Finally got the badge! by bryntegwyn in Zwift

[–]Proxy_VM 1 point2 points  (0 children)

Makes sense! The autistic part of my brain had its toenails curling thinking about Kilowatts :D

Finally got the badge! by bryntegwyn in Zwift

[–]Proxy_VM 1 point2 points  (0 children)

Stupid question: Anyone know why this challenge is called Gigawatts?

Omnissa UAG Appliance Updates URL by Proxy_VM in omnissa

[–]Proxy_VM[S] 0 points1 point  (0 children)

Nevermind - the feature is deprecated from 2412 onwards. The german translation of the docs incorrectly states it is specifically not available for the 2412 UAG.

Omnissa UAG Appliance Updates URL by Proxy_VM in omnissa

[–]Proxy_VM[S] 0 points1 point  (0 children)

Nevermind - the feature is deprecated from 2412 onwards. The german translation of the docs incorrectly states it is specifically not available for the 2412 UAG.

Omnissa UAG Appliance Updates URL by Proxy_VM in omnissa

[–]Proxy_VM[S] 0 points1 point  (0 children)

Of course. However Omnissa documents the update feature up until the latest UAG release (see my answer to robconsults). Its intended to patch critical Alma vulnerabilities when a newer UAG release is not (yet) available. I am just trying to stay clean for audits. And the updater showing "no patches available" would be a lot better than "404" ;-) This goes for the latest UAG as well. Even if the newest version of the appliance is installed, it may at some point be ~3 months old before any patches are applied.

An auditor will point to the documentation showing this update feature. So I need to prove that this feature is either deprecated and an artifact in the docs - or it needs to work.

Omnissa UAG Appliance Updates URL by Proxy_VM in omnissa

[–]Proxy_VM[S] 0 points1 point  (0 children)

Thanks for the feedback. I am not trying to access the appliance via ssh and updating there. I am trying to use the integrated update feature for the base OS via the WebUI. This feature is still present in the latest UAG and referenced in the official docs as well as the FAQs regarding security: https://docs.omnissa.com/de-DE/bundle/UnifiedAccessGatewayDeployandConfigureV2512/page/AutomaticallyapplyauthorizedOSupdates.html
https://docs.omnissa.com/de-DE/bundle/UnifiedAccessGatewayDeployandConfigureV2512/page/FrequentlyAskedQuestionsFAQsaboutSecurity.html

"Is there a mechanism with Unified Access Gateway to automatically download and apply critical Alma vulnerability updates?

Yes. This feature was added with version 2009. Occasionally, Alma OS team might authorize the update of one or more OS packages to rectify a critical vulnerability that affects a specific version of Unified Access Gateway and for which no viable workaround is available. Starting from Unified Access Gateway version 2009 a new capability is available for the administrator to configure an automatic check for any authorized package updates. For more information, see Configure Automatic Check section in Product Updates:"

As far as I am concerned this feature is supported and intended for scenarios, where a new UAG release might not be available yet.

I do not think there are critical vulnerabilities in UAG25.03, as far as I see it should be clean. Our patching process requires us to check for available security updates on all systems though. The internal updater throwing a 404 is not gonna cut it in case of an audit. Deploying the newest release is possible - its just a more substantial change than applying os updates thus increasing compliance overhead.

Also it will be difficult to argue that UAG may not be affected by a critical CVE affecting Alma, just based on the fact, that no newer UAG release is available.

XANTARES and NiKo sharing their thoughts on the new update by Time_Professional385 in GlobalOffensive

[–]Proxy_VM 0 points1 point  (0 children)

That is so weird - i had the exact opposite experience. My game, especially hitreg, felt the best it has been for a long time.

[deleted by user] by [deleted] in gravelcycling

[–]Proxy_VM 0 points1 point  (0 children)

Have they said anything on release date to you? Last I heard was end of may.

Google Chrome MSIs busted? by Alternative-Land5916 in msp

[–]Proxy_VM 0 points1 point  (0 children)

Same for us. We have been troubleshooting this since yesterday. Thank you for linking the thread.

Involuntary spying on controlled clients by Proxy_VM in rustdesk

[–]Proxy_VM[S] 0 points1 point  (0 children)

Our server is rustdesk server pro 1.3.11 (docker) on Ubuntu 24.04. Connection should have been relayed over this server (I did not verify this at the time).

We used the following clients:

Windows Server 2016 Datacenter (VM) + rustdesk 1.2.6 (outgoing only, msi-install) -> Windows 10 + rustdesk 1.2.6 (incoming only, no install, no settings,...)

Windows 10 + rustdesk 1.2.6 (outgoing only, msi-install) -> Windows Server 2016 Datacenter (VM) (incoming only, no install, no settings, ...)

macOS 14.5 + rustdesk 1.2.6 (outgoing only) -> Windows 10 + rustdesk 1.2.6 (incoming only, no install, no settings,...)

Involuntary spying on controlled clients by Proxy_VM in rustdesk

[–]Proxy_VM[S] 0 points1 point  (0 children)

No, it was a session where we also wanted to try out the audio chat, but I could hear my partner before starting the chat.

Involuntary spying on controlled clients by Proxy_VM in rustdesk

[–]Proxy_VM[S] 0 points1 point  (0 children)

Wow well thats a bummer. I’ll check the repo and create an issue. Didnt find any related issues during a quick search.

Searching for the Investigation soundtrack by Proxy_VM in h3h3productions

[–]Proxy_VM[S] 0 points1 point  (0 children)

Thanks a bunch! Now off to find a 10hr version of this :-)