veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

271
active users

#grub2

0 posts0 participants0 posts today
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p><a href="https://hachyderm.io/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> used its <a href="https://hachyderm.io/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a>-powered <a href="https://hachyderm.io/tags/SecurityCopilot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityCopilot</span></a> to discover 20 previously unknown vulnerabilities in the <a href="https://hachyderm.io/tags/GRUB2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GRUB2</span></a>, <a href="https://hachyderm.io/tags/UBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UBoot</span></a>, and <a href="https://hachyderm.io/tags/Barebox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Barebox</span></a> <a href="https://hachyderm.io/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://hachyderm.io/tags/bootloaders" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bootloaders</span></a>.<br>GRUB2 (GRand Unified Bootloader) is the default boot loader for most <a href="https://hachyderm.io/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> distributions, including Ubuntu, while U-Boot and Barebox are commonly used in embedded and <a href="https://hachyderm.io/tags/IoT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IoT</span></a> devices. <br><a href="https://www.bleepingcomputer.com/news/security/microsoft-uses-ai-to-find-flaws-in-grub2-u-boot-barebox-bootloaders/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/microsoft-uses-ai-to-find-flaws-in-grub2-u-boot-barebox-bootloaders/</span></a> <a href="https://hachyderm.io/tags/ITSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSec</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> uses <a href="https://mastodon.thenewoil.org/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> to find flaws in <a href="https://mastodon.thenewoil.org/tags/GRUB2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GRUB2</span></a>, <a href="https://mastodon.thenewoil.org/tags/UBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UBoot</span></a>, <a href="https://mastodon.thenewoil.org/tags/Barebox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Barebox</span></a> bootloaders</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-uses-ai-to-find-flaws-in-grub2-u-boot-barebox-bootloaders/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/microsoft-uses-ai-to-find-flaws-in-grub2-u-boot-barebox-bootloaders/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/bootloader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bootloader</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
O Iago :linux: :debian:<p>So, what to do? First, enter in the 3rd OS (Open SUSE) (before going in Windows!!!) and copy the contents being in /boot/grub/grub.cfg (to use in the 2nd OS, so use some Internet or USB or whatever). Second, in the 2nd OS (Debian-like) paste those contents in a new file /boot/grub/custom.cfg (see <a href="https://forums.debian.net/viewtopic.php?p=781500#p781500" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forums.debian.net/viewtopic.ph</span><span class="invisible">p?p=781500#p781500</span></a>, <a href="https://forums.debian.net/viewtopic.php?t=159094" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forums.debian.net/viewtopic.ph</span><span class="invisible">p?t=159094</span></a>) And 3rd, it is possible you have to replace in that file the entries /boot with entries /@/boot (<a href="https://forums.opensuse.org/t/trying-to-dualboot-opensuse-and-linux-mint-by-adding-mint-to-opensuse-grub-but-when-selecting-entry-i-get-error-you-need-to-load-kernel-first/179906" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forums.opensuse.org/t/trying-t</span><span class="invisible">o-dualboot-opensuse-and-linux-mint-by-adding-mint-to-opensuse-grub-but-when-selecting-entry-i-get-error-you-need-to-load-kernel-first/179906</span></a>). </p><p>You can check this in the grub: press c to enter in the command line tool, press ls -l to see the partitions, and for example if (hd0,gpt1) is one of them, 'ls (hd0,gpt1)'+tab will show you the possible paths, being of the form '/boot' or being first '/@' and then '/@/boot'..</p><p>Anyway, I got Open SUSE Tumbleweed installed and accessible with Debian Grub2 after all the previous afternoon+evening+night looking for a solution.</p><p>2/2</p><p><a href="https://social.vivaldi.net/tags/OpenSUSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSUSE</span></a> <a href="https://social.vivaldi.net/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> <a href="https://social.vivaldi.net/tags/DualBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DualBoot</span></a> <a href="https://social.vivaldi.net/tags/Grub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Grub</span></a> <a href="https://social.vivaldi.net/tags/Grub2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Grub2</span></a> <a href="https://social.vivaldi.net/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p>
Natasha Nox 🇺🇦🇵🇸<p>Oh no, oh fuck.<br><a href="https://chaos.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://chaos.social/tags/meme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>meme</span></a> <a href="https://chaos.social/tags/grub2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>grub2</span></a></p>
Natasha Nox 🇺🇦🇵🇸<p>Is there some simpler way to modify <a href="https://chaos.social/tags/grub2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>grub2</span></a> so it takes the disk encryption keys from a USB stick during boot? I did it once on Arch, it was a pain to get the syntax right. </p><p>Got an <a href="https://chaos.social/tags/OpenSuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSuse</span></a> <a href="https://chaos.social/tags/MicroOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicroOS</span></a> now with encrypted disk that's supposed to boot without screen attached, taking the luks2 keys from a USB stick that gets removed after boot finished.<br><a href="https://chaos.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://chaos.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a></p>