virgin clean PC's, I used to (and still do) use something called Deep Freeze, reboot to restore thing. If the host computer it's installed on gets infected, before it can propagate any problems to the rest of the network (assuming you disconnected it physically from the rest of the network), you just reboot, and it's back as new, as if it was never updated. Most malware is unaware of it's existence. It's great for setting up kiosks that provide internet access through regular browsers. At the end of the session, reboot, it's back to the way it was. If you need to update anything, reboot, turn it off, update, reboot, and it will stay that way. In theory, it can still be hacked, but in practice it's as if the whole computer is one giant VM. Reboot, and it's back to the way it was yesterday. If you need to save data or files or documents, you save them on a different drive or partition or folder designated as such. But the rest of the OS, reboot, and it goes back to the way it was.
|
|
|
|
|
cygan
Legendary
Offline
Activity: 3136
Merit: 7675
Cashback 15%
|
|
February 26, 2020, 07:18:11 PM |
|
|
|
|
|
OutOfMemory
Legendary
Offline
Activity: 1526
Merit: 2993
Man who stares at charts
|
|
February 26, 2020, 07:26:56 PM |
|
Hard to get some beans, noodles and rice already. Came home and i saw that i already advanced to Jr. Member!!! ...again Again? This is mainly for VB1001: I'm just going to eat McDonald's food if there's a crisis. No bacteria or virus can live in that stuff anyway and the probability of dying from SARS-2 is likely higher than the probability of dying from eating only McDonald's food for a few weeks. As an added bonus, there won't be a queue. Uh, oh, no... Sorry, bro! According to a testing from last year, the bacterial and fungal density, count and variety of the bottom side of the grips on McDonald's trays are higher than on their toilet seats! No joke, mister. You probably get in contact with SARS-CoV-2 from an asymptomatic carrier this way, either directly or indirectly via the wiping cloths that do not get exchanged for several days. You're better off by getting their "food" through the McDrive instead.
|
|
|
|
d_eddie
Legendary
Offline
Activity: 2478
Merit: 2895
|
|
February 26, 2020, 07:29:07 PM |
|
I'm buying like crazy. My DCA schedule got on sort of a quick track. The main thing, as some absent peep would point out, is making sure I don't run out of dry powder should the need for a big shot arise. So I got a few more sats today - couldn't resist placing a couple limit orders in this area, and both triggered - and I will keep at this.
However, as the same absent peep would suggest, I've got an emergency stash. It amounts to ~40% of the fiat I'd allocated for Q1. You bears want to try your hands at the high 7k's? Even lower? Go for it, I'm ready.
|
|
|
|
El duderino_
Legendary
Offline
Activity: 2492
Merit: 11985
BTC + Crossfit, living life.
|
|
February 26, 2020, 07:33:08 PM |
|
Me an total unaffected HODLer... though the 10.5K to 8.6K-ish in a few days is a decent drop... Still why? I only have one answer---> Normal BTC market behavior, n00bs better get used to it, if one can appreciate a HUGE pump, then the same peep should be aware there are some decent drops as well!
|
|
|
|
AlcoHoDL
Legendary
Offline
Activity: 2352
Merit: 4133
Addicted to HoDLing!
|
|
February 26, 2020, 07:34:25 PM |
|
The 1st I haven't heard yet. The 2nd is epic. Smartest and most hilarious lyrics on a Bitcoin song I've ever heard.
|
|
|
|
d_eddie
Legendary
Offline
Activity: 2478
Merit: 2895
|
|
February 26, 2020, 07:37:16 PM |
|
Right, it’s low enough now. Logging onto laptop to buy 0.5BTC.
Thank you for your service. I’ve bought 4 BTC so far this week. Because incremental ladder trading. Wow, 4 whole coins this week. You wrote btc - as in bitcoin, with no other qualifiers. If I got it right, there goes a little haiku for you. That's just, like, you know five days and a weekend, man Congratulations!
|
|
|
|
OutOfMemory
Legendary
Offline
Activity: 1526
Merit: 2993
Man who stares at charts
|
|
February 26, 2020, 07:40:12 PM |
|
How can mounting a USB stick on an AutoRun-disabled VM affect your host's BIOS? Honest question, I want to know.
Don’t lost track of the fact that USB is an acronym for Universal Serial Bus. That device could contain any number of USB endpoints, each implementing a different device class. What if one of the endpoints identifies as a Human Interface Device — for example a keyboard — and injects a number of commands to the system? From the users perspective, invisibly. Or even deeper, a bridge device, giving it access to the underlying I2C bus - maybe even the SMB? Yeah, but who is going to maintain the discipline required to ensure any potential infection does not spread from the separate PC to others in your stable? There is the Yubikey which types for you like a USB keyboard. There is that Rubber Ducky, which types like a USB keyboard and can type like it was there at 100 words per second or something as fast as a keyboard will accept, such as Windows-R, CMD, and do any number of commands from the command prompt. https://shop.hak5.org/products/usb-rubber-ducky-deluxeAs for virgin clean PC's, I used to (and still do) use something called Deep Freeze, reboot to restore thing. If the host computer it's installed on gets infected, before it can propagate any problems to the rest of the network (assuming you disconnected it physically from the rest of the network), you just reboot, and it's back as new, as if it was never updated. Most malware is unaware of it's existence. It's great for setting up kiosks that provide internet access through regular browsers. At the end of the session, reboot, it's back to the way it was. If you need to update anything, reboot, turn it off, update, reboot, and it will stay that way. In theory, it can still be hacked, but in practice it's as if the whole computer is one giant VM. Reboot, and it's back to the way it was yesterday. If you need to save data or files or documents, you save them on a different drive or partition or folder designated as such. But the rest of the OS, reboot, and it goes back to the way it was. Most linux distributions can be run on read-only filesystems (same as from cd) BUT the only true security hole is running them as root, because volumes can be remounted in rw mode on the fly. I'm using this strategy on my raspberryPi that is running the game console emulators for the kids. They don't do no shutdown, they just pull the plug/wallwart. Roms are stored on etx4 USB, mounted read-only. This one is just mounted in rw mode on the PC, to manage the roms and emulator binaries. Just make sure you run linux as unprivileged user. Privilege escalation is a thing though, but unlikely on patched systems. However, when you're not connected to the net, i doubt there is a fair chance of catching a successful exploit via USB.
|
|
|
|
Gyrsur
Legendary
Offline
Activity: 2856
Merit: 1518
Bitcoin Legal Tender Countries: 2 of 206
|
|
February 26, 2020, 07:45:42 PM |
|
|
|
|
|
P_Shep
Legendary
Offline
Activity: 1795
Merit: 1198
This is not OK.
|
|
February 26, 2020, 07:48:10 PM |
|
How can mounting a USB stick on an AutoRun-disabled VM affect your host's BIOS? Honest question, I want to know.
Don’t lost track of the fact that USB is an acronym for Universal Serial Bus. That device could contain any number of USB endpoints, each implementing a different device class. What if one of the endpoints identifies as a Human Interface Device — for example a keyboard — and injects a number of commands to the system? From the users perspective, invisibly. Or even deeper, a bridge device, giving it access to the underlying I2C bus - maybe even the SMB? Yeah, but who is going to maintain the discipline required to ensure any potential infection does not spread from the separate PC to others in your stable? There is the Yubikey which types for you like a USB keyboard. There is that Rubber Ducky, which types like a USB keyboard and can type like it was there at 100 words per second or something as fast as a keyboard will accept, such as Windows-R, CMD, and do any number of commands from the command prompt. https://shop.hak5.org/products/usb-rubber-ducky-deluxeAs for virgin clean PC's, I used to (and still do) use something called Deep Freeze, reboot to restore thing. If the host computer it's installed on gets infected, before it can propagate any problems to the rest of the network (assuming you disconnected it physically from the rest of the network), you just reboot, and it's back as new, as if it was never updated. Most malware is unaware of it's existence. It's great for setting up kiosks that provide internet access through regular browsers. At the end of the session, reboot, it's back to the way it was. If you need to update anything, reboot, turn it off, update, reboot, and it will stay that way. In theory, it can still be hacked, but in practice it's as if the whole computer is one giant VM. Reboot, and it's back to the way it was yesterday. If you need to save data or files or documents, you save them on a different drive or partition or folder designated as such. But the rest of the OS, reboot, and it goes back to the way it was. I recall reading an article where they made a 'flash drive' act like an ethernet adapter and would intercept all internet traffic for a man-in-the-middle attack.
|
|
|
|
Gyrsur
Legendary
Offline
Activity: 2856
Merit: 1518
Bitcoin Legal Tender Countries: 2 of 206
|
|
February 26, 2020, 07:55:14 PM |
|
Bitstamp ADL 8,627.78 USD (source: Bitstamp API)
|
|
|
|
Gyrsur
Legendary
Offline
Activity: 2856
Merit: 1518
Bitcoin Legal Tender Countries: 2 of 206
|
|
February 26, 2020, 07:58:41 PM |
|
[meme] BTC give me my life back, pls! [/meme]
|
|
|
|
jbreher
Legendary
Offline
Activity: 3038
Merit: 1660
lose: unfind ... loose: untight
|
|
February 26, 2020, 08:03:33 PM |
|
As for virgin clean PC's, I used to (and still do) use something called Deep Freeze, reboot to restore thing. If the host computer it's installed on gets infected, before it can propagate any problems to the rest of the network (assuming you disconnected it physically from the rest of the network), you just reboot, and it's back as new, as if it was never updated.
Does your ‘reboot’ re-flash the BIOS with a known-good image? Probably not. Even if so, what ensures that supposedly ‘known-good’ image has not itself been corrupted by the malware? Again. There is NO perfect security.
|
|
|
|
jbreher
Legendary
Offline
Activity: 3038
Merit: 1660
lose: unfind ... loose: untight
|
|
February 26, 2020, 08:12:51 PM |
|
Right, it’s low enough now. Logging onto laptop to buy 0.5BTC.
Thank you for your service. I’ve bought 4 BTC so far this week. Because incremental ladder trading. Wow, 4 whole coins this week. You wrote btc - as in bitcoin, with no other qualifiers. If I got it right, there goes a little haiku for you. That's just, like, you know five days and a weekend, man Congratulations! Yes, BTC. Just buying back the coins I sold (for more USD) on the way up. Incremental laddered standing orders FTW.
|
|
|
|
machasm
|
|
February 26, 2020, 08:14:39 PM |
|
Bought another 0.1 BTC on this dip. Spent more than I originally planned this week already.
|
|
|
|
jbreher
Legendary
Offline
Activity: 3038
Merit: 1660
lose: unfind ... loose: untight
|
|
February 26, 2020, 08:15:41 PM |
|
How can mounting a USB stick on an AutoRun-disabled VM affect your host's BIOS? Honest question, I want to know.
Don’t lost track of the fact that USB is an acronym for Universal Serial Bus. That device could contain any number of USB endpoints, each implementing a different device class. What if one of the endpoints identifies as a Human Interface Device — for example a keyboard — and injects a number of commands to the system? From the users perspective, invisibly. Or even deeper, a bridge device, giving it access to the underlying I2C bus - maybe even the SMB? Yeah, but who is going to maintain the discipline required to ensure any potential infection does not spread from the separate PC to others in your stable? There is the Yubikey which types for you like a USB keyboard. There is that Rubber Ducky, which types like a USB keyboard and can type like it was there at 100 words per second or something as fast as a keyboard will accept, such as Windows-R, CMD, and do any number of commands from the command prompt. https://shop.hak5.org/products/usb-rubber-ducky-deluxeAs for virgin clean PC's, I used to (and still do) use something called Deep Freeze, reboot to restore thing. If the host computer it's installed on gets infected, before it can propagate any problems to the rest of the network (assuming you disconnected it physically from the rest of the network), you just reboot, and it's back as new, as if it was never updated. Most malware is unaware of it's existence. It's great for setting up kiosks that provide internet access through regular browsers. At the end of the session, reboot, it's back to the way it was. If you need to update anything, reboot, turn it off, update, reboot, and it will stay that way. In theory, it can still be hacked, but in practice it's as if the whole computer is one giant VM. Reboot, and it's back to the way it was yesterday. If you need to save data or files or documents, you save them on a different drive or partition or folder designated as such. But the rest of the OS, reboot, and it goes back to the way it was. Most linux distributions can be run on read-only filesystems (same as from cd) BUT the only true security hole is running them as root, because volumes can be remounted in rw mode on the fly. I'm using this strategy on my raspberryPi that is running the game console emulators for the kids. They don't do no shutdown, they just pull the plug/wallwart. Roms are stored on etx4 USB, mounted read-only. This one is just mounted in rw mode on the PC, to manage the roms and emulator binaries. Just make sure you run linux as unprivileged user. Privilege escalation is a thing though, but unlikely on patched systems. However, when you're not connected to the net, i doubt there is a fair chance of catching a successful exploit via USB. Again, your postulated security described above is utterly dependent upon the rando USB device implementing only a storage class endpoint. Whatevs. Good luck with that.
|
|
|
|
soxxx
Member
Offline
Activity: 256
Merit: 62
|
|
February 26, 2020, 08:18:04 PM |
|
Bitcoin cant close the day below the 200 Day moving average. Its currently at $8794.
If we close above it, it would be pretty bullish.
|
|
|
|
OutOfMemory
Legendary
Offline
Activity: 1526
Merit: 2993
Man who stares at charts
|
|
February 26, 2020, 08:35:54 PM |
|
Most linux distributions can be run on read-only filesystems (same as from cd) BUT the only true security hole is running them as root, because volumes can be remounted in rw mode on the fly. I'm using this strategy on my raspberryPi that is running the game console emulators for the kids. They don't do no shutdown, they just pull the plug/wallwart. Roms are stored on etx4 USB, mounted read-only. This one is just mounted in rw mode on the PC, to manage the roms and emulator binaries.
Just make sure you run linux as unprivileged user. Privilege escalation is a thing though, but unlikely on patched systems. However, when you're not connected to the net, i doubt there is a fair chance of catching a successful exploit via USB.
Again, your postulated security described above is utterly dependent upon the rando USB device implementing only a storage class endpoint. Whatevs. Good luck with that. I would care less if i am running as unpriv. user on a system that is not network connected. I didn't mention that i'd never use a host with actual user data on it. I thought that would be clear because i was replying to Dabs' "frozen sysimage" approach. I would definitely not use a guest VM but a dedicated box that i can reset via dd or similar disc imaging tools, i wasn't clear on that, as i just recognize while typing this. And yes, it's part of the very basics: there is no 100% security, only 100% security against certain (and therefor known) attack vectors.
|
|
|
|
|