• 2 Posts
  • 43 Comments
Joined 4 days ago
cake
Cake day: January 6th, 2026

help-circle
  • kumi@feddit.onlinetoLinux@lemmy.mlReplace Windows, Excel needed
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    11 minutes ago

    In this case they are apparently fine with a personal computer being used

    Where? Looks ambiguous. From all we know this is a work computer provided by the employer. It’s more likely to be an oversight or deprioritized/neglected.

    which makes RDP actually a slightly more secure solution

    I do not see how that folllows.

    If both the company and employee are indeed fine with the RDP, it should be no problem to get that confimed from IT in writing.


  • kumi@feddit.onlinetoLinux@lemmy.mlReplace Windows, Excel needed
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    2 hours ago

    Separate your personal and work computer

    nods enthusiastically
    Important for security of both the employee and the company. Don’t mix business and pleasure. It’s the only thing that makes sense!

    Put Windows and all work related software on a separate work laptop and use remote desktop from your Linux PC to do your job.

    What? No! Keep them separate! This is how people get pwned. Don’t backdoor your employers machine from your personal PC or vice versa!






  • On 1: Autoseeding ISOs over bittorrent is pretty easy, helps strengthening and decentralize community distribution, and makes sure you already have the latest stable locally when you need it.

    While a bit more resource intensive (several 100GB), running a full distribution package mirror is very nice if you can justify it. No more waiting for registry sync and package downloads on installs and upgrades. apt-mirror if you are curious.

    Otherwise, apt-cacher-ng will at least get you a seamless shared package cache on the local network. Not as resilient but still very helpful in outage scenarios if you have more than one machine with the same dist. Set one to autoupgrade with unattended-upgrades and the packages should be available for the rest, too.



  • I am currently trying to transition from docker-compose to podman-compose before trying out podman quadlets eventually.

    Just FYI and not related to your problem, you can run docker-compose with podman engine. You don’t need docker engine installed for this. If podman-compose is set up properly, this is what it does for you anyway. If not, it falls back to an incomplete Python hack. Might as well cut out the middle-man.

    systemctl --user enable --now podman  
    DOCKER_HOST=unix://${XDG_RUNTIME_DIR}/podman/podman.sock docker-compose up  
    

  • I think Mora is on the ball but we’d need their questions answered to know.

    One possibility is that you have SELinux enabled. Check by sudo getenforce. The podman manpage explains a bit about labels and shares for mounts. Read up on :z and :Z and see if appending either to the volumes in your compose file unlocks it.

    If running rootless, your host user also obviously needs be able to access it.





  • Auhorities in other European countries are known to MitM SSL certs at VPS providers for years already. Switzerland is moving their legislation towards the EU direction. Proton themselves have been vocal about their concerns about this.

    How long until someone realizes they can demand Proton to inject some extra JS into the webmail for desired targets? Folks in a sensitive situation should follow the established best-practice of not relying on remotely served JS for client-side encryption. To be safe against this vecor, handle your encryption and signing outside of the webmail; either in your own client or copy/pasting.