0x0

joined 2 years ago
[–] 0x0@programming.dev 1 points 1 month ago

Well-spotted. Bye 😘

[–] 0x0@programming.dev 10 points 1 month ago (2 children)

It's only non-US if you choose a non-US instance...

[–] 0x0@programming.dev 1 points 1 month ago

and tied to SAP.

🤢

[–] 0x0@programming.dev 7 points 1 month ago

Mastodon, Lemmy, RSS.

[–] 0x0@programming.dev -1 points 1 month ago (1 children)

No there yet but not getting the love it deserved either.
Maybe they oughta try asking for money like Wikipedia and KDE, maybe then they could become independent from Google and focus on actually developing a quality browser instead of making every app be about profit.

[–] 0x0@programming.dev 2 points 1 month ago (1 children)

Already discussed here.
I'll remention this video.

[–] 0x0@programming.dev 3 points 1 month ago* (last edited 1 month ago) (4 children)

🇬🇧 7digital
🇫🇷 Qobus
Ain't Spotify Swedish?

[–] 0x0@programming.dev 6 points 1 month ago

Not with cameras alone, no.

4
mirrors search? (programming.dev)
submitted 1 month ago* (last edited 1 month ago) by 0x0@programming.dev to c/raspberry_pi@programming.dev
 

Is there a site to search packages for Raspberry OS, like Ubuntu's or Debian's?
The only site i can find is https://www.raspbian.org/RaspbianMirrors which is currently 502ing and may be outdated.

I'd like to search packages and get a list of mirrors.

 

The source code for nginx is hosted in the US, BSD-licensed and has the american F5.com as the primary maintainer, sponsor, and steward of NGINX.

In 2022 some of the developers forked it into Angie, the code of which is hosted in the US as well.

In 2024 one of the lead developers forked nginx into freenginx due to F5's interference, bringing it more in line with its initial grassroots origin. They have a self-hosted Mercurial repo (and a mirror in the US) and the domain seems to be controlled by the lead developer.

 

a22-65.akam.ne.

 

According to a DOJ press release, the FBI was able to delete the Chinese-used PlugX malware from “approximately 4,258 U.S.-based computers and networks.”

Details:

To retrieve information from and send commands to the hacked machines, the malware connects to a command-and-control server that is operated by the hacking group. According to the FBI, at least 45,000 IP addresses in the US had back-and-forths with the command-and-control server since September 2023.

It was that very server that allowed the FBI to finally kill this pesky bit of malicious software. First, they tapped the know-how of French intelligence agencies, which had recently discovered a technique for getting PlugX to self-destruct. Then, the FBI gained access to the hackers’ command-and-control server and used it to request all the IP addresses of machines that were actively infected by PlugX. Then it sent a command via the server that causes PlugX to delete itself from its victims’ computers.


The title is a bit blick-batey as it implies the FBI did it directly to said computers.

 

My Win10 work laptop has a network share of a remote windows server. I access it everyday. If i change passwords, i have to remap the share.

I have a linux vm that does the builds for my project. It too has a mounted directory mapped to that remote windows share, using my credentials.

I tried mapping the share in another linux vm but got errors so ended up quitting as it wasn't that important.

However, now i can't access said share in any device, by name or IP address. WTF happened?

The mount command i use in linux is mount -t cifs -o rw,relatime,vers=default,cache=strict,username=my.username,domain=,uid=118,noforceuid,gid=130,noforcegid,addr=10.10.10.10,file_mode=0755,dir_mode=0755,soft,nounix,serverino,mapposix,rsize=1048576,wsize=1048576,echo_interval=60,actimeo=1 //10.10.10.10/dir1/dir2 /media/remoteshare, the UID/GID are of the user that runs the builds.

I'd get having errors on mounting the remote share, but i'd expect that to be limited to the local computer i was trying to mount on, not that it would propagate to any device that has this share mapped!

 

...surprising no one...

 

The second step, which we still need to evaluate because some companies want it, and others are more hesitant, is to allow Anatel to have access to the core routers to place a direct order on the router

view more: next ›