0x0

joined 2 years ago
[–] 0x0 1 points 4 days ago

Well-spotted. Bye 😘

[–] 0x0 10 points 1 week ago (2 children)

It's only non-US if you choose a non-US instance...

[–] 0x0 1 points 1 week ago

and tied to SAP.

🤢

[–] 0x0 7 points 1 week ago

Mastodon, Lemmy, RSS.

[–] 0x0 -1 points 1 week ago (1 children)

No there yet but not getting the love it deserved either.
Maybe they oughta try asking for money like Wikipedia and KDE, maybe then they could become independent from Google and focus on actually developing a quality browser instead of making every app be about profit.

[–] 0x0 2 points 1 week ago (1 children)

Already discussed here.
I'll remention this video.

[–] 0x0 3 points 1 week ago* (last edited 1 week ago) (4 children)

🇬🇧 7digital
🇫🇷 Qobus
Ain't Spotify Swedish?

[–] 0x0 6 points 1 week ago

Not with cameras alone, no.

[–] 0x0 1 points 1 week ago

Oh no, such strong words... i almost got offended.

4
mirrors search? (self.raspberry_pi)
submitted 2 weeks ago* (last edited 2 weeks ago) by 0x0 to c/raspberry_pi
 

Is there a site to search packages for Raspberry OS, like Ubuntu's or Debian's?
The only site i can find is https://www.raspbian.org/RaspbianMirrors which is currently 502ing and may be outdated.

I'd like to search packages and get a list of mirrors.

 

The source code for nginx is hosted in the US, BSD-licensed and has the american F5.com as the primary maintainer, sponsor, and steward of NGINX.

In 2022 some of the developers forked it into Angie, the code of which is hosted in the US as well.

In 2024 one of the lead developers forked nginx into freenginx due to F5's interference, bringing it more in line with its initial grassroots origin. They have a self-hosted Mercurial repo (and a mirror in the US) and the domain seems to be controlled by the lead developer.

4
submitted 2 months ago by 0x0 to c/sdl
 

a22-65.akam.ne.

 

According to a DOJ press release, the FBI was able to delete the Chinese-used PlugX malware from “approximately 4,258 U.S.-based computers and networks.”

Details:

To retrieve information from and send commands to the hacked machines, the malware connects to a command-and-control server that is operated by the hacking group. According to the FBI, at least 45,000 IP addresses in the US had back-and-forths with the command-and-control server since September 2023.

It was that very server that allowed the FBI to finally kill this pesky bit of malicious software. First, they tapped the know-how of French intelligence agencies, which had recently discovered a technique for getting PlugX to self-destruct. Then, the FBI gained access to the hackers’ command-and-control server and used it to request all the IP addresses of machines that were actively infected by PlugX. Then it sent a command via the server that causes PlugX to delete itself from its victims’ computers.


The title is a bit blick-batey as it implies the FBI did it directly to said computers.

 

As the title says.
pacman -Q lists only name and version;
pacman -Qi does have a "Packager" field, but i think it's not the same thing;
pacman -Qs seems to be what i want (if local means "all installed packages atm") but it's all prefixed by local/ instead of repo name like mingw32/ which is what i want.

I'm using MSYS2 in windows.

 

cross-posted from: https://programming.dev/post/24130558

My Win10 work laptop has a network share of a remote windows server. I access it everyday. If i change passwords, i have to remap the share.

I have a linux vm that does the builds for my project. It too has a mounted directory mapped to that remote windows share, using my credentials.

I tried mapping the share in another linux vm but got errors so ended up quitting as it wasn't that important.

However, now i can't access said share in any device, by name or IP address. WTF happened?

The mount command i use in linux is mount -t cifs -o rw,relatime,vers=default,cache=strict,username=my.username,domain=,uid=118,noforceuid,gid=130,noforcegid,addr=10.10.10.10,file_mode=0755,dir_mode=0755,soft,nounix,serverino,mapposix,rsize=1048576,wsize=1048576,echo_interval=60,actimeo=1 //10.10.10.10/dir1/dir2 /media/remoteshare, the UID/GID are of the user that runs the builds.

I'd get having errors on mounting the remote share, but i'd expect that to be limited to the local computer i was trying to mount on, not that it would propagate to any device that has this share mapped!

 

My Win10 work laptop has a network share of a remote windows server. I access it everyday. If i change passwords, i have to remap the share.

I have a linux vm that does the builds for my project. It too has a mounted directory mapped to that remote windows share, using my credentials.

I tried mapping the share in another linux vm but got errors so ended up quitting as it wasn't that important.

However, now i can't access said share in any device, by name or IP address. WTF happened?

The mount command i use in linux is mount -t cifs -o rw,relatime,vers=default,cache=strict,username=my.username,domain=,uid=118,noforceuid,gid=130,noforcegid,addr=10.10.10.10,file_mode=0755,dir_mode=0755,soft,nounix,serverino,mapposix,rsize=1048576,wsize=1048576,echo_interval=60,actimeo=1 //10.10.10.10/dir1/dir2 /media/remoteshare, the UID/GID are of the user that runs the builds.

I'd get having errors on mounting the remote share, but i'd expect that to be limited to the local computer i was trying to mount on, not that it would propagate to any device that has this share mapped!

view more: next ›