Not finding raspberry.local on my computers

So, just bought a Raspberry Pi Zero W, and downloaded the Sticky-Fingers Kali-Linux image, and flashed it to an micro-sd card. I don’t want to spend 20 dollars on a micro-HDMI adapter + USB keyboard, so I found a way to set it up headless from the official site (https://www.raspberrypi.org/documentation/configuration/wireless/headless.md). I added the necessary files, triple checked they’re all right, and booted up my Pi. I tried using both nmap and fing to find devices on my network, but my device isn’t showing up. So, I decided to try mDNS. But when I try sshing into it with my WSL2 Ubuntu, it fails. So, I installed avahi-daemon, made sure it works, but ssh still fails. "No such host is known". I decide to just use powershell, still fails. I already had Bonjour but installed it again, and used putty to try connecting to it, still fails. Tried using a Mac, times out trying to connect to port 22. I checked the Sticky-Fingers image documentation, makes no mention of a different hostname. I tried connecting over a USB connection (configuring the pi as a ethernet/gadget), still fails. I have no idea why it’s not connecting, and I’ve tried everything I can find short of buying adapters. I really don’t want to spend money (even if it’s relatively cheap) if I can do it headless. If anyone can help, I really appreciate it.

windows – Remote Desktop won’t connect between two computers on same VPN, same LAN, when VPN active

If both computers are not connected to the VPN, each can access the other via Remote Desktop over the LAN.

If just one is connected to the VPN, they can’t connect — but I expect that.

If BOTH are connected to the same VPN, however, I’d expect RDP to work over the VPN between the two systems, yet it doesn’t.

One possible difference is that one computer is my work laptop, joined to the company domain, and the other is my personal system, which is not on that domain. Could that be important?

These computers can’t ping each other when connected to the VPN either, nor does file sharing function between the two. It’s almost as if the VPN functions as a one-way valve, allowing each system to see other resources on the VPN, but without themselves being exposed as available on the VPN.

Sodas and Computers | Forum Promotion

authentication – How to authenicate personal computers and phones?

I feel like this information should be readily available but looks like it’s not:

When I buy a new laptop or phone. It seems like there’s a whole set of initial connections that might require my (client) authentication. For example, if I bought a Mac, Apple might want to authenticate that the Mac I’m registering is a not a hackintosh (not sure if Apple actually does this), or two way TLS in some cases.

Does such thing not exist? If it does, then my new laptop/phone must come shipped with a valid cert?

parallelization – Can Predict/Classify/NetTrain be parallelized over multiple computers (kernels)?

A similar question was posted more than five years ago here and I was wondering if anything has changed and whether there is a way to parallelize Classify/Predict/NetTrain now. More specifically, given that I have multiple computers running the Wolfram Kernel (i.e., multiple remote kernels), is it possible to distribute the training load across them?

logging – Do external harddrives keep track of the computers they’re plugged in to?

I know that it’s possible for a computer to set up logging or auditing, and keep track of what devices are plugged into IT. But do external harddrives keep track of what computers THEY are ever plugged in to? Intentionally, or unintentionally? (Assume they have just been taken out of the box from Best Buy — specops IT hasn’t loaded anything on.)

I’m trying to analyze a Samsung T5 right now but I want to know in general.

If the answer is Yes, or Maybe, should wiping the hard drive get rid of this information, or is it stored DEEP in the drive, somehow? I’m always suspicious of how much “wiping” does, even with a multi-pass algorithm.

Mersenne primes before computers – Mathematics Stack Exchange

On the Wikipedia page there is an ordered list of Mersenne primes and the dates they were discovered. The largest such primes and most recent discoveries were made with the help computers. But the largest Mersenne prime discovered without computer aid is $2^{127}-1$ by $acute{text{E}}text{douard Lucas}$ in 1876, which has more than $38$ digits.

How can one prove that such a large number is prime without the help of a computer?

mappeddrive – Can’t connect to server until reboot computers

I have a domain with around 90 PC with the domain controller running by Windows Server 2012 R2 and the PCs Windows 7. Every PC has a mapped drive from the server and a database interface that’s linked to the database in the server. Everything was working perfectly until a couple days ago when one PC couldn’t reach the server (mapped drive is disconnected and database access couldn’t be reached)

I checked the PCs connection to the network and it was able to reach other PCs and surf the internet with no problems. So I restarted the PC and that problem was fixed. The day after, almost every PC in the domain had the same problem. And restarting the PC always fixes the problem (Some PCs will reconnect to server after 2 to 3 attempts of restarts)

I tried restarting the server but that just made all PCs that were reconnected by restarting to lose connection again..

If you know anything about this problem please advice..

Weird shapes are showing on my Google Docs Spreadsheets, on multiple computers

Text

Since a few weeks, all kinds of weird shapes are randomly showing on my google docs.

Details:

  • not on all docs;
  • not on specific times;
  • not always;
  • not only on one computer.

Anyone has an idea? I have tried GPU settings, but quit thinking that’s the issue when it started on different pc’s.

Are there any risks involved with plugging smartphones into Windows 7-10 computer’s USB ports?

For automatic driver installation specifically:

Windows installs drivers automatically if they are in-box (that is, included with the OS), or if they are on Windows Update and you have the optional (but I think enabled-by-default) feature to search Windows Update for needed drivers. In both cases, these drivers will be “blessed” by Microsoft with a WHQL (Windows Hardware Qualification Labs) signature – this is necessary to install a driver in 64-bit Windows at all, unless you mess with the boot parameters – meaning that they have been tested for some level of correctness and also come from a known, verified vendor.

Note that WHQL signatures, and even in-box or WU distribution, do not guarantee that the driver has no security vulnerabilities. Driver security is a complicated topic that lots of hardware vendors make mistakes on – there was a high-profile case recently where NVIDIA’s graphics driver was found to have some serious vulnerabilities and they pushed an urgent patch – and of course drivers have such a privileged position that vulnerabilities in them can compromise the entire system. On the other hand, if a driver isn’t loaded, it doesn’t matter how vulnerable it is, and loading a driver requires Admin privileges so low-privilege malware can’t just load a known-vulnerable driver to gain an EoP vector.

WHQL also doesn’t guarantee the stability of the driver, beyond for basic steps like loading and unloading. Driver instability has long been a leading cause of kernel panics (Blue Screens of Death), though it’s unlikely for any WHQL driver to cause a BSOD just from plugging in its hardware.

Also, depending on the phone and how it’s configured, the phone itself might not need its own driver. A phone that is connected in USB Mass Storage (UMS) or Media Transfer Protocol (MTP) modes will use a generic Windows driver that supports such modes. These drivers are written by Microsoft and subjected to extensive testing (though of course there can still be bugs).

Do note that, for “active” multi-function devices like smartphones, there may be many different drivers, as the device can present itself as any kind of USB device or even as a hub (which has its own generic driver) with many different devices connected to it.


Outside of drivers specifically, smartphones could also be used for other attacks. There are many kinds of malicious USB devices out there, such as “Rubber Duckies” that type attacker-chosen keystrokes at superhuman speed, or even a “USB Killer” that uses a large power surge to destroy the USB port and possibly other components. Plugging in unknown, untrusted USB devices is risky behavior, and that includes phones!