Skip Navigation
Docker Raises Prices Up to 80 Percent | ServeTheHome
  • Youre talking about Linux containers on Windows, I think commenter above was referring to windows containers on Windows, which is its own special hell for lucky folks like me.

    Otherwise I totally agree. Ive done both setups without docker desktop.

  • Docker Raises Prices Up to 80 Percent | ServeTheHome
  • Windows container runtime is free as well, simply install the docker runtime from chocolatey or winget along with the Windows Containers and Hyper-V windows features. This is what we do on some build machines for CI.

    Theres no reason to use desktop other than "ease of use"

  • MyPillow Man Mike Lindell Ordered to Pay Legal Fees for Guy Who Proved Him Wrong at ‘Prove Mike Wrong’ Event
  • Funny packets make things behave funny sometimes. Sometimes you just need to see how something behaves when you send it illegal packets that the real software would never send.

    It also makes it possible to cheat in some games by lying to the game server about interactions in game.

    Essentially hackers need a way to talk to machines at every level of every protocol and Scapy is a pretty standard way of achieving that.

  • Removed
    Hacker Shows How to Get Free Laundry For Life
  • Unfortunately a lot of rentals dont have their own laundry, or have to use a shared building laundry.

    At my last place we had to pay 3$ for a wash and 6$ for a dry. Had to use a credit/debit machine to load a card, and the machine was frequently broken, so I'd have to go to another building in the area to reload it, but I'd have to wait for someone to let me tailgate in the lobby.

    Just own it is like saying people should just buy homes or move to a better apt.

  • Microsoft is testing Game Pass ads on the Windows 11 Settings homepage
  • if you're in the know, check out vlmcsd on github and "test" windows enterprise with KMS. It can run on everything from a pi, to docker, to openwrt. If you're really gangster, you can set up SRV records and get auto activation on your lan

  • Rabbit R1 AI box revealed to just be an Android app
  • Holy shit, that's actually hilarious, I imagine someone would have noticed when their paste/auto type password managers didn't work

    For those confused, this sounds like instead of making a real website, they spin up a vm, embed a remote desktop tool into their website and have you login through chrome running on their VM, this is sooooo sketch it, its unreal anyone would use this in a public product.

    Imagine if to sign into facebook from an app, you had to go to someone else's computer, login and save your credentials on their PC, would that be a good idea?

  • TL;DR You can manage Linux Machines with group policy
  • sorry I don't have any real documentation but I have a snippet of powershell that explains it pretty well here this comes from a user creation script I wrote back when they removed the unix UI.

    I was using Get-AdUser and discovered that the properties still existed but you have to manually shove those in, when an sssd "domain bound" linux machine has a user with these props login, they get the defined UID and GID and homefolder etc.

    $otherAttributes = @{}
    Write-Host -ForegroundColor Yellow "Adding Linux Attributes"
    
    # get the next numeric uid number from AD
    $uidNumber=((get-aduser -Filter * -Properties * | where-object {$_.uidNumber} | select uidNumber | sort uidNumber | select -Last 1).uidNumber)+1
    
    $otherAttributes.Add("unixHomeDirectory","/homefolder/path/$($samAccountName)")
    $otherAttributes.Add("uid","$($samAccountName)")
    $otherAttributes.Add("gidNumber","$($gidNumber)")
    $otherAttributes.Add("uidNumber","$($uidNumber)")
    $otherAttributes.Add("loginShell","$($loginShell)")
    
    $UserArgs = @{
        Credential = $creds
        Enabled = $true
        ChangePasswordAtLogon = $true
        Path = $usersOU
        HomeDirectory = "$homeDirPath\$samAccountName"
        HomeDrive = $homeDriveLetter
        GivenName = $firstName
        Surname = $lastName
        DisplayName = $displayName
        SamAccountName = $samAccountName
        Name = $displayName
        AccountPassword = $securePW
        UserPrincipalName = "$($aliasName)@DOMAIN.COM"
        OtherAttributes = $otherAttributes
    }
    
    $newUser = New-ADUser @UserArgs
    

    basically the "OtherAttributes" on the ADUser object is a hashtable that holds all the special additional LDAP attributes, so in this example we use $otherAttributes to add all the fields we need, you can do the same with "Set-Aduser" if you just wanna edit an existing user and add these props

    the @thing on New-ADuser is called a splat, very useful if you're not familiar, it turns a hashtable into arguments

    lemme know if you have any questions

  • TL;DR You can manage Linux Machines with group policy
  • Microsoft pulled those from the UI, but if you're adventurous you can just shove those attributes in to user with power shell and it works the same.

    Then just use sssd instead of NIS, surprised me at work when this worked.

  • InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)CH
    cheet @infosec.pub
    Posts 0
    Comments 44