Show newer

:

Host 192.168.5.40 is TrueNAS SCALE with some containers. Some unnamed idiot sysadmin took it off DHCP and forgot to assign a gateway.

Now, two of three containers on that host cannot be accessed by 192.168.5.226. Putting the gateway back fixed it.

Bitwarden is a free open source password manager for computers and mobile devices. You can follow their official accounts at:

➡️ @[email protected] (main account)

➡️ @[email protected] (videos)

➡️ @[email protected] (photos & clips)

Their website is at bitwarden.com

(New post due to additional official accounts)

#BitWarden #FOSS #FLOSS #Libre #FreeSoftware #OpenSource #Password #Passwords #PasswordManager #Business #Productivity #Office #Apps

#Fediverse instance idea: an instance specifically for organizations/projects, requiring additional verification that a given account actually belongs to a particular org/project.

From the perspective of other fedi users this would mean:

- reasonable assurance that @[email protected] actually belongs to the org/project in question

- way to find other org/projects (just check the user catalogue of that.instance)

- way to block or ignore the whole instance if one wants to avoid org/project accounts.

SGX's deprecation has left a lot of users who'd like to play Blu-ray discs on their machines in the lurch, but its deprecation isn't the real problem. The real problem is #DRM and the media conglomerates who foist it on us. Read more: u.fsf.org/3i2

Want to check it out?

`sudo apt install pgpainless-cli` will give you a the command line tool to generate #OpenPGP keys, encrypt and sign messages, and more.

Naturally it comes with man pages ;)

Show thread

A quite disturbing note: the JS code that Facebook injects in every webpage through their in-app browser (connect.facebook.net/en_US/pcm) is basically a spartan spyware.

You can think of it as a Greasemonkey user script that does the following:

- It gets injected into every DOM
- It attaches a callback to every <button>, <a> and <form> element in the page, whose purpose is to send a request to the Instagram GraphQL endpoints with some encrypted payload on every click/submit events
- It attaches tracking parameters to every opened URL

Why don't we just call these things with their appropriate names? How did we get to a point where a company can inject spyware in every web site through an app used by billions and get away with it?

If you still want to use the Facebook and Instagram apps, at least do yourself a favour and use PiHole as a DNS sinkhole, so domains like connect.facebook.net and all the faecal matter they contain get flushed down the right hole.

Using these apps without blocking the trackers that they inject is like shagging the whole world without wearing a condom.

Show thread

Like, it's the sort of thing that's so weird I can't not look at it.

Like, you can have files, and then you can have "Unversioned Files" which are in the repo data but are indepentent of the actual VCS. Repos can sync their user list with other repos. User permissions are legit based on single letters (and numbers) like someone spent too much time on IRC. You can add arbitrary notes to the project timeline.

DRH, I don't know if you're an eccentric genius, or.. well... insane.

Show thread

If you're curious: created by D. Richard Hipp (creator of SQLite), and builds in it's own GUI, ticketing system, forum, wiki, even authentication and access control, and uses SQLite so hard it's not even funny. The repository is a SQLite file. The checkout is a SQLite file. Some things, like the ticketing system, allow you to just modify the ticket table schema to slot in fields you want. It's weird.

(Also, sync over HTTP in a very interesting line-based protocol)

Show thread

Better yet, heck with it. Iet's pull another one just for fun: check all that you've used at least once.

(I tried to pull some of the more obscure options out of the ones I actually host, minus Hg)

Show thread

Okay, time. Quick : Have you heard of the Fossil version control system?

Might influence some potential blog content later down the line...

Yo, Linux users! Hi!

On plan 9, there's a system-wide HTTP client. As such, if I sign in to a site in one web browser, I'm signed in on *all* of them, because the browsers aren't responsible for managing cookies. I can also see all cookies cross-browser in $home/lib/webcookies.

I'm not asking how to do that under Linux.

I'm just amazed at how *obvious* this feels in retrospect.

NGL the Trump one middle-right looks more like Boris Johnson than Trump... Maybe same for center...

Show thread

uspol via DALLE Mini 

So my friend decided to start messing around with today... and well

oh god.

Guns 

"Did I mention, it's called GLOCK LEG simulator"

Legit, Receiver 2 in a nutshell: youtu.be/paxk_LPmdMI

Context: configuring an UrBackup internet client (so it's not exactly "untrusted")

Show thread

also give me a second, I have to paste untrusted code into a root shell

-Teknikal_Domain, 2022.

Show older
Tek's Mastodon

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!