@pafurijaz@mastodon.social avatar pafurijaz , to random

Todd C. Miller has been maintaining the codebase for over 30 years. This is exactly one of those cases where an entire critical infrastructure is held together by the work of a single volunteer who apparently can’t find anyone willing to sponsor him for some financial support.

Image showing the various commits over the for the sudo code by Todd C. Miller
Image showing a brief text by Todd C. Miller
Image showing a picture of Todd C. Miller

ALT
@itsfoss@mastodon.social avatar itsfoss , to random

Level up your terminal with Rust tools that outshine classic Linux commands. 🔥

https://itsfoss.com/rust-alternative-cli-tools/

falken ,
@falken@qoto.org avatar

@itsfoss and sometimes work the same!

@SciPunk@pixelfed.social avatar SciPunk , to random

In the movie Hackers (1995), a group of nerds hack into computer networks to outsmart corrupt authorities and uncover a conspiracy.

The film features a mix of retro computing aesthetics, cyberpunk themes, and real-life cybersecurity concepts like sudo and root access.

video/mp4

@tuxedocomputers@linuxrocks.online avatar tuxedocomputers , to random

Critical Sudo Vulnerability Affects Linux Systems – Already Patched in TUXEDO OS

Read more: https://www.tuxedocomputers.com/en/Critical-Sudo-Vulnerability-Affects-Linux-Systems-C-Already-Patched-in-TUXEDO-OS.tuxedo

@tuxedocomputers@linuxrocks.online avatar tuxedocomputers , to random

What about TWIX?

Take a look - and: Feedback is always welcome!

🍫 https://tuxe.do/twix

ALT
aho ,
@aho@ioc.exchange avatar

@tuxedocomputers why not replace with (sudo-rs).

@nixCraft@mastodon.social avatar nixCraft , to random

Want to run the given command in the background as root or other user? Try:

sudo -b /path/to/job.py  
sudo --background /path/to/foo.pl   
sudo -u {user_name} -b /path/to/job.py  

Please note that you can't use shell job control to manipulate background processes started by sudo which is both pro and con at a time.

@nixCraft@mastodon.social avatar nixCraft , to random

I thought 'sudo' meant 'super user do.' Turns out, it also means 'super user undoing everything.' 🤯

pjokse ,
@pjokse@restless.systems avatar
DeltaWingDragon , to linux4noobs in EXE icons out of nowhere
@DeltaWingDragon@sh.itjust.works avatar

Maybe the Windows partition is getting automounted. If so, there's nothing to fear. And if you installed Ventoy yourself, there's even less to fear.

However, if you suspect something untoward is going on, run a virus scan. Use Defender on Windows, and ClamAV on Linux.

ClamAV is unintuitive, so I wrote a helper script called Mussel. Read it, copy-paste it, put it in your PATH.

Mussel script
#!/bin/bash

getpath1() {
    echo $PATH'/*' | sed 's/:/\/\* /g'
    # print the path, with a /* on the end;
    # then substitute every : with a /*[space]
}

getpath2() {
    echo $PATH | sed 's/:/ /g'
    # print the path only;
    # then substitute every : with a [space]
}

scanselect() {
	echo "How do you want to scan?
Select from 'path-scan', 'home-scan', 'full-scan', 'total-scan', or 'custom-scan'"
}

path-scan() {
	sudo clamscan --bell -r --move=/.quarantine `getpath2`
}

home-scan() {
	sudo clamscan --bell -r --move=/.quarantine /home/`whoami`
}

full-scan() {
	sudo clamscan --bell -r --move=/.quarantine --exclude-dir='/dev'  --exclude-dir='/sys'  --exclude-dir='/proc'  --exclude-dir='/.quarantine'  --exclude-dir='/.snapshots'  /
}

total-scan() {
	sudo clamscan --bell -r --move=/.quarantine /
}

custom-scan() {
	TARGET='unknown'
	printf "Select target files or directories to scan: "
	read TARGET
	if [ -d $TARGET ]; then
		sudo clamscan --bell -r --move=/.quarantine $TARGET
	else
		sudo clamscan --bell --move=/.quarantine $TARGET
	fi
}

qview() {
	echo 'These are the files in quarantine:'
	#sudo ls -hal /.quarantine
	#echo `sudo ls /.quarantine | wc -w`" entries in quarantine."
	sudo tree /.quarantine
}

qempty() {
	ANSWER='unknown'
	qview
	echo "Do you want to delete them all? (y/N)"
	read ANSWER
	if [ $ANSWER = 'y' ]; then
		sudo rm -rf /.quarantine
		echo 'All quarantine files deleted.
Returning to mussel interface.'
		sudo mkdir /.quarantine
	else
		echo "Returning to mussel interface."
	fi
}

show-help() {
	echo "List of commands:
	scan: Does not scan anything, just prints a list of commands for scanning.
	path-scan: Scans all files in the path. ($PATH)
	home-scan: Scans all files in your home directory. (/home/`whoami`)
	full-scan: Scans all files on the system (/), except for virtual filesystems and quarantine
	total-scan: Scans /all/ files on the system (/), nothing is excluded
	custom-scan: Scan a specific file or directory
	update: Update the threat database
	quarantine-view: List files in quarantine
	qview: Same as quarantine-view
	quarantine-empty: Delete all files in quarantine
	qempty: Same as quarantine-empty
	help: Print this list
	?: Same as help
	exit: Exit Mussel, return to the shell"
}

if ! [ -e /.quarantine ]; then
	sudo mkdir /.quarantine
	echo "Quarantine directory did not exist, just created it now"
fi

COMMAND="unknown"

echo "This is Mussel, an interactive command-line frontend to ClamAV.
Type 'help' or '?' for a list of commands."

while (true); do
	printf '] '
	read COMMAND

	if [ $COMMAND = 'scan' ] ; then
		scanselect
	elif [ $COMMAND = 'full-scan' ]; then
		full-scan
	elif [ $COMMAND = 'path-scan' ]; then
		path-scan
	elif [ $COMMAND = 'home-scan' ]; then
		home-scan
	elif [ $COMMAND = 'custom-scan' ]; then
		custom-scan
	elif [ $COMMAND = 'total-scan' ]; then
		total-scan
    elif [ $COMMAND = 'quarantine-view' ] || [ $COMMAND = 'qview' ]; then
		qview
    elif [ $COMMAND = 'quarantine-empty' ] || [ $COMMAND = 'qempty' ]; then
		qempty
	elif [ $COMMAND = 'update' ]; then
		sudo freshclam
	elif [ $COMMAND = 'help' ] || [ $COMMAND = '?' ]; then
		show-help
	elif [ $COMMAND = 'exit' ]; then
		break
	else
		echo 'This command does not exist'
	fi

done
@nixCraft@mastodon.social avatar nixCraft , to random

Did you know? "1. Respect the privacy of others, and 2. Think before you type." first appred in June 1993[1] sudo source code. This is called sudo lecture. Later in 2004, added "With great power comes great responsibility" - a quote from Stan Lee / Uncle Ben quote[2].

[1] https://www.sudo.ws/repos/sudo/rev/c101e9572d7f
[2] https://www.sudo.ws/repos/sudo/rev/ebd5a76ccd7e

ALT
@nixCraft@mastodon.social avatar nixCraft , to random

Adding spice to your sudo session with a lecture file on Linux or Unix https://www.cyberciti.biz/open-source/command-line-hacks/adding-spice-to-your-sudo-session-with-a-lecture-file-on-linux-or-unix/

ALT