

How do you trust that the flash was done properly if you did it from the compromised system? This would only work if you flashed it externally somehow without the system running.
How do you trust that the flash was done properly if you did it from the compromised system? This would only work if you flashed it externally somehow without the system running.
Hah! I wish it was email, so I could ignore it. Instead it’s either a Slack DM, which escalates to a phone call.
*per open file
vim (and especially neovim) have WAY more features than vi and different shortcuts. Running vim with the “vi” symlink emulates vi and disabled a lot.
I’m pretty sure that’s why he said that
There’s a few different ways to write that command in vim, does it accept all of them?
I work with python professionally and would never do that. I add my actual imports to the requirements and if I forget I do it later as the package fails CI/CD tests.
Exactly. That’s why it’s a trash motherboard as soon as root access is gained. It can never again be trusted.