Removed by mod
God my wife would just stare at me and then go on with her previous conversation.
My wife would just kiss me so I stfu
Same, and I don’t mind
Me neither lol I know when I start nerding out and thank her for putting up with it
My boyfriend is completely technically illiterate haha. But he’s such a good boy otherwise
Gotta keep that one around
She’s literally the person in this meme
if only all my friends were like that
They definitely tolerate my nerdiness, but they just don’t get it, even after an explanation.
It’s like that guy that posted an example Bitcoin miner on GitHub, then a bunch of script kiddies forgot to change his wallet info for their own before deploying… He made a good chunk of change by doing nothing malicious.
Dream job.
Should’ve written the malware in Go, smh
Sorry, folks. Using
cmalw-libis now deprecated.Cool kids are using
systemd-malwdIsn’t this just a newer version of this? https://www.gnu.org/fun/jokes/evilmalware.html
Even if it were inspired, it is significantly different the way it’s written. I’ve hit these same challenges before, so I’m more inclined to think it is independent discovery.
The newer one is a lot funnier though.
I guess the process could be regarded as gain of function research.
This reminds me of the old linux hater’s blog post “At least we don’t have any viruses”.
That certainly was a blog with many emotions. Coming at this with no context, it looks like the kind of content that would be beautiful satire, except it’s probably not.
Linux Hater’s Blog was half satire and half honest criticism.
Seems like the prediction about the web panned out…
i laughed so hard 😂 😂 😂
Text version:
Downloaded a virus for Linux lately and unpacked it. Tried to run it as root, didn’t work. Googled for 2 hours, found out that instead of
/usr/local/binthe virus unpacked to/usr/binfor which the user malware doesn’t have any write permissions, therefore the virus couldn’t create a process file. Found patched .configure and .make files on some Chinese forum, recompiled and rerun it. The virus said it needs the librarycmalw-lib-2.0.Turns outcmalw-lib-2.0is shipped with CentOS but not with Ubuntu. Googled for hours again and found an instruction to build a.deb package from source. The virus finally started, wrote some logs, made a core dump and crashed. After 1 hour of going through the logs I discovered the virus assumed it was running on ext4 and called into its disk encryption API. Under btrfs this API is deprecated. The kernel noticed and made this partition read-onlyOpened the sources, grep’ed the Bitcoin wallet and sent $5 out of pity.










