Yo peeps, I’m currently looking into TCF Vendors, Ad partners and their whole corporate greed hellhole of tracking. I am writing a paper on this, and would like for everything to be factually correct. However, I am struggling to understand one particular part of this “transparency framework” and hope someone can help me...
It’s not well explained for sure but judging by the names of the cookies I bet those store the consent (opt in/out) values for the other tracking options. Another way of putting it would be those are functional cookies related to the cookie consent form itself so that you don’t have to re-select consent options every time you visit the site.
I’m not an electrician so I don’t know if it would be up to code (very likely is not) but you might be able to use a current sensing relay to trigger the lights. For safety I would add a local disconnect as well.
If 35° (or something close to it) is the slicer setting for overhang detection it likely changes the cooling/speed/flow settings. If that is the case you can set it to a lower detection value and maybe get better results or change the normal cooling/speed/flow to be closer so it isn’t as drastic of a change.
From what I’ve read is not authentication bypass, it’s a RCE using certificates to deliver the payload. If a specific signature is found it runs the code that was sent in place of the signing public key. It also means that only someone who has the ability to generate that specific key signature could use the RCE.
There were some other bits that looked like they could have been placed to enable compromising other build systems in the future when they checked for xz support.
LIKE_THIS ? And do i come of as some kinda culty weirdo ? I thought that looked formal and trademarky ? Am i a zoomer aldready out of touch and becoming cringe ? Should i change my accs to small letters but i’ll lose my block history whuch is almost 1000 /c/ any way to back that up ?...
Business systems from the 80s used to automatically convert everything name related to caps. It made it easier to do string matching which was generally case sensitive in the DB. It also made data entry easier as you just turn capslock on and type.
The biggest issue is that your corners are lifting from the bed during the print. Fixing this is usually a combination of making sure the bed is clean and adding a brim to increase adhesion. Maybe messing with temperature and cooling fan settings for the first few layers.
Second is things look a bit over extruded. This could just be due to the corner issue though so fix that before any other changes.
So my LinkedIn mobile app probably has an issue with my VPN so they want to see some papers please before I can use their app. Fine, it’s your service and I need to use it to influence my peers. So anyway they want ID, I give them my current student ID which has a nice picture, a sticker with the present semester and year,...
“Invalid” or “unparseable” are more understandable descriptors in normal language. I don’t think I ever heard of garbage/junk being used for that in language theory but it may be domain specific usage.
There are a lot of edge case characters around visually indistinguishable names. If that is a concern usernames should use a restricted known character sets instead of trying to block specific characters. You likely should also treat lookalike characters as equivalents when checking for username overlap.
I have a home server and I have some HTTP services running on it. I’m thinking if I should even bother with HTTPS, as I’m already using tail scale which should be peer-to-peer and encrypted. So I shouldn’t worry about any men in the middle....
It can still have issues with potential attacks that would redirect your client to a system outside of the VPN. It would prevent MitM but not complete replacement.
ive anabled a port forward on port 80 (TCP/UDP) to my server, but i still cant acess it. i know its unsafe to just open a port like that, this is temporary, just wanna see if it works. ill put a reverse proxt and https on it later
10.x.x.x is a private range. It won’t be your externally visible internet address but it might be your router’s WAN address if your upstream ISP is performing a NAT for IPv4 or if you have multiple chained routers in your network. If that is your router’s WAN address you likely won’t be able to use port forwarding for external access.
You can find your external address by visiting ifconfig.me or from a linux shell running curl https://ifconfig.me
My recommendation would be to start from the other direction instead. Try and get the reverse proxy working with a SSL and a test page then work on making your nextcloud instance visible. You can use a tunneled service from cloudflare or tailscale to avoid the port-forwarding and add a layer of security.
Saw a video of a youtuber that got his account overtaken which has 2fa enabled (not sure which method but I’m thinking sms). He says he didn’t get phished, downloaded anything and his session cookies weren’t stolen and I believe him. The only clue is that he received a sms otp from google but was invalid when he inputted...
There is also SMS passive reading using LEO intercept. Hacked police email accounts are used to gain access to carrier systems where they use “imminent threat” no warrant lookups to pull the SMS in real time.
SMS is a terrible form of 2FA, better than none but not by much.
I’m a generalist SysAdmin. I use Linux when necessary or convenient. I find that when I need to upgrade a specific solution it’s often easier to just spin up an entirely new instance and start from scratch. Is this normal or am I doing it wrong? For instance, this morning I’m looking at a Linux VM whose only task is to run...
Your experience may depend on which distro you use and how you install things. If you use a distro with a stable upgrade path such as Debian and stick to system packages there should be almost no issues with upgrades. If you use external installers or install from source you may experience issues depending on how the installer works.
For anything complex these days I’d recommend going with containers that way the application and the OS can be upgraded independently. It also makes producing a working copy of your production system for testing a trivial task.
Fridges with a dial usually are an uncalibrated simple analog thermostat sensor (often a gas tube with a pressure switch) along with a simple analog control board. Fridges with a digital thermostat tend to use a calibrated sensor (usually a thermocouple) with a digital control board.
I’ve had an Ender 3 v2 for a few years now and have had mostly no issues. I’ve upgraded the hot end to a microswiss direct drive and a dual z setup (twin z steppers on a shared cable)....
You might also try running a few leveling probes in a row to check the repeatability of the measurements. It’s possible that something is messing with the ability to make good measurements (unstable power feed, heat warp, probe binding, etc).
That’s awesome, I had an iRiver as well. Ended up putting custom firmware on it after a bit as the original firmware was buggy at times and lacked features. The device itself was surprisingly capable and could even play video.
I’n Windows it is not stored in a keyring but instead in the registry. This has basically the same security threat model as a local key file.
The ssh-agent on Linux will do what you want with effectively the same security. The biggest difference being that it doesn’t run as a system service but instead runs in userspace which can make it easier to dump memory. There are some other agent services out there with additional security options but they don’t change the threat model much.
Initrd contains the systemd binary and enough libraries, services, and kernel modules to get booted this far. The system failed at switch root which is where the real root disk is mounted. Initrd can contain as much or as little as needed to get a working system which can be a lot of you are using a network filesystem as a root for instance.
You can also use o1e as there are never more than a single shared character. It also doesn’t change the string size so it can be done in place. Still an ugly hack of a solution.
Trying to understand Consent Forms, Cookies and Third-Party Vendors (slrpnk.net)
Yo peeps, I’m currently looking into TCF Vendors, Ad partners and their whole corporate greed hellhole of tracking. I am writing a paper on this, and would like for everything to be factually correct. However, I am struggling to understand one particular part of this “transparency framework” and hope someone can help me...
How wrong is this wiring idea?
Can I put an additional load before switches on a dedicated circuit?...
[SOLVED] Any ideas what causes this in overhangs? (lemmy.world)
When I do an overhang test, I always have this problem at about 35°. Does anyone have a suggestion what could be causing it?...
What we know about the xz Utils backdoor that almost infected the world (arstechnica.com)
Yeah yeah, we know you're special (lemmy.dbzer0.com)
Is full caps account names not normal ?
LIKE_THIS ? And do i come of as some kinda culty weirdo ? I thought that looked formal and trademarky ? Am i a zoomer aldready out of touch and becoming cringe ? Should i change my accs to small letters but i’ll lose my block history whuch is almost 1000 /c/ any way to back that up ?...
What's going wrong with my prints?
Hey,...
LinkedIn vs. Library Cards
So my LinkedIn mobile app probably has an issue with my VPN so they want to see some papers please before I can use their app. Fine, it’s your service and I need to use it to influence my peers. So anyway they want ID, I give them my current student ID which has a nice picture, a sticker with the present semester and year,...
Ping is so mean 🥺 (lemmy.dbzer0.com)
Should you allow username to use Apostrophe (aka quotes )
Hi,...
It's always nice to revisit my old code. (lemmy.world)
Should I bother with HTTPS over Tailscale?
I have a home server and I have some HTTP services running on it. I’m thinking if I should even bother with HTTPS, as I’m already using tail scale which should be peer-to-peer and encrypted. So I shouldn’t worry about any men in the middle....
Federation of my Lemmy instances doesnt work (please help)
I hope this is the right place for this....
how to access nextcloud outside LAN?
ive anabled a port forward on port 80 (TCP/UDP) to my server, but i still cant acess it. i know its unsafe to just open a port like that, this is temporary, just wanna see if it works. ill put a reverse proxt and https on it later
concerning....... (lemmy.cafe)
https://wetdry.world/@vozercozer/111779952465093527
How do scammers overtake a youtube account with 2fa enabled
Saw a video of a youtuber that got his account overtaken which has 2fa enabled (not sure which method but I’m thinking sms). He says he didn’t get phished, downloaded anything and his session cookies weren’t stolen and I believe him. The only clue is that he received a sms otp from google but was invalid when he inputted...
Upgrade vs Reinstall
I’m a generalist SysAdmin. I use Linux when necessary or convenient. I find that when I need to upgrade a specific solution it’s often easier to just spin up an entirely new instance and start from scratch. Is this normal or am I doing it wrong? For instance, this morning I’m looking at a Linux VM whose only task is to run...
We’re over-freezing our food. Turning up the temperature slightly could avoid 17 Mt of CO2 (www.anthropocenemagazine.org)
“This temperature corresponds to 0 degrees Fahrenheit, so it was “probably a round, easy number to remember”...
Upgraded Ender 3v2 Issues
I’ve had an Ender 3 v2 for a few years now and have had mostly no issues. I’ve upgraded the hot end to a microswiss direct drive and a dual z setup (twin z steppers on a shared cable)....
Mine's still around here somewhere. (startrek.website)
Storing SSH keys on gnome-keyring, kwallet, ibsecret or similar
I don’t like my ssh keys being stored in plain sight, I also don’t like having to type a passphrase to use them....
Can I get a filesystem cleanup on aisle 6? (lemmy.today)
[2023 Day 1] It is not supposed to ramp up this fast (lemmy.ml)