• 0 Posts
  • 9 Comments
Joined 3 months ago
cake
Cake day: August 5th, 2024

help-circle



  • You need to bridge your network adapter so you are on the same network subnet. When you bridge the VM appears on the same network. The default is NAT which by default is a different subnet. Like you, the host are on 192.168.1.0/24 and the VM, the guest is on 192.168.122.0/24. Unless you have two network adapters(if so you could let the VM have it) unlike most people bridged is what you’re looking for. VPN tunnel is usually when you are remote of your VM so unnecessary IMO.



  • In other news rain is wet. Damn the legal system is so inept and corrupt. This has been clear for what, like 20 years now. Should have been deemed illegal all along. For profit companies will always seek market domination to maximize profits, always have and always will. It’s the legal system & authorities job to regulate so it doesn’t happen and take swift action when it does.

    They should also break up Google’s stranglehold on the browser market but I guess that’ll take another decade or two at least as well. Sadly meanwhile this ruling could lead to Mozilla losing its main funding if Google can’t keep paying to be default search engine which could lead to even less choice in the browser space.



  • Your comparison was with random exes on the most targeted, malware infested operating system out there.

    Many eyes are always better than no eyes. I’m not saying you shouldn’t vet the code stop misinterpreting but no one knows or catches everything by themselves. That’s why security needs transparency. If it’s as insecure as you’re saying we would have way bigger problems but we don’t. AUR is not as safe as the Arch repository sure, but definitely safer than installing random exes on Windows. It’s a flawed comparison you’re making.

    If you’re paranoid you should be on an immutable distro cause xz backdoor was in some official repos. Repo maintainers do not catch everything either it was just a mere coincidence someone caught it(again thanks to transparency & many eyes on code) before mass deployment. Installing anything with root access is a risk. Going online is a risk. But there are ways to mitigate risk. Some security you’re always gonna have to trade for convenience.


  • Well there is far less malware on Linux tbf so comparison is not completely accurate. But same caution applies, try to vet and understand what you install. That part is also easier with the AUR as it’s transparent in the packagebuild what it does unlike random exes with closed source. It’s also a large community with many eyes on the code so unless it’s a package with few users then it’s gonna get caught pretty quickly.