@mh i learned a ton and thanks again for all your help! i'm going to try messing around a bit more but definitely neat getting it all to function. who knows, might get the GPU to pass thru by some fluke lol.
always fun to tinker :D
@mh i learned a ton and thanks again for all your help! i'm going to try messing around a bit more but definitely neat getting it all to function. who knows, might get the GPU to pass thru by some fluke lol.
always fun to tinker :D
@mh alright, got an update. VM installed win10 no problem. tried mucking around the video settings and zero luck. one setting actually allowed me to see the VM but was slow af. other settings leave a black screen.
i think i can still work with my USB bootable win10 but gotta look into ensuring secure boot and seeing how to encrypt partitions/drives after they are set up. otherwise i'll need to wipe Mint and encrypt with a fresh install. win10 on this puppy may need to be sacrificed
@Djeep samesies. was and instant block for me
@mh caught that afterwards. didn't even know when setting it up so killed that VM. gonna try again.
was kinda creepy :P
one thing i noticed is it doesn't seem to connect to the GPU. i imagine the video memory usage isn't scaleable?
@mh holy shit! effin' install automatically connected to the internet! its trying to authenticate via email confirmations. i lied to the pos but WOW! i think its piggy backing my internet on the host machine!
@mh thanks! just installed and trying to get win10 installed on it now. will report soon!
@mh just hit up KVM's page and don't see how to install. is there a repository to hunt for?
@mh don't blame you one bit. ever since my shift to linux, i'm barely on win myself. its just Excel. damn that thing is powerful and necessary for my business :P ugh!
i'm going to mess around with KVM tho and i appreciate the recommendation.
never thought malware could jump from os to os. maybe will nab myself a monitor and run all my internet needs thru a pi hehe
@mh thanks! KVM, i'll check it out. yeah, i noticed VMware and virtualBox both don't utilize the on board GPU so looking to try others that can get around this.
definitley would host in linux, its far less resource intensive and i take it even harder for something infected in a win10 VM to breach to a linux host?
btw, got 8 cores on this machine and 16GB of ram. lets say KVM handles the GPU no problem, there a minimum resource to leave untapped, like 1 core and 1GB of RAM?
@mh so really, it'd have to be a very targeted virus, aiming at ppl with dual boot win/linux. basically, very little chance of it existing like you said, "biggest easiest target"? still a risk but very small?
@mh yup, external thumbdrive that was ghosted from another machine. my goal was to beat on a win10 machine without fear of the software i'm planning to run (pirated so zero trust). now, the external drive ssd can see the other drives on my host machine despite running off the win10 os on the external. the "data" drive (internal ssd) is fully accessible but the m.2 hosting the other win10 os is restricted. i kinda figured that presents a security hole. maybe not?
@mh holy crap, yup, seems maybe the only way to truly protect your machine is to run any files and internet connections thru a VM (tho i wouldn't be surprised if someone's found a way around that too).
only safe thing i have with this machine, it seems, is windoze can't see any of my linux partitions at all. seems like a windoze virus won't execute on linux so possible that linux/win10 machine doesn't pose a risk tho win/win does
@mh well this is an eye opener. didn't know it was easily done without these measures. so first, i think secure boot is enabled but i think i saw the option in the bios so that should be hard to engage. as for encryption, i doubt it :S both drives are the stock win 10 that comes with each machine. is it possible to add an encryption layer on them after the fact?
i'd say, at current, i'm a sitting duck with my current set up given your explanation. asus mobo so i dont' imagine too much security
onto my next test, lets say you have two different win 10 os on your machine. if one of those win 10 os gets malware/viruses. is there a possibility the attack could bridge to the other os?
i'm guessing it could be possible if accessing the same file b/w the two os otherwise i feel the only way is via the bios. is that possible and am i missing other possibilities?
@feld and if they don't do a good job, she lets go and leaves them there :P
@Djeep other Americans:
got a gig with my Sig
time for heaven from my 1911
cuttin' ur spleen with my AR-15
you'll regretta my beretta
@Jonny @conspiracy @Evil_Bender @Matty @WhiteBoyRooster @EvilSandmich @sickburnbro @jeffcliff of course. they like cylindrical objects penetrating their bodies
@Djeep ahh makes sense. well will be interesting.
thanks for reporting fren! :)
@Djeep hmm, what came out?
@conspiracy @sickburnbro @jeffcliff neat write up. i find it hard using these to wake ppl up (lots love sleeping or aren't easily sold these fear tactics).
@sickburnbro your comment is the simplest for anyone to understand. if you are in the business of selling medications to sick ppl, i'm pretty sure you are not in the business of making those ppl healthy and no longer need to buy your product. simple logic.
if that doesn't make one ponder, they either hate knowledge or are an operative
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.