Hacker Newsnew | past | comments | ask | show | jobs | submit | jaderobbins1's commentslogin

Any specifics on which windows install ISOs don't work? That way I'll know which ones will need a dedicated USB stick.


Last week I tried to make a bootable usb with windows 11. I tried using dd on macos, and that seemed to work, but the windows installer errored about "not finding drivers for the hdd". This threw me off because I thought something was wrong with the nvme.

Turns out you can't just dd a windows iso onto a usb drive.

You have to format it to fat32, then manually copy all the files. However there is one big installer file which is above 4gb, so you have to get some tool (also provided by Microsoft) to split the file into multiple files less than 4gb. The windows installer will recognize the split files and use those instead.

It's beyond me why the official windows iso just doesn't have this by default...


Don't know why you're being voted down, this was exactly my experience, and from all reports, correct.

But instead of the process you describe (which some tools will do for you) I used Rufus to copy the install files onto a USB formatted as a NTFS partition, working around the 4GB limitation.


Downvote-a-bots are not capable of actual thinking.

What you sometimes need is a USB stick having a native "geometry" in terms of HDD emulation ability, that will be recognized properly by the particular series of chipset on the target mainboard.

Then the data bits written to a fully-zeroed drive must conform to what is expected of a bootable device on the target mainboard, for one thing the partition(s) often needs to be well-aligned with the underlying storage hardware to a more particular degree than merely when it is a "perfectly" readable & writeable drive.

Many new USB sticks fail at this fundamental point because the factory partitioning & formatting was accomplished using an image not exactly appropriate after the vendors of the silicon storage or controller chips make hardware revisions.

Analogously, also why writing an IMG or dd from a not-very-identical stick, or with dissimilar partitioning and/or formatting is quite hit or miss.

Sometimes freshly reformatting is enough for problem sticks, other times they can not be made to boot without repartitioning. Either way a fresh reformat or repartition may simply overwrite using (proven nonoptimal) disk structures still remaining in place unless the device is zeroed beforehand. Sometimes a reboot is needed for an OS to forget the structure that was recognized during most recent insertion.

I like Ventoy (and Rufus) but for best results I start with a proven bootable stick which I prepare manually from a zeroed stick and verify bootability beforehand. Similar preparation when getting ready to manually write reliable plain Windows Setup USBs from the mounted ISO.


You can often format as NTFS and have it work anyway, but it depends on whether or not the system UEFI firmware includes an NTFS driver.

Rufus puts such a driver in its FAT32 boot partition and loads it before starting the winpe.

It drives me nuts that the UEFI sites never included ExFAT.


Yeah, girdling: https://en.wikipedia.org/wiki/Girdling

I hadn't heard it used to get dry wood for harvesting but I recall it being useful because it actually kills the tree, so if you cut the tree down (after it's fully dead) the stump will decompose instead of trying to continue to grow.


I love Demeo, and I'm glad to get more Demeo content (that isn't a PVP arena). I was really hoping for a more in-depth RPG experience and this sounds like Demeo++, not _really_ Dungeons and Dragons in VR.

We'll see, though! I'm happy either way!


Can some folks in the cybersecurity arena recommend some good email newsletters, websites, blogs, accounts, etc to follow to keep up in the space?


Any specific areas of interest?

Some mailing lists at [1], like oss-security & kernel-hardening. CISA (Cybersecurity and Infrastructure Security Agency) [2] has a few different areas they report on. Mozilla has the dev-security-policy mailing list for all things PKI (public key infrastructure) [3], and a few other lists as well. There's the Full Disclosure [4] mailing list for vulnerabilities/exploits, etc. Quite a few others at [5], though sadly many are no longer active.

[1] https://openwall.com/lists/

[2] https://www.cisa.gov/about/contact-us/subscribe-updates-cisa

[3] https://groups.google.com/a/mozilla.org/g/dev-security-polic...

[4] https://seclists.org/fulldisclosure/

[5] https://seclists.org/


I have slowly been aggregating various blogs in the cybersec realm at https://securityblogs.xyz/

I add new blogs as I run into them on twitter/reddit/HN/etc


Do you have an OPML feed for that?


I do not, but I can add that later today.


That's would be great :)


Done. Give it a try!


It works! Thank you :)


I'm not in cyber but "Risky Business" ( https://risky.biz/ ) is a good podcast to keep up to date.

They always have a lot of outgoing links in their show-notes that should get you started with the rest.





You have different areas of security. Sadly our space is full of grifters and wanna be security "experts". For a very technical security podcast I recommend Critical Thinking Bug Bounty [1].

[1] https://www.criticalthinkingpodcast.io/


Well, that was some time I'll never get back. What a fun little game.


By no means an expert, but these are my thoughts:

1) probably not directly. Eventually the advertisers might notice a decrease in effectiveness lower their investment in that area (either by lowering the amount they are willing to give the creator for a sponsored segment or not doing sponsored content entirely). Eventually if they think the ROI isn't there they will reduce their spend.

2) You have to feed the algorithm beast to be successful. Even channels with high subscriptions still get a tremendous amount of views from YouTube's recommended algorithm. One big part of that algorithm is "Engagement" which includes the number of subscribers, likes, and any other engagement on the video (such as comments, which is why you'll see a lot of comment-bait questions in videos now like (if you disagree let me know in the comments).


thx


There is a free service call Have I Been Pwned which uses your email address to see what data breaches you are part of (https://haveibeenpwned.com/).

While it uses your email to check (not SSN) odds are if they have your SSN in the dataset they also have your email.


The OP post says that emails in this breach are paired with random names and SSNs, so it's not a good indicator.


Oh sorry, I missed that!


Even then I've heard of some channels uploading ad-free versions of their videos for certain membership tiers.


I really liked the "visor" style of camera bump since the Pixel 6. I like symmetry so the square corner bumps always bothered me, plus it didn't give it a corner wobble when sitting on a table. I wish they would have gone full width on the new Fold :/


At least the non-folding Pixel 9's have the symmetry in tact for the outline of the bump, but agreed, I do like the full-width visor on my 6 better.


There are multiple products called "Defender", I believe "Microsoft Defender for Endpoint" (which is an enterprise product, not the consumer Defender AV) would be considered the same.

I _think_ at least, the enterprise software space is confusing as hell :)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: