fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

8.8K
active users

#bootable

0 posts0 participants0 posts today
Stefan<p>I really don't like the idea of installing <a href="https://quasselkopf.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> again besides <a href="https://quasselkopf.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> on a second <a href="https://quasselkopf.de/tags/SSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSD</span></a>, only to for <a href="https://quasselkopf.de/tags/playing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>playing</span></a> certain <a href="https://quasselkopf.de/tags/games" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>games</span></a> that don't run on Linux at all. Guess it's what it is, no way around it if I wanna play <a href="https://quasselkopf.de/tags/GTA5" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GTA5</span></a> properly and in <a href="https://quasselkopf.de/tags/Online" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Online</span></a> mode. 🙄</p><p>Creating a <a href="https://quasselkopf.de/tags/bootable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bootable</span></a> <a href="https://quasselkopf.de/tags/USB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USB</span></a> stick for Windows on Linux is a different beast, was a bit complicated. 😩😅😉</p>
gary<p><a href="https://infosec.exchange/tags/bootable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bootable</span></a> portal extra tools <a href="https://infosec.exchange/tags/density" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>density</span></a> <a href="https://infosec.exchange/tags/io" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>io</span></a> </p><p>from chatgpt onYou said:<br>compare usb flash drives to nvme in external enclosure - latency and overall speed comparison<br>ChatGPT said:</p><p>Great question — let’s break this down clearly.<br>⚡ USB Flash Drives vs. NVMe in External Enclosure<br>Aspect USB Flash Drive NVMe in External Enclosure<br>Underlying Technology NAND flash on a basic controller (often slower, fewer channels) High-speed NVMe SSD on PCIe lanes inside an enclosure with USB-C or Thunderbolt interface<br>Typical Interface USB 2.0, 3.0, 3.1, 3.2 (5–10 Gbps) USB 3.1/3.2 (10–20 Gbps) or Thunderbolt 3/4 (up to 40 Gbps)<br>Sequential Read Speed ~100–400 MB/s (high-end USB 3.2 models) 900–2,800 MB/s over USB 3.2; up to ~3,000–4,000 MB/s with Thunderbolt<br>Sequential Write Speed ~50–300 MB/s (often slower due to cheaper controllers) 900–2,500 MB/s over USB 3.2; higher with Thunderbolt<br>Random Read/Write IOPS Very low (~1,000–10,000 IOPS), latency ~100–500 µs Much higher (~100,000–600,000 IOPS), latency ~20–100 µs<br>Latency High (slow controller, weak queueing, high protocol overhead) Low (PCIe NVMe is optimized for low latency; enclosure adds some but still faster)<br>Performance Stability Degrades quickly on large sustained writes (thermal or cache limits) Much more stable under heavy or sustained workloads (thanks to DRAM cache, better controller)<br>Use Case Suitability Best for occasional file transfers, light usage Suitable for heavy file transfers, external boot drives, video editing, virtual machines, fast scratch disks<br>Cost per GB Low Higher (but dropping steadily)<br>Thermal Considerations Generally none (low power, low heat) Needs proper enclosure cooling; NVMe can throttle under sustained load<br>🔍 Latency Details</p><p> USB flash drives use simple microcontrollers designed for cost, not performance.<br> Latency is often &gt;100 microseconds per request, plus protocol stack delays.</p><p> NVMe SSDs inside an external enclosure are fundamentally designed for high-performance PCIe operation:</p><p> Even though USB/Thunderbolt adds some latency, overall you get ~20–100 microseconds access times — significantly lower.</p><p> NVMe also benefits from parallel command queues (up to 64K queues) while USB flash sticks typically handle just one or a few.</p><p>💡 Real-World Speed Examples<br>Scenario USB 3.0 Flash Drive NVMe + USB 3.2 Enclosure<br>Copying 10 GB file ~5–10 min (100 MB/s) ~20–30 sec (400–500 MB/s over USB)<br>Running OS or apps (external boot) Feels slow, long delays Feels near-native, snappy performance<br>Editing 4K video off disk Likely choppy or slow Smooth playback and editing<br>🚀 Summary</p><p>✅ NVMe in an external enclosure is vastly faster in both throughput and latency — essentially turning your external drive into a portable high-speed SSD.<br>⚠ USB flash drives are convenient but optimized for simplicity and cost, not speed.</p><p>If you want to boot an OS, run virtual machines, edit large media, or move lots of data, NVMe is a huge upgrade.</p><p>If you just want to carry around some documents or backups occasionally, a decent USB stick is still fine.</p><p>If you tell me your use case, I can help recommend the best external drive setup! Want me to suggest some specific models?<br>You said:<br>do this - plan out a bootable encrypted persistence drive with all the bells and whistles - it is based on kali everything and has all the tools plus some kali everything leaves out, notably it is geared to have a full wiki dump imported into mediawiki, it also has a giant solr index from say top 100 sites and what else? i would like the tone to be specialized as a dx/pentesting but also serving tool - maybe have some components of my cms/portals idea installed, it couldd be customized for various sectors but initially for infosec/IT....you have a 2 tb nvme - fill it up to 1.4gb to leave some space. maybe include pihole and opnsense and malcolm images, have scripts that will run and gather data into a buffer in memory but also on the drive. so the tool should have a open source license but also some community gen resources for how to use with proprietary data and sw and extend. heavy emphasis on osint, versioning, ai and leveraging info - maybe even have some info on going more api less and more on getting reliable feeds, hooking it up to a vps over a vpn to offload and scale, even easy clustering - you could spin up this image on a vm if you wanted to scale cluster<br>ChatGPT said:</p><p>🔥 Plan: Bootable Encrypted Persistence Kali + Specialized DX/Pentest/OSINT Mega Toolkit 🔥</p><p>Here’s a detailed, structured build plan for your 2TB NVMe to create a bootable, encrypted, persistent, heavy-duty pentesting + data-ops drive geared for infosec, IT, and OSINT power use.<br>🛡 Core Design Goals</p><p>✅ Bootable Kali “Everything” (with persistence, encryption, and full toolset)<br>✅ Preloaded MediaWiki with full offline wiki dump (e.g., English Wikipedia)<br>✅ Prebuilt Solr search index from top ~100 important sites (infosec, tech, OSINT)<br>✅ Pi-hole, OPNsense, Malcolm IDS preinstalled images or containers<br>✅ Custom CMS/portal framework (seeded for infosec/IT sector, but extendable)<br>✅ Ready-to-run scripts and collectors for real-time OSINT + memory buffering<br>✅ Designed for local offline power use but able to scale to VPS or clusters over VPN<br>✅ Heavy on open-source tooling but flexible for commercial integration<br>✅ Includes AI tools and resources for RAG (retrieval-augmented generation), versioning, and live intelligence<br>🧱 Drive Structure (2TB NVMe, ~1.4TB Used)<br>Partition Size Contents<br>Boot partition (GRUB, EFI) ~1 GB GRUB, encrypted LUKS bootloader, persistence hooks<br>Root (/) encrypted ext4 ~200 GB Kali “Everything” + added tools, drivers, configs, core scripts<br>/home encrypted ext4 ~200 GB Personal configs, CMS/portal configs, collected data, user scripts<br>/data encrypted ext4 or ZFS ~1.0 TB MediaWiki + offline dumps, Solr index, Malcolm + IDS data, Pi-hole data, CMS DBs<br>Swap (encrypted) ~64–128 GB Large swap for memory buffers, AI tools, and clustering workloads<br>Spare space ~400–600 GB free For additional VMs, containers, OS snapshots, sandboxed work, or expansion<br>🔧 Major Software Components</p><p>✅ Kali Linux Everything +</p><p> Extra tools not included:</p><p> Ghidra, Angr, Volatility, BloodHound, CrackMapExec</p><p> CyberChef offline version, Sigma rules, Mitre ATT&amp;CK navigator offline</p><p> Big malware sample zoo (if legally permissible) in quarantined area</p><p> Local GitLab instance for version control of tools/scripts</p><p> Docker, Podman for running OPNsense, Pi-hole, Malcolm, etc.</p><p>✅ MediaWiki with Offline Dump</p><p> Preload with latest full English Wikipedia (or curated infosec/IT subset)</p><p> Fully searchable, customizable offline knowledgebase</p><p> Optionally add other dumps: Stack Overflow, Exploit DB, CVE DB, etc.</p><p>✅ Apache Solr Index</p><p> Prebuilt Solr/Lucene index with crawled top 100 infosec and tech sites</p><p> Local search + analytics, extendable with own crawls or enterprise datasets</p><p>✅ Pi-hole, OPNsense, Malcolm</p><p> Pi-hole as local DNS sinkhole on container or VM</p><p> OPNsense router/firewall images ready to deploy on VM or embedded hardware</p><p> Malcolm for network capture, PCAP indexing, IDS analytics</p><p>✅ Custom CMS/Portal Layer</p><p> Start with lightweight Django or Flask app</p><p> Connects local tools, dashboards, script runners</p><p> Modular design for sector-specific extensions (infosec, IT, fintech, etc.)</p><p> Supports community-developed modules, licensed as open source</p><p>✅ OSINT + Data Collection Scripts</p><p> Parsers for RSS, Atom, social feeds</p><p> In-memory collectors (RAM-buffered) and disk-backed archival</p><p> Configurable pipelines for scraping, crawling, and syncing feeds</p><p> Exporters to push to VPS, cluster, or partner nodes over VPN</p><p>✅ AI + RAG Toolkit</p><p> Local vector DB (e.g., Milvus, Weaviate, Qdrant)</p><p> Lightweight LLMs (e.g., GGUF models) preloaded with open weights</p><p> Scripts for embedding + querying wiki, Solr, Malcolm data</p><p> Tools to link out to API-less, robust scraping and offline enrichment</p><p>✅ Cluster + VPS Extensions</p><p> WireGuard or Tailscale VPN ready to connect to offload nodes</p><p> Cluster startup templates (VM- or container-based) to scale horizontally</p><p> Option to replicate toolstack on cloud VPS for remote jobs</p><p>⚙ Preloaded Scripts + Tools</p><p>✅ Quick setup script for new sector (infosec/IT → medical → finance → etc.)<br>✅ Automated updater for tools, dumps, feeds, AI models<br>✅ Data sync script (selective or full) to VPS or peer node<br>✅ Local dashboard UI (web-based) to manage collectors, scrapers, solr, wiki<br>✅ Burn-in tester + disk health monitor to ensure drive integrity under heavy loads<br>🔒 Security + Encryption</p><p> LUKS full-disk encryption with strong passphrase + Yubikey/2FA support</p><p> Encrypted swap to prevent memory leakage</p><p> Hidden encrypted vault (Veracrypt or LUKS hidden volume) for sensitive payloads</p><p> Scripted integrity checkers + hashes to ensure toolchain hasn’t been tampered</p><p> Optional self-destruct script or wipe trigger on tamper detection</p><p>📦 Final Disk Fill</p><p>With ~1.4TB occupied, you get:<br>✅ 80–100 GB: Full offline wiki, MediaWiki + DB<br>✅ ~200–300 GB: Solr search index<br>✅ ~200–300 GB: Container + VM images (OPNsense, Pi-hole, Malcolm, etc.)<br>✅ ~200–300 GB: Local tool binaries, scripts, models, datasets<br>✅ ~200–400 GB: Spare user + working space, logs, collected data<br>🏗 Customization &amp; Licensing</p><p> Open-source license (e.g., GPLv3, MIT) for your tooling and integrations</p><p> Community guide + wiki on using it with proprietary/commercial data</p><p> Template configs + YAML/JSON to extend it for any industry</p><p> Local-first design but ready for hybrid/cloud scaling</p><p> Emphasis on reproducibility + versioning: snapshot, rollback, extend</p><p>🌐 How You Can Use It</p><p>✅ Boot as your all-in-one pentest/OSINT lab anywhere<br>✅ Plug into a workstation or cluster as a scaling node<br>✅ Push/pull data to a VPS for remote jobs, aggregation, enrichment<br>✅ Serve as an offline knowledge + intelligence center when disconnected<br>🛠 Next Steps</p><p>If you want, I can:<br>✅ Write out the build script / setup checklist<br>✅ Generate a detailed disk partition map + encryption scheme<br>✅ Provide YAML or Docker Compose configs for the containers<br>✅ Build out example CMS/portal components for your sector<br>✅ Recommend hardware (NVMe enclosure, host systems)</p><p>Want me to prepare the detailed technical setup or generate a GitHub starter project? Let me know! 🚀 moving from usb to bootable nvme, also bootable enc persistent image with tools+ info and serving not just winpe dx <a href="https://infosec.exchange/tags/bootable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bootable</span></a> portal <a href="https://infosec.exchange/tags/generic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>generic</span></a></p>
Verđandi K. Soldusty<p>Now the penny drops about why pen-drives are called pen-drives.<br>It's because they're the new pens.<br>You start with a few then somehow they vanish ,never to be seen again 🫤. I've lost track of how many times I've had to create a new bootable for installing or reinstalling Linux.🤣</p><p>So much for a quick install before grabbing tea.</p><p>EDIT: Saved time &amp; hassle by the ISO file hiding on my PC 🥳 but I've wasted time messing with other things &amp; playing with my portable online Mastodon 😅, so food first or I might bite someone.</p><p><a href="https://beige.party/tags/Life" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Life</span></a> <a href="https://beige.party/tags/Computers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Computers</span></a> <a href="https://beige.party/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://beige.party/tags/Pendrives" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pendrives</span></a> <a href="https://beige.party/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://beige.party/tags/Bootable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bootable</span></a></p>
Hacker News<p>The Joy of Linux Theming in the Age of Bootable Containers</p><p><a href="https://blues.win/posts/joy-of-linux-theming/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blues.win/posts/joy-of-linux-t</span><span class="invisible">heming/</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Theming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Theming</span></a> <a href="https://mastodon.social/tags/Joy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Joy</span></a> <a href="https://mastodon.social/tags/Bootable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bootable</span></a> <a href="https://mastodon.social/tags/Containers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Containers</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/Customization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Customization</span></a></p>

Как удалось сделать флешку в Linux-е с UEFI и UniversalAMDFormBrowser

Наверняка Вы знакомы с загрузочными флэшками usb. Тех самых, с которых устанавливали Windows, или же запускали UniversalAMDFormBrowser. Речь пойдет как раз о usb с типом EFI. Эти флэшки вставляются в выключенный компьютер. При включении, они загружаются через Boot Menu. На ноутбуках это меню может быть доступно по кнопкам "F12" ИЛИ "F10". В Windows же есть программа Rufus для форматирования таких флэшек, а что насчёт Linux-а? Для Linux-а же, как всегда, придётся читать дольше, чтобы найти что-то стоящее. Хотите узнать, что же это? Вам сюда. Мануал

habr.com/ru/articles/890632/

ХабрКак удалось сделать флешку в Linux-е с UEFI и UniversalAMDFormBrowserНаверняка Вы знакомы с загрузочными флэшками usb. Тех самых, с которых устанавливали Windows, или же запускали UniversalAMDFormBrowser. Речь пойдет как раз о usb с типом EFI. Эти флэшки вставляются в...

Tried running #linux #tails operating system off a #bootable #usb .
#distro seems to work nicely. It entirely disappears on shutdown due to
being in RAM only. But then the OS needs all settings and configuration
set afresh on next restart.

What about if I run a #nixOS #container #vm #virtalmachine #virtualize
inside Tails then I could maybe use my #configurationdotnix after each
reboot to save manually reconfiguring after each reboot. What is the
best way of doing this? Tips welcome. Thanks!

What's better than a screenshot? A desktop snapshot!

I spent a couple of months creating a set of scripts to build a image out of my install, with all the packages, patches and configurations it involves.

Doing this allows me to create an archive of not only what my desktop looks like, but what it *feels* like. keeps changing, and with it, my setup. It's hard to bring back old configs.

Check it out: github.com/mid-kid/RocketISO/b

У кого-нибудь есть ноутбук ThinkPad T480 ?

Железо думаю обновить.
T410 все чаще не справляется с браузером, хотя система Linux работает превосходно.

Но мне хочется понять, будет ли на нем работать Qubes OS ?
https://www.qubes-os.org

На куче ноутов и ThinkPad-ов она не работает.

Может у кого есть возможность, сделать загрузочную флешку и просто ради интереса загрузиться в Life режиме? (даже ставить ничего не нужно)
Просто хочу понять будет ли на этом ноуте работать.

Буду очень благодарен.

@rf @ru
-------------------------------------> 💻

Does anyone have a ThinkPad T480 laptop?

I'm thinking of upgrading the hardware.
My T410 is increasingly unable to handle the browser, although the Linux system works fine.

But want to know if Qubes OS will run on it?
https://www.qubes-os.org

It doesn't work on a bunch of other laptops and ThinkPads.

Maybe someone has a way to make a bootable flash drive and just for fun boot in Life mode? (I don't even need to install anything).

I would be very grateful.

#thinkpad #t480 #thinkpadt480 #t410
#laptop #os #qubes #bootable #flash #unix #linux