![](/static/66c60d9f/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/8286e071-7449-4413-a084-1eb5242e2cf4.png)
deleted by creator
deleted by creator
ITT: Rust programmers rewriting the joke in Rust.
deleted by creator
I think the post is supposed to link here: https://timemachiner.io/2022/06/18/windows-95-launch-video-reminds-us-how-90s-the-90s-were/
For some reason when I view the post it just links to a jpeg
This is the Windows 95 launch video in my mind: https://www.youtube.com/watch?v=kemivUKb4f4
So the training environment was not Touhou? So what does the training environment look like? I’d be interested to see that, and how it improved over time.
He was in the airport, remember. Not in a local market.
I lost my earbuds in a remote town in Chile, so tried buying a new pair at the airport before flying out.
…
True Apple lightning devices are more expensive to make.
…
I wish @Apple would devote an employee or two to cracking down on such a technological, psychological abomination as this.
He wants to take away a budget option from developing countries where people can’t afford the expensive version of the proprietary technology, and he wants Apple to be the one to do it?
Fuck this guy.
If you’re not storing on a filesystem that calculates and checks erasure codes then you can always generate PAR2 files yourself.
deleted by creator
Ah, you’re talking about LUKS. LVM is just the volume manager.
The standard way is to add an sshd
(such as dropbear) to your initramfs
so that you can ssh in and run commands (such as entering the root partition password) during system boot.
See:
will that cause me problems on a headless server if I get a power outage and need to reboot? I think yes
Maybe I’m missing something obvious, but what is the problem that you anticipate with LVM after a power failure?
The Kaspersky analysis noted that the malware contained comments in the shell scripts written in Ukrainian and Russian, and used malware components detected in previous malware campaigns since 2013 that presumably have been attributed to a specific group.
FTA:
Meanwhile, the postinst script contains comments in Russian and Ukrainian, including information about improvements made to the malware, as well as activist statements. They mention the dates 20200126 (January 26, 2020) and 20200127 (January 27, 2020).
…
Having established how the infected Free Download Manager package was distributed, we decided to check whether the implants discovered over the course of our research have code overlaps with other malware samples. It turned out that the crond backdoor represents a modified version of a backdoor called Bew. Kaspersky security solutions for Linux have been detecting its variants since 2013.
…
The Bew backdoor has been analyzed multiple times, and one of its first descriptions was published in 2014. Additionally, in 2017, CERN posted information about the BusyWinman campaign that involved usage of Bew. According to CERN, Bew infections were carried out through drive-by downloads.
As for the stealer, its early version was described by Yoroi in 2019. It was used after exploitation of a vulnerability in the Exim mail server.
AFAIK even legitimate ad clicks will first direct to an analytics platform before redirecting to the destination site, so that they can track click through rates and where the referral came from. So it is unlikely that ad links will actually go to the website you expect them to even in normal scenarios. It is actually this mechanism that the malicious ads described in the article are using to fake the display URL.
7-zip supports just about every archive type (including rar files) and it’s Free Open Source Software.
A bunch of Street Fighter games
SF Zero 3 (called Alpha 3 in the West) is my favorite. Zero 2’ (Alpha 2 Gold in the West) is also very good.
SF Collection has a great port of Super Turbo along with the aforementioned Zero 2’.
Marvel Super Heroes vs Street Fighter and X-Men vs. Street Fighter are also well worth a play.
My Steam Deck does a fine job of emulating Saturn!
Saturn is out though.
Why?
What was your XMPP client connecting to? Was it a well-known public endpoint (that they could be whitelisting) or was it a private server? If the latter then that indicates that they are allowing arbitrary IP connections which in theory means that you should be able to proxy any traffic you want. I doubt they are doing DPI, since TLS makes this very difficult these days when you don’t control the certificate stores on the clients.
I’d imagine they’re relying on some combination of DNS whitelisting and port blocking which should be trivial to circumvent if you know ahead of time what traffic they allow through.
I’ve been using Firefox since the beginning, before that Mozilla, and before that Netscape Navigator.
But I think it’s finally time to switch to Librewolf.
I don’t want digital advertising of any kind, even if my privacy is “preserved” through fancy data-laundering.