• 5 Posts
  • 871 Comments
Joined 3 years ago
cake
Cake day: July 4th, 2023

help-circle



  • If you’re writing a program, definitely multiple threads or processes that each scan a chunk of the file, which basically means seek to the start of the chunk, read lines into the scan code until you hit the end of the chunk. For jsonl each chunk will need an alignment step to not break the jsonl.

    For command line trickery, maybe the file could be chunked up by running multiple dd instances with an offset parameter piped into grep. This has many synchronization issues and all the outputs should be captured separately then combined afterwards. I can’t think of a good way to align this method to line edges but maybe you can put some fancy regular expression magic into the grep step to ignore malformed json at the beginning and end and overlap the chunks?

    Grep is fast already, maybe test the simple approach and see how long it takes.






  • If you can see how the other machines on the network access the drives, like with net use in the windows command prompt, then you will know the protocol and address and share name to connect to.

    If it’s something like \\computername\a\path\here that’s a windows file share which you can connect to with samba. On modern Linux desktop systems you can sometimes get away with opening a file browser and typing in a location like smb://computername/a/path/here and it may just work

    Keep in mind computername could be an IP address instead, and some file browsers are sneaky about letting you type in a path (nautilus/gnome, which I think is Ctrl+L) if smb://… Doesn’t work smbfs:// may be worth a try









  • I don’t know of any project to do this, but it’s an interesting idea.

    For most/all phones, you would need to break the phone’s software security to boot another OS. To boot via USB the phone’s firmware would need to support that, or a sufficient USB vulnerability could be used to take over a running system and boot into a new OS. This would almost certainly be unreliable and only work on specific devices.

    Note that if part of your goal is to extract data from the phone, only old phones store data unencrypted these days. One advantage of using a vulnerability to hijack the current os would be the availability of the keys to decrypt the phone’s storage if the storage is already unlocked.

    Although it’s not as interesting, you certainly can load firmware on an android device that will boot from USB. Not sure if this already exists or would need to be built.