Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)CB
calm.like.a.bomb @ clmbmb @lemmy.dbzer0.com
Posts
8
Comments
376
Joined
2 yr. ago

  • I don't really like using Docker so I always go for easier option

    Usually docker is the easiest option as you don't have to install a lot of dependencies, then set up other services and databases and whatnot. Especially if you use docker-compose.

  • Depending on how the UEFI is configured, a simple copy/paste command, executed either by the malicious image or with physical access, is in many cases all that’s required to place the malicious image into what’s known as the ESP, short for EFI System Partition, a region of the hard drive that stores boot loaders, kernel images, and any device drivers, system utilities, or other data files needed before the main OS loads.

    (from the article)