0x0

joined 2 years ago
[–] 0x0@programming.dev 23 points 20 hours ago

Surprised Pikachu face.

[–] 0x0@programming.dev 2 points 1 day ago

Even ones that were supposed to just be customer service usually had something they were supposed to push.

True, which i failed to push when i was doing it 'cos the last thing a bitching customer wants is Hey, what about buying a new product? Then i got a real job.

[–] 0x0@programming.dev 21 points 1 day ago (3 children)

Ah, the Fapening II... Merkel is already in the list.

[–] 0x0@programming.dev 2 points 1 day ago

Boost it on mastodon with the appropriate hashtags.

[–] 0x0@programming.dev 8 points 1 day ago* (last edited 1 day ago)

This seems to be old news, and paywalled.

Edit: gee, thanks MSN. The article i'd read was about the license plate.

Morgan Null, in black, with her parents and brother, all Nulls. lol

Not that rare of a name apparently...

[–] 0x0@programming.dev 30 points 2 days ago (6 children)

TL;DR it's a video by Mental Outlaw preferring I2P over a VPN for torrenting because everyone on I2P is always routing whereas on Tor only some are...

[–] 0x0@programming.dev 4 points 2 days ago

Call the coppers on them!
Oh...

[–] 0x0@programming.dev 1 points 2 days ago

VPN: Headscale is an open source, self-hosted implementation of the Tailscale control server, which itself uses WireGuard under the hood.

For the file share, i'd say separate into two groups/VMs probably.
Whatever you might want to self-host publicly (are you sure?) keep it isolated. Its own VLAN, IP/host/subnet, container, VM heck its own hardware if possible. Or use a VPS and only self-host your private stuff in your LAN.

For what you should host: that's up to you. I've heard jellyfin's used a lot for media stuff.

[–] 0x0@programming.dev 4 points 2 days ago

Uses sqlite as repo backend

And it's used by the SQLite project.

[–] 0x0@programming.dev 2 points 2 days ago (3 children)

Paid tiers only i think, but yes.

[–] 0x0@programming.dev 13 points 2 days ago* (last edited 2 days ago)

GitHub is a company owned by Microsoft (in the USA). They allow you to host git repositories there (a git forge) and they use your code to train their AI.

GitLab is another git forge, you can also host your code there. I think it was also bought off.

Forgejo is git forge software. If you want to use a git forge that relies on Forgejo, checkout CodeBerg (based in Germany). Forgejo is a fork of Gitea, which is a fork of Gogs.

<rant> All of these tend to offer not only a git forge but also other crap like tickets and CI/CD in what i personally see as feature creep. </rant>

 

a22-65.akam.ne.

 

According to a DOJ press release, the FBI was able to delete the Chinese-used PlugX malware from “approximately 4,258 U.S.-based computers and networks.”

Details:

To retrieve information from and send commands to the hacked machines, the malware connects to a command-and-control server that is operated by the hacking group. According to the FBI, at least 45,000 IP addresses in the US had back-and-forths with the command-and-control server since September 2023.

It was that very server that allowed the FBI to finally kill this pesky bit of malicious software. First, they tapped the know-how of French intelligence agencies, which had recently discovered a technique for getting PlugX to self-destruct. Then, the FBI gained access to the hackers’ command-and-control server and used it to request all the IP addresses of machines that were actively infected by PlugX. Then it sent a command via the server that causes PlugX to delete itself from its victims’ computers.


The title is a bit blick-batey as it implies the FBI did it directly to said computers.

 

As the title says.
pacman -Q lists only name and version;
pacman -Qi does have a "Packager" field, but i think it's not the same thing;
pacman -Qs seems to be what i want (if local means "all installed packages atm") but it's all prefixed by local/ instead of repo name like mingw32/ which is what i want.

I'm using MSYS2 in windows.

 

cross-posted from: https://programming.dev/post/24130558

My Win10 work laptop has a network share of a remote windows server. I access it everyday. If i change passwords, i have to remap the share.

I have a linux vm that does the builds for my project. It too has a mounted directory mapped to that remote windows share, using my credentials.

I tried mapping the share in another linux vm but got errors so ended up quitting as it wasn't that important.

However, now i can't access said share in any device, by name or IP address. WTF happened?

The mount command i use in linux is mount -t cifs -o rw,relatime,vers=default,cache=strict,username=my.username,domain=,uid=118,noforceuid,gid=130,noforcegid,addr=10.10.10.10,file_mode=0755,dir_mode=0755,soft,nounix,serverino,mapposix,rsize=1048576,wsize=1048576,echo_interval=60,actimeo=1 //10.10.10.10/dir1/dir2 /media/remoteshare, the UID/GID are of the user that runs the builds.

I'd get having errors on mounting the remote share, but i'd expect that to be limited to the local computer i was trying to mount on, not that it would propagate to any device that has this share mapped!

 

My Win10 work laptop has a network share of a remote windows server. I access it everyday. If i change passwords, i have to remap the share.

I have a linux vm that does the builds for my project. It too has a mounted directory mapped to that remote windows share, using my credentials.

I tried mapping the share in another linux vm but got errors so ended up quitting as it wasn't that important.

However, now i can't access said share in any device, by name or IP address. WTF happened?

The mount command i use in linux is mount -t cifs -o rw,relatime,vers=default,cache=strict,username=my.username,domain=,uid=118,noforceuid,gid=130,noforcegid,addr=10.10.10.10,file_mode=0755,dir_mode=0755,soft,nounix,serverino,mapposix,rsize=1048576,wsize=1048576,echo_interval=60,actimeo=1 //10.10.10.10/dir1/dir2 /media/remoteshare, the UID/GID are of the user that runs the builds.

I'd get having errors on mounting the remote share, but i'd expect that to be limited to the local computer i was trying to mount on, not that it would propagate to any device that has this share mapped!

 

...surprising no one...

 

The second step, which we still need to evaluate because some companies want it, and others are more hesitant, is to allow Anatel to have access to the core routers to place a direct order on the router

 

Yet another case of just because you can...

 

The Missing Nukes/Dirty Bomb Sweep Theory
The PSY-OP/Government Conspiracy Theory
The ET Theory
The Mass Hysteria Theory
The Copycats/Hoaxers Theory
The Iranian Mothership/Foreign Spy Theory
The Angels Theory

 

I like the clarification:

Let me also touch this subject while talking security problems. This bug, the oldest so far in curl history, was a plain logic error and would not have been avoided had we used another language than C.

Otherwise, about 40% of all security problems in curl can be blamed on us using C instead of a memory-safe language. 50% of the high/critical severity ones.

Almost all of those C mistakes were done before there even existed a viable alternative language – if that even exists now.

 

Apple has become aware of a security flaw that could let hackers take control of a user’s iPhone or iPad if they visit a harmful website.

Maybe i'm reading this wrong but it doesn't seem to be cryptocurrency-specific:

Jeremiah O’Connor, CTO and co-founder of crypto cybersecurity firm Trugard, told Decrypt that “attackers could access sensitive data like private keys or passwords” stored in their browser, enabling crypto theft if the user’s device remained unpatched.

view more: next ›