Quantcast
Channel: Debian User Forums
Viewing all articles
Browse latest Browse all 4056

Beginners Questions • Re: Prevent HTOP commands from autostarting

$
0
0
Hi RedGreen,

I've looked into the processes and believe at least some are noncritical. gnome-shell-calendar-server (I don't use GNOME calendar), all the evolution tasks (I don't use evolution), gsd-smartcard (smart/piv/cac cards which I don't use), gsd-sharing (file sharing which I don't use), goa-identity-service (I don't want to use GNOME Online Accounts), gnome-keyring-daemon/ssh-agent/gcr-ssh-agent (credential storage/caching which I don't want), colord (I don't care about theming and color management), gnome-keyring-daemon (I don't want to use gnome-online-accounts), switcheroo-control (I'm running in VirtualBox which I don't think allows for GPU passthrough but if it did I only have one GPU so the process would have nothing to switch), xdg-document-portal (I don't use snap/flatpak/docker), gvfs-gphoto2-volume-monitor (I don't use gphoto so I don't need it to track when I've attached a camera - actually I never attach a camera), power-profiles-daemon (VM so the host OS handles this), low-memory-monitor (VM configured with enough RAM for my tasks and Debian servers seem to run forever without it), gsd-disk-utility-notify (VM and not interested in more notifications), cron -f (GNOME cron config files seem to depend upon other config files and I want to understand what they are doing before allowing cron to run - cron -f is a task I have in a Debian 6.7.12 VM - 6.7.12 VM also runs (sd-pam)), fusermount3 (I will be using AppImages which uses fuse but I'd prefer just installing fuse versus depending upon this), (sd-pam) (Pluggable Authentication Modules - I have no need for LDAP and such).
Way too much paranoia from the snipped paragraph with the X server FUD spread by the wayland/gnome trolls to justify their attempt too takeover the linux ecosystem. From that description then you do not want a Desktop based on either the Gnome or KDE but a minimal one. Or nothing at all doing it all on the command will come as close as you can get to your perfect security idea. Every layer added on top of that is one more possible compromise surface to try to exploit. To be quite frank once they are on your machine your problems are only started and nothing you have done will protect your information.

Statistics: Posted by RedGreen925 — 2024-06-19 01:58



Viewing all articles
Browse latest Browse all 4056

Trending Articles