F5F Stay Refreshed Software Operating Systems Issues with grub menu

Issues with grub menu

Issues with grub menu

Pages (2): Previous 1 2
D
Dat_boi_cheif
Member
56
08-17-2016, 11:58 AM
#11
It's not even a case of "setting up", if it doesn't exist there is no user to run the init, kernel, etc. It might be possible on an embedded system to have the appearance of "no user", but it is still there (without some serious kernel hacking). If anyone uninitiated takes a look at /etc/passwd I think they'll be surprised by the number of system users that exist to create user and group "file security domains".
D
Dat_boi_cheif
08-17-2016, 11:58 AM #11

It's not even a case of "setting up", if it doesn't exist there is no user to run the init, kernel, etc. It might be possible on an embedded system to have the appearance of "no user", but it is still there (without some serious kernel hacking). If anyone uninitiated takes a look at /etc/passwd I think they'll be surprised by the number of system users that exist to create user and group "file security domains".

B
boarocket
Junior Member
8
08-18-2016, 04:32 PM
#12
Guest is typically treated as a visitor rather than a permanent user. Many modern smart TVs, including Bravia models, operate using Android, which means they can be updated and managed through software rather than direct kernel modifications. This approach makes it feasible and common for such devices to function without permanent hacking.
B
boarocket
08-18-2016, 04:32 PM #12

Guest is typically treated as a visitor rather than a permanent user. Many modern smart TVs, including Bravia models, operate using Android, which means they can be updated and managed through software rather than direct kernel modifications. This approach makes it feasible and common for such devices to function without permanent hacking.

E
EckigesEi
Member
136
08-18-2016, 11:35 PM
#13
Android serves as a solid illustration, even though the typical end-user doesn't engage with conventional user profiles as on a Unix-based system. They remain active behind the scenes.
E
EckigesEi
08-18-2016, 11:35 PM #13

Android serves as a solid illustration, even though the typical end-user doesn't engage with conventional user profiles as on a Unix-based system. They remain active behind the scenes.

R
Raidex20
Posting Freak
751
08-19-2016, 07:05 AM
#14
In short, you can use a service without logging in, and your online actions are recorded by platforms like Google.
R
Raidex20
08-19-2016, 07:05 AM #14

In short, you can use a service without logging in, and your online actions are recorded by platforms like Google.

X
xXRAXERXx
Posting Freak
817
08-19-2016, 08:07 AM
#15
You can switch to developer settings to view RAM usage and services. You'll see apps and system utilities you rarely encounter, most of the time. This approach varies across brands—some offer extra security features. If you understand your own system, you might be able to isolate it or modify settings locally. However, this is only practical on a limited scale. Unless you're in a critical role or your hardware is at risk, it's generally not a major concern. Disk encryption could help prevent data loss if your device is stolen. The issue often arises during the OS installation process.
X
xXRAXERXx
08-19-2016, 08:07 AM #15

You can switch to developer settings to view RAM usage and services. You'll see apps and system utilities you rarely encounter, most of the time. This approach varies across brands—some offer extra security features. If you understand your own system, you might be able to isolate it or modify settings locally. However, this is only practical on a limited scale. Unless you're in a critical role or your hardware is at risk, it's generally not a major concern. Disk encryption could help prevent data loss if your device is stolen. The issue often arises during the OS installation process.

Pages (2): Previous 1 2