IllNess

joined 2 years ago
[–] IllNess 5 points 8 hours ago

Now it makes sense for Google to stop sideloading on Android devices.

As others have said, it was never about stopping malware.

[–] IllNess 4 points 4 days ago

Thanks for confirming. Felt like I was doing too much work to get it to not work.

[–] IllNess 12 points 4 days ago (10 children)

I'm going to try this. For what ever reason I can't use music files for Jellyfin and I basically gave up on it.

[–] IllNess 1 points 6 days ago

It works.

Lol.

[–] IllNess 1 points 6 days ago* (last edited 6 days ago) (2 children)

Just to show it is in the dock, I turned background on.

[–] IllNess 2 points 6 days ago (3 children)

Sucks for you then.

For anyone else, it works for me so it could probably work for you. YMMV. It is in beta.

[–] IllNess 1 points 6 days ago (5 children)

It works on the dock.

[–] IllNess 2 points 1 week ago
[–] IllNess 5 points 1 week ago (2 children)

Bigger screen, font size maxed out.

[–] IllNess 6 points 1 week ago (7 children)

Lawnchair 15.Beta 1 has swipe left and swipe right.

[–] IllNess 16 points 1 week ago

6 . Each username on here should be a person, not a brand or corporation - and that person must be you, no impersonation.

"I'm not a businessman, I'm a business, man!"

-Jay-Z regretting his words

[–] IllNess 3 points 1 week ago

Thank you for the info. Sorry you got ripped off. Hopefully you can get you credit card to reverse transaction.

 

Cross posted from: https://feddit.org/post/8191819

 

Security researchers have discovered an arbitrary account takeover flaw in Subaru's Starlink service that could let attackers track, control, and hijack vehicles in the United States, Canada, and Japan using just a license plate.

Curry says Subaru patched the vulnerability within 24 hours of the researchers' report and was never exploited by an attacker.

 

A North Korean threat group has been using a technique called RID hijacking that tricks Windows into treating a low-privileged account as one with administrator permissions.

 

The CloudSEK researchers disrupted the botnet by utilizing hard-coded API tokens and a built-in kill switch to uninstall the malware from infected devices.

 

"Mac Homebrew Project Leader here. This seems taken down now," tweeted McQuaid.

 

To safeguard against such attacks, it's advised to monitor suspicious processes, events, and network traffic spawned by the execution of any untrusted binary/scripts. It's also recommended to apply firmware updates and change the default username and password.

view more: next ›