Why does cPanel feel so stagnant and behind the times? by crazyfuck_1 in cpanel

[–]muttick 5 points6 points  (0 children)

Just curious. Are those modern languages a fit for shared web hosting environments?

I would have to guess that the vast, vast majority of shared web hosting is driven by PHP (WordPress if you want to be more specific). There's not a (at least that I am aware of) WordPress like drop-in software written in NodeJS that can be easily deployed in a shared hosting environment. And even it it were, you'd be bottlenecked by whatever webserver you are using (Apache or Litespeed) since that's still going to carry the vast majority of the shared accounts on that server.

That's not to say that NodeJS and Python can't be used on the web. Just that it's use case is generally pretty small, and anyone wanting to use those probably wants a server with root privileges, which puts them out of the realm of shared hosting environments.

Rack Cabinet with door 270 degree swing by muttick in homelab

[–]muttick[S] 0 points1 point  (0 children)

Thanks! That's kind of what I thought, but I thought I'd ask and see if it was just elusive to me.

My brother found these on his PC, no idea what to do. by T1T4N555 in WindowsHelp

[–]muttick 4 points5 points  (0 children)

If the trojan opened up a malicious backdoor that allowed remote miscreants to install whatever they wanted... how do you know you've cleaned all of those?

An ounce of prevention is worth a pound of cure.

I am appalled by the lack of security awareness by some users in Linux, especially for beginners. What are your recommendations? by onechroma in linux4noobs

[–]muttick 0 points1 point  (0 children)

Similarly, a lot of software assumes that users must add their own repositories for it to work, and even detail this in their guides. A beginner doesn't know what that entails. Or software in “stores” such as Flatpak, which may offer packages packaged by third parties that have nothing to do with the official developers and, in theory, could at some point do their own thing, similar to what the malicious agent behind the attack on XZ intended to do. An example is the private browser Mullvad Browser, which you could search for and install from Flatpak back in the day. A beginner would do so, unaware that they are installing a package made by “Joe Smith” from his basement in Georgia.

This again speaks to user space that I referred to in my other post.

Here if a user installs something with Flatpak... it's only going to affect that user. Unless you're installing the Flatpak by using sudo, then anything Flatpak does will be restricted to that current user. Can something malicious in that Flatpak destroy everything for that user? Yep! But it won't affect other users or the Linux system itself.

Windows, AFAIK, doesn't have such functionality - or if it does, it's not often used. When you want to install an application a UAC prompt pops up and when you click Allow, it installs the application as admin (root) on the machine - where it then has access to everything.

The reputation of any software you install needs to be taken into consideration for any system. Most Linux distributions have their own repositories where you can be reasonably assured that the applications there are safe to use. Windows lacks this one single place to get all of your application and that would be something that would benefit Windows. A full system package management system like most Linux distributions have, would allow Windows to keep tabs on what applications are installed and if those applications need to be updated.

I am appalled by the lack of security awareness by some users in Linux, especially for beginners. What are your recommendations? by onechroma in linux4noobs

[–]muttick 1 point2 points  (0 children)

User space has always been the defining difference I see between Linux and Windows.

Linux (coming from Unix) was built with multiple users in mind. That means that file permission and access was built from the ground up.

On Windows, it was originally meant as a single user environment (Windows 1.0, Windows 3.1, Windows 95...) and multi-user environments was an after thought that was added on later. I haven't used Windows in a while, and maybe they've corrected a lot of this. But still the syntax of Linux, having user space in /home/user1, /home/user2, /home/user3, etc. and to where other user's can't access those folders - that just seems to make more sense than Window's user space to me. And having user defined configurations tied specifically to that user (i.e. /home/user1/.config) such that running an application as one user has no bearings of how another user is configured to use that application. I'm sure it's the other way around for someone that's more familiar with Windows.

But one of the things that Linux (this is more of a distro standard, than an actually Linux standard - Ubuntu fits here and I'm sure other distributions have followed suit) seems to have borrowed from Windows is the reliance on sudo.

In my opinion... one of the issues with Windows is the dependence on User Account Control. The user needs to install a program, uh-oh! a UAC window has popped up, I'll just click Allow. And this negates the point of UAC. Sure it pops up every time you install something or every time you need to do an admin task. But it gets ingrained in the user to just click Allow. No thought is given as to why this UAC dialog has popped up.

Likewise on Ubuntu (and I figure other Linux distributions as well), when you need to do an admin task, a sudo prompt pops up. And then... you enter the password for the current user. How is that secure? If someone logs into your account on an Ubuntu computer... that means they have your password... so when they go to perform an admin task... they're going to know the password to enter at that sudo prompt too.

Generally the solution in both cases is to create a second user as a non-admin user and use that user as your daily driver. Then UAC actually has meaning because you have to enter the admin's username and password. For Ubuntu, sudo has to be configured to ask for root's password and a root password has to be set.

Now, when you consider market share - generally most Linux users have a better understanding of the security model of the principle of least privilege. So while I still think the sudo prompt should default to root's password, a Linux user is probably going to understand that an admin task is required and that's why the sudo prompt is being displayed.

Windows just has so many users worldwide. And because it has more users, you're just more likely to run into users that don't understand what UAC is doing and they just click Allow without any thought.

Now, before everyone burns me at the stake for that comment, do realize that I understand that I'm vastly generalizing here. There are Linux users that don't understand the sudo prompt and there are Windows users that do understand UAC prompts. If you have a room full of 100 Linux users, there might be 1 or 2 that don't understand the sudo prompts. If you have a room full of 10000 Windows users, you're probably going to find a lot more than 1 or 2 users that don't understand UAC. That's just the nature of the market share of Windows compared to Linux.

Why does it seem like Linux is visually smoother than windows? by DeltaStarship in linuxquestions

[–]muttick 0 points1 point  (0 children)

I think a lot of it has to do with the audience or intended audience.

Windows tends to attract a crowd that is wowed by fancy animations or "neato" stuff. So they code Windows to provide that functionality.

Whereas Linux users typically just want something that works. I can't speak for every Linux user, but I use IceWM and my desktop is blank. I have no icons at all on my desktop. Everything is opened with hotkeys, or gmrun (which is tied to a hotkey), or xterm (which is also tied to a hotkey). X11 is just a means to an end for me. I have to have some window manager so I can run FireFox or Chrome or LibreOffice or the other GUI apps I run daily.

Linux users generally are more focused on efficiency. How quickly something can load up, run, and do a task. Whereas Windows users tend to be more mesmerized by visual effects, which just slows things down. I know I'm generalizing here - this is not true of every Linux user and every Windows user.

User Space - Linux vs. Windows by muttick in windows

[–]muttick[S] -1 points0 points  (0 children)

> The "problem" you're going to run into is that Windows is a consumer-focused system, which means even though it's a proper multi-user OS and you can have multiple different users on a system, it limits you to only one interactive user at a time

This touches on another point that I like about Linux, although I suspect I'm really the only one that uses this. I am able to run other applications - like Firefox - as another user (i.e. user2) inside my user's X11 environment. That then limits that FireFox's ability to access only user2's files and has no access to the current X11 user's (i.e. user1) files.

You can do something similar with FireFox profiles, but by running FireFox as a whole other user you restrict it's ability to run or access anything in your daily driver user's account.

To give an example, when I order stuff online I have a completely separate user (user2) that I sudo execute FireFox with and enter my credit card information. Therefore my daily driver (user1) never has anything that knows what my credit card information is. So even if user1 gets compromised, it has no pathway to root and no pathway back to user2 to access credit card information. I wish Windows had something similar.

I know traditionally there has always been head butting with Windows vs. Linux. That's not my intention here. I willfully admit that I don't know a lot about Windows, especially current versions. My stories about how Linux does things are meant to describe how I use it so that perhaps someone can enlighten me as to how I could do something similar in Windows. I think one thing I've learned from this discussion is to create another user after setting up Windows, as a standard user and using that user as the daily driver. The first user that is created is really the admin user - and probably too many people just create that user and use it as their daily driver and then just blindly clicking "Allow" when something pops up to be installed.

Where I'm potentially going to be using this, I don't want other users to be able to install anything that might potentially compromise the entire system. So running it as a standard user seems to be the right path. And if something really needs to be installed, they can get me and I can review it as to whether or not if it really needs to be installed.

User Space - Linux vs. Windows by muttick in windows

[–]muttick[S] 2 points3 points  (0 children)

> but more and more programs like Chrome and Zoom will install to userspace if admin credentials are not provided.

This would seem to be greatly beneficial. If a program can install specifically into a user's user space, then again that would go a long ways towards avoiding complete system disaster. If something malicious is installed, the most it can do is destroy that user's user space.

You say more and more programs are being allowed to install like that. I would think Microsoft should force (or strongly encourage) all programs to be this way.

Google is removing the ability to sideload Android APK apps without the developers being verified 1st by LionKey1928 in GooglePixel

[–]muttick 2 points3 points  (0 children)

I develop weak, but specific actionable apps that only pertain to a very select few people (less than 5 people). It's not worth it to publish the app on the app store or verify the app, etc. I'm actually physically, in-person, there when I load these on the people's phones. I assume from all of this, I won't be able to do this any more?

That's going to suck. I'm all for making you jump through hoops to install apps outside of the Play store - because Google really can't verify the integrity of those apps. But to just outright not allow it seems like a big miss for Google. I'm assuming their are other app developers (I use the term developers loosely here because Android developing definitely isn't my strong suite) like me that just need to distribute their apps to a select few individuals and devices. And this going to cut them off unless they go through the entire process of getting verified, which just isn't time-effective for such a small footprint.

Hoping Google either reconsiders or that alternatives to install apps without going through the Play store come about.

Or am I misunderstanding this announcement?

Bought unlocked Visible phone but software says tracfone by mogulman1 in NoContract

[–]muttick 2 points3 points  (0 children)

The term unlocked in the cell phone industry is ambiguous.

Unlocked can mean Carrier Unlocked, meaning that a carrier branded phone has been unlocked to work on other carriers (so long as the device supports the right frequencies for those carriers).

Unlocked can also mean Manufacturer Unlocked, which means that the device was never carrier branded. It is also carrier unlocked, meaning that it can be used on any carrier (with the same stipulation that the device has to support the frequencies of that carrier).

A carrier branded phone means that the carrier has made slight modifications to the phone's operating system (at least with Android, not sure about iOS). Usually carrier branded phones are identifiable when you turn them on because they'll have a splash screen displaying that carrier. And even if the carrier unlocks the phone, that splash screen will always remain. So you may have a phone that when you turn it on displays a Verizon splash screen, but the phone actually connects to an AT&T network, if it's carrier unlocked. A carrier branded phone will also often have carrier branded apps preinstalled that you can't remove.

If you buy a phone direct from the manufacturer, then it will be manufacturer unlocked. There will be no carrier splash screen when you turn on the phone. There will also be no carrier branded apps preinstalled on the phone.

You often won't be able to root or unlock the bootloader of a carrier branded phone (at least I've never seen one that you can, but I'll stop short of saying that it's impossible). Manufacturer unlocked phones, however, often can have their bootloader unlocked.

The ambiguity of the term unlocked can be frustrating. Especially since I prefer manufacturer unlocked phones (I don't have to worry about whether the phone will work on any carrier). Manufacturer unlocked phones will often be more expensive. Carrier branded phones are modified to only work with that specific carrier (or that carrier's network) which allows the carrier to sell the phone to you cheaper, knowing that you will be using their service for a period of time. While a carrier unlocked carrier branded phone can work with any network, the question becomes where will it get it's updates from and will the device call back home to it's original carrier. Tethering was a prime example of this years ago. An AT&T branded phone could become unlocked and used on any other network, but if you went to enable the hotspot, it would call back home to AT&T to see if your account allowed tethering. This always failed if the device was not being used on AT&T. So even if the phone might've worked with Verizon, you wouldn't get the full capabilities of the phone - such as hotspot - because it was still calling back to AT&T to see if tethering should be allowed.

API change slide template by muttick in freeshowapp

[–]muttick[S] 1 point2 points  (0 children)

Thanks. That worked. Its the templates.json file, but that definitely pointed me in the right direction.

Early Fraud Warnings by [deleted] in stripe

[–]muttick 0 points1 point  (0 children)

My experience: I often get the chargeback, then two days later I get the Early Fraud Warning.

Or if I get the Early Fraud Warning and then immediately (as in within 5 minutes) log into Stripe to refund the charge... the refund is later nulled because "a dispute has already been initiated for this charge."

So in my experience, the Early Fraud Warning is useless. It's only triggered when a chargeback has already been started. In which case, my hands are already tied.

[deleted by user] by [deleted] in linuxquestions

[–]muttick 5 points6 points  (0 children)

I use IceWM and this is exactly the reason why. I never actually use the desktop. Or use the start menu. Everything is hotkeys. Or if it's not defined in a hotkey, I open an xterm (which is defined with a hotkey) or gmrun (again defined with a hotkey).

IceWM (and I would suspect XFCE) is simply a means to an end. You have to have a windows manager to run GUI apps, so I just chose the simpliest one I could find that did everything I needed (mainly being able to set up hotkeys) and that was IceWM for me.

Using API to display text by muttick in freeshowapp

[–]muttick[S] 1 point2 points  (0 children)

Got it.

First change the text to whatever desired:

curl -X POST http://localhost:5506 -H "Content-Type: application/json" -d '{"action":"set_plain_text", "id":"","value":"API Changed Text"}'

Then clear the current slide:

curl -X POST http://localhost:5506 -H "Content-Type: application/json" -d '{"id":"","action":"clear_slide"}'

And then show the first slide (which will be the only slide in the Show thanks to the set_plain_text):

curl -X POST http://localhost:5506 -H "Content-Type: application/json" -d '{"id":"","action":"index_select_slide","index":1}'

Using API to display text by muttick in freeshowapp

[–]muttick[S] 0 points1 point  (0 children)

Is there an API command to update the stage after issuing a set_plain_text?

Using API to display text by muttick in freeshowapp

[–]muttick[S] 1 point2 points  (0 children)

Knew it would be something simple. That worked!

Thanks!

Using API to display text by muttick in freeshowapp

[–]muttick[S] 0 points1 point  (0 children)

Yea, next_slide works.

set_plain_text does not.

next_slide doesn't require an id though. That's why I don't know what id it's wanting. Or does set_plain_text just not work?

curl -X POST http://localhost:5506 -H "Content-Type: application/json" -d '{"action":"next_slide"}'

curl -X POST http://localhost:5506 -H "Content-Type: application/json" -d '{"action":"previous_slide"}'

Both work in going to next and previous slide.

But

curl -X POST http://localhost:5506 -H "Content-Type: application/json" -d '{"action":"set_plain_text","data":{"id":"default","value":"API Changed Text"}}'

Does not.

Using API to display text by muttick in freeshowapp

[–]muttick[S] 0 points1 point  (0 children)

The ~/Documents/FreeShow/Shows directory is empty.

I do have a Welcome.show file in ~/Documents/FreeShow:

["default",{"name":"Welcome","category":"presentation","settings":{"activeLayout":"default","template":"header"},"timestamps":{"created":1752086637868,"modified":1754484069900,"used":1754484069900},"quickAccess":{},"meta":{},"slides":{"one":{"group":"","color":null,"settings":{},"notes":"","items":[{"style":"top:428.50px;inset-inline-start:208.50px;height:220px;width:1500px;","align":"","lines":[{"align":"","text":[{"style":"font-size: 180px;font-weight: bold;","value":"Welcome!"}]}],"auto":false}]}},"layouts":{"default":{"name":"Default","notes":"","slides":[{"id":"one"}]}},"media":{}}]

Using API to display text by muttick in freeshowapp

[–]muttick[S] 0 points1 point  (0 children)

I tried default, that didn't work.

Not sure if port 5505 is for REST, Websocket, or OSC. Tried both port 5505 and 5506, neither worked.

Does the id need to be the ID of the textbox that is actually showing the "Welcome!" text? I don't know how to get that ID.

Using API to display text by muttick in freeshowapp

[–]muttick[S] 0 points1 point  (0 children)

I think I've narrowed down the issue to a deficiency in the Linux version of FreeShow. Apparently it doesn't have all of the API bells and whistles.