Message from @Goz3rr
Discord ID: 633687305923854336
It's lttstore.com
http://www.lttstore.com , to be exact
haha wouldn't it be funny if we all bought things from lttstore.com? Just for jokes
that black & gold LTT insulated water bottle looks great
I will buy it
when its on aliexpress
woah underwear on sale
Okay, meme's over, stop shilling
https://twitter.com/matthew_d_green/status/1183391221861027841 took people a while
For the sysadmin among us https://thehackernews.com/2019/10/linux-sudo-run-as-root-flaw.html
clickbait title
> The only situation where this can be exploited is when you allow a user to execute something as any other users except root. This seems pretty obscure and probably affects only an extremely small number of configurations.
so in any time someone can remote execute any code in your system
no, when you put `(ALL, !root)` in sudoers
any compromissed system just got Boom level up to root
why you would do that i have no idea
it's an extremely limited use case
i'd be surprised if anyone actually is vulnerable to it
on that i agree
Well, at my workplace we use something quite close for a specific use case
We just don't do an everybody except root but specify the users
why do you need to impersonate other users
Application user
We have named users for 'humans' and application users for application
And sometimes humans have to impersonate application users
this is getting out of hand
now there's two of them
I always had 2 accounts
Anyone know a good, stable, systemd less distro
arch is fugged for me
Have you tried installing arch?
yea I've been running it for a while
pacman is broken, dont feel like repartitioning so looking for another OS
Thats be devuan,slackware,void to name the generic few
do you use any of em
Used to have void partition waaay back when systemd got forced
And devuan is really nice what i have heard
yea looks pretty nice