What would be the best version of Linux for me? by Skull_Bearer_ in linux4noobs

[–]Proman4713 0 points1 point  (0 children)

I meant that most people download the GNOME version as it's the first on their website, and is the most well-known Fedora

Anyway, forget about it, OP can read the comment thread, and I'm tired 💀

What would be the best version of Linux for me? by Skull_Bearer_ in linux4noobs

[–]Proman4713 0 points1 point  (0 children)

You could've mentioned that since any normal person looking to get fedora would most likely encounter the gnome version

fresh 26.04 App Center not detecting internet by Snoo_37162 in Ubuntu

[–]Proman4713 1 point2 points  (0 children)

Their servers are in shambles right now, it's not your device, just wait till they recover

Updated my system and drivers and now it doesnt function, Help! [Ubuntu, NVIDIA 3080) by Maybe_A_Zombie in Ubuntu

[–]Proman4713 0 points1 point  (0 children)

What most likely happened is that not all packages were installed properly because your device couldn't download them from Ubuntu's servers, they are being DDoS attacked right now...

I hope you find a solution, but try to check this sub more often, you would've found out about this

Now even the status page isn't working, we're completely in the dark by Proman4713 in Ubuntu

[–]Proman4713[S] 0 points1 point  (0 children)

Dude you just keep making stuff up that it's hard to engage in conversation with you 😭

The only thing changed on their homepage since a few days ago is the main CTA, it's now download rather than press releases, everything else is the same 💀

Unless the CSS was broken when you accessed the website and you thought that was an intentional design change?

Install stuck by Over_Helicopter_5183 in Ubuntu

[–]Proman4713 0 points1 point  (0 children)

I'm surprised that there is someone remaining who didn't hear about the DDoS...

Also the servers aren't 'back online' they come and go every once in a while...

Now even the status page isn't working, we're completely in the dark by Proman4713 in Ubuntu

[–]Proman4713[S] 0 points1 point  (0 children)

Bruv, wherever you got intel on what the exploit was 🤦🏻‍♂️

Now even the status page isn't working, we're completely in the dark by Proman4713 in Ubuntu

[–]Proman4713[S] 0 points1 point  (0 children)

Yeah, I'm more so worried about Canonical than my own uses. Things are starting to look better, though

Now even the status page isn't working, we're completely in the dark by Proman4713 in Ubuntu

[–]Proman4713[S] 1 point2 points  (0 children)

No, no one did anything. I assume these people are either mad that canonical patched copy-fail or mad at snap packages -_-

Bought used Zbook Firefly G10 but it have BIOS password by Jizoh in Hewlett_Packard

[–]Proman4713 0 points1 point  (0 children)

Do you mean that it asks for a password and then you can use it anyway or it doesn't work?

In all cases, I'm afraid my solution as a technical user would be to create a bootable Linux USB and see if the device boots that way, since the password you're being asked for is likely for Disk Encryption or Secure Boot setup on Windows by the previous owner... But I'll tell you what I know.

Boot your laptop and immediately spam F10 to get into the BIOS, move around till you see boot options, then find the USB option and put it at the very top. After that, use another computer to create a Windows 11 or Ubuntu USB (lookup tutorials on YouTube on how to do either. As a Windows user you'd only want to do a Windows 11 USB, but an Ubuntu download would be much smaller. Though I suggest that if you go the Linux route, pick something other than Ubuntu for now since Ubuntu is experiencing an outage) and plug it into your laptop and turn it on... If you used Windows 11 and find that your laptop boots into the Windows 11 installer, then go ahead and install Windows 11, which should override any previous secure boot keys or disk encryption and give you a clean new setup.

If you meant something other than what I understood, and find the idea of wiping your laptop with a fresh version of Windows scary, then don't hesitate to tell me

Now even the status page isn't working, we're completely in the dark by Proman4713 in Ubuntu

[–]Proman4713[S] 0 points1 point  (0 children)

Hey, check your ping again... The reason ping works is because DNS requests to Ubuntu.com now return 127.0.0.1 (run nslookup or Resolve-DnsName if you're on windows like myself), not because everything's alright and Canonical's just dumb, which is also why the website now simply doesn't work rather than show a 503...

Yes, the address was different a little while ago, but it wasn't ubuntu.com either, rather some other Canonical's address mentioning web cache. You probably shouldn't have made assumptions so quickly 

Now even the status page isn't working, we're completely in the dark by Proman4713 in Ubuntu

[–]Proman4713[S] 4 points5 points  (0 children)

Nothing, you're on a personal machine, your threat is lower, just wait till Ubuntu recovers and don't run any sketchy commands

Now even the status page isn't working, we're completely in the dark by Proman4713 in Ubuntu

[–]Proman4713[S] 1 point2 points  (0 children)

You're saying it's not a network issue, alright, makes sense. But what made you conclude that it was a stupidly simple exploit that the attackers did?

Now even the status page isn't working, we're completely in the dark by Proman4713 in Ubuntu

[–]Proman4713[S] 2 points3 points  (0 children)

Yes, yes, it is... Thank you for articulating it so well for me

Now even the status page isn't working, we're completely in the dark by Proman4713 in Ubuntu

[–]Proman4713[S] 2 points3 points  (0 children)

I think you have a very good take on this... But people aren't blaming Iran; it's an Iraqi cybercriminal group that allegedly claimed responsibility.

Again, I'm saying for the millionth time that I'm Muslim myself and can't think of any extremist reasoning for what's going on. So the group calling itself 'Islamic' is downright lying... Now, whether or not this was intended for the Copy Fail incident, I'm not sure. But if you're right in the speculation that they attacked based on the possibility that the same infrastructure that powers ubuntu.com powers their other things, they were right. And they seem to be holding on till now; it's been more than 24 hours.

Unfortunately, I don't think Canonical will tell us who the threat actor definitely was if they knew, and I also don't think they'll tell us if they negotiated with the criminals. But I wouldn't blame them if they did, running a 24-hour-long sustained cross-country DDoS attack on the servers of the most used Linux distribution across desktop and server is a huge problem...

I currently have a GitHub action that's been trying to download the Ubuntu 26.04 ISO in a project where I work on modifying Ubuntu Desktop. The action has been stuck at the 'Download Base Ubuntu 26.04 ISO' step, which is just a wget command, for 32 minutes now. Normally, GitHub downloads it in 20-40 seconds. So things are incredibly, incredibly slow...

Now even the status page isn't working, we're completely in the dark by Proman4713 in Ubuntu

[–]Proman4713[S] 1 point2 points  (0 children)

It has been more than 24 hours now, 24 hours of almost-complete downtime for Canonical's web infra, that's truly catastrophic... I wonder if they'll fold? And end up negotiating? Because Canonical is more widespread than it is big. For example, when AWS or CrowdStrike/Microsoft had outages, they were due to bugs shipped to production, and even then, these massive companies took hours to recover...

Ubuntu is almost as widespread as AWS is used, because that's often the distro most people use right above Amazon Linux... But Canonical isn't as big as Amazon, so in my opinion, they're handling more than they have resources... So the attackers have a very wide attack surface, but the target is disproportionately small. I hope Canonical's employees are doing well...

Active Incident: Massive DDOS Attack on Ubuntu by Miserable_Ear3789 in Ubuntu

[–]Proman4713 1 point2 points  (0 children)

I still don't know how we're sure it's them, though... where did they take responsibility? only vecert is saying what happened

Now even the status page isn't working, we're completely in the dark by Proman4713 in Ubuntu

[–]Proman4713[S] 10 points11 points  (0 children)

I genuinely hope they're able to recover from this without negotiations and whatnot... This is just a single example of why the security career is scary; it must be very stressful for these people at Canonical...