On Sun, Aug 01, 2021 at 04:30:45PM +0300, Gunnar Gervin wrote: > Security. > Rarely discussed in Linux(?).. > Was scammed recently; naive me let a man w/Bad accent take over my laptop > to 'help refund BTC' & make me pay 100$. > Because of that &/or me in Synaptic bloating (2 many) packages, which led > to "1t fix broken packages", "put in Debian 10.9 Netinst cdrom", & "can't > find key file" messages (yes, all 3 !). > After trying "all" workarounds, I installed another, more simple Linux > distro, built up a new setup of relevant programs to build VM, containers, > websites, Debian iso image, & CHEF.
Which distro - are you still using Debian? If not, we can't really help you. Although many of us have run other distributions in the past, all of the Debian/Ubuntu derivatives do something slightly different - we can only really help with generic Debian things. If we offer help with any other distribution, it's only ever best efforts - Debian derivatives have their own support infrastructure. > Now Chef asks me to give URL to continue setting up a VM etc. > Plz advise &/or help to do it/this. It may not be relevant but the chef and chef-zero packages in Buster appear to no longer be packaged in Bullseye - the upcoming release due in two weeks. Ask on a Chef list, perhaps? > BR, > GEG All best, as ever, Andrew Cater > > On Wed, 21 Jul 2021, 18:59 Dan Ritter, <d...@randomstring.org> wrote: > > > Reco wrote: > > > On Wed, Jul 21, 2021 at 10:51:40AM -0400, Celejar wrote: > > > Numbers show that I was incorrect. Let's call it "unlikely" instead of > > > "rare". Let the popcon graphs speak for themselves: > > > > > > https://qa.debian.org/popcon.php?package=firefox-esr > > > vs > > > https://qa.debian.org/popcon.php?package=openjdk-11 > > > > Standard reminder: popcon vastly over-represents > > individually-owned laptops and desktops over servers and > > corporately-owned anything. > > > > In this case, individuals are sometimes infected with ransomware > > by happenstance, but corporates are actually targets. > > > > > It won't by itself, of course. One sure way to beat ransomware is to > > > take immutable backups (i.e. unmodifiable by host during and after the > > > backup is taken), and as recent history shows us - ransomware victims > > > apparently do not use this approach. > > > > Yes indeed. > > > > -dsr- > > > >