![](https://lemmy.world/pictrs/image/6075b974-9ef8-45a7-8a3b-e69e39a87042.jpeg)
![](https://lemmy.ml/pictrs/image/d3d059e3-fa3d-45af-ac93-ac894beba378.png)
I’m thinking of making a RSS feed generator tool and aggregator that would support OAuth for subscription based services. Just doing some research first.
I’m thinking of making a RSS feed generator tool and aggregator that would support OAuth for subscription based services. Just doing some research first.
How much are they paying you?
The guy had a friend who admitted to 8 murders and he himself murdered his wife who was the translator for a Russian mail order bride catalogue… Woah. Its hard to believe a person like that could contribute to open source.
Saying you can solve the existence of bugs in any code repository reeks of bullshit. Anyone who believes this is possible is just ignorant.
I always wonder how these relics make any money using systems that old. To do business with some of our clients, they audit us for ISO 27001 compliance once per year. Anything out of support would be flagged and we could lose a lot of business.
Powershell has ls and other common linux commands built in, try it.
A universities desktop environments are not the same risk level of a corporate. All the uni I have seen have trash management. In corpos its a mix of trash and highly polished depending on who is in charge.
The best methods to detect and prevent attacks on your endpoints are EDR software that are linked to your corporate router like FortiEDR, which supports Windows, Mac, Linux, and even some VDI like Citrix.
Have a look at manage engine software
How can they get away with this? Does Isreal not give a shit about international relations?
Having automatic updates as opt-in by default would be better to avoid supply chain attacks. Also, if the original history file is still there it would be a good feature to be able to diff between the sqlite and the history file to see if commands have been deleted. Are there options to choose what encryption algo is used?
Bypassing login is not difficult on a lot of OS.
Docker desktop is so garbage. Why build a client that doesn’t support connections to a remote host by default? It’s so 90s.
Now we all want to know if you have child porn
Don’t use Brave…
That class of storage is very expensive to get your data back. Buying a drive will be cheaper.
The countermeasure to the attacks we describe in this paper is well known: implementations should validate signatures before sending them. OpenSSH, the most common SSH implementation we observed in this data, implements this countermeasure because it uses OpenSSL to generate signatures, and OpenSSL has included countermeasures against RSA fault attacks since 2001.
Wireshark is the best FOSS for packet inspection, but you’ll have to test the efficacy of your solution on enterprise hardware directly if you’d like to know which ones it works for. You can virtualize many of these FW on Azure cloud for an hour and it won’t cost much, but you’d need to know what you’re doing.
You accept that you are in a difficult situation with no great answers.
You focus on being good company for yourself and treating yourself like someone of value. Be kind and understanding to yourself and try to minimize negative self talk.
You open yourself to creating new connections with others, but without preconceived ideas of success or failure.
Are you affiliated with the project in any official way?
If so, thank you for such a nice product.