
For years, more ham-fisted printer manufacturers have waged a not-so-subtle war on consumers by blocking the ability to use cheaper, third-party printer cartridges. HP and Canon have both been part…

Off to a non-US instance. Goodbye, and thanks for all the fish.
and tied to SAP.
🤢
Mastodon, Lemmy, RSS.
No there yet but not getting the love it deserved either.
Maybe they oughta try asking for money like Wikipedia and KDE, maybe then they could become independent from Google and focus on actually developing a quality browser instead of making every app be about profit.
It's insecure by default and Kids These Days™ prefer messaging apps, which have boomed in the last decade.
Time will tell.
Already discussed here.
I'll remention this video.
It's a saturated market and email is starting to disappear (it'll take years, but the signs are there).
They'd be better using it on the browser and ditching other products.
So the Mozilla Foundation is gonna waste google money on email infrastructure? Hmmm... 'k... it's not like their browser could use some love...
Not with cameras alone, no.
It do be like that
It do be like that
It do be like that
So they see you as a human. Not a gay human.
I use Tor to get magnet links and feed them to my clearnet torrenting client, no issues so far and the ISP would have to breach my privacy to provide my IP.
They call it “click fraud”,
No, click fraud is using botnets to click ads in your site to increase your revenue.
This video proposes that theory.
This is news? Fortnine talked about it two years ago.
TL;DR Tesla removed LIDAR to save a buck and the cameras see two red dots that the 'puter thinks it's a far away car at night when indeed it's a close motorcycle.
It do be like that
As long as they're hired for their skills and not to tick a checkbox i don't care.
Hosting for yourself so you can access your content outside your home is usually the use-case, use WireGuard for that though (checkout headscale) along with virtualization, VLANs, etc.
Hosting for a group of friends and/or family can usually be ok, assuming that is a well known and restrict group.
Hosting for the general public from home is usually not recommended, use a VPS for that. Bear in mind you'll likely be liable for what you host, one way or the other, depending on your jurisdiction.
If you store content (files others may upload like movies and photos) you may be responsible for that (i.e. is that content legal in your jurisdiction?).
There may be a legal distinction between the server's geographic location and the entity responsible for it - but in your case it's the same, so, again, beware.
Just linking to content deemed illegal may get you into trouble.
Putting the site behind a login-only page and vetting account creation could mitigate (or exponentiate) this.
Anyway IANAL.
What do you want to host and for whom?
Only 1 GiB of RAM? Moooom!
Shut up Johnny, Voyager's still out there with way less.
you no longer have a moral obligation to transition anything over to your coworkers.
My coworkers didn't let me go, my boss did. If i knew a shit coworker of mine would inherit the project then sure, otherwise i don't see the point of burning bridges.
mirrors search?
Is there a site to search packages for Raspberry OS, like Ubuntu's or Debian's?
The only site i can find is https://www.raspbian.org/RaspbianMirrors which is currently 502ing and may be outdated.
I'd like to search packages and get a list of mirrors.
For years, more ham-fisted printer manufacturers have waged a not-so-subtle war on consumers by blocking the ability to use cheaper, third-party printer cartridges. HP and Canon have both been part…
Techdirt has been writing about India’s huge Aadhaar database of biometrics, which assigns a unique 12-digit number to all Indian citizens, for a decade now. The system was introduced to make it ea…
Techdirt has been writing about India’s huge Aadhaar database of biometrics, which assigns a unique 12-digit number to all Indian citizens, for a decade now. The system was introduced to make it ea…
SDL 3.2.0 released
Announcing the SDL 3 official release! SDL 3.0 is finally here! We have many many people to thank on the road to get here, but I'd like to call out special thanks to: @slouken and @icculus, lead d...
list installed packages and their repositories
As the title says.
pacman -Q
lists only name and version;
pacman -Qi
does have a "Packager" field, but i think it's not the same thing;
pacman -Qs
seems to be what i want (if local means "all installed packages atm") but it's all prefixed by local/
instead of repo name like mingw32/
which is what i want.
I'm using MSYS2 in windows.
killed all access to remote share after CIFS atempt
cross-posted from: https://programming.dev/post/24130558
My Win10 work laptop has a network share of a remote windows server. I access it everyday. If i change passwords, i have to remap the share.
I have a linux vm that does the builds for my project. It too has a mounted directory mapped to that remote windows share, using my credentials.
I tried mapping the share in another linux vm but got errors so ended up quitting as it wasn't that important.
However, now i can't access said share in any device, by name or IP address. WTF happened?
The mount command i use in linux is
mount -t cifs -o rw,relatime,vers=default,cache=strict,username=my.username,domain=,uid=118,noforceuid,gid=130,noforcegid,addr=10.10.10.10,file_mode=0755,dir_mode=0755,soft,nounix,serverino,mapposix,rsize=1048576,wsize=1048576,echo_interval=60,actimeo=1 //10.10.10.10/dir1/dir2 /media/remoteshare
, the UID/GID are of the user that runs the builds.I'd get having errors on mounting the
killed all access to remote share after CIFS atempt
My Win10 work laptop has a network share of a remote windows server. I access it everyday. If i change passwords, i have to remap the share.
I have a linux vm that does the builds for my project. It too has a mounted directory mapped to that remote windows share, using my credentials.
I tried mapping the share in another linux vm but got errors so ended up quitting as it wasn't that important.
However, now i can't access said share in any device, by name or IP address. WTF happened?
The mount command i use in linux is mount -t cifs -o rw,relatime,vers=default,cache=strict,username=my.username,domain=,uid=118,noforceuid,gid=130,noforcegid,addr=10.10.10.10,file_mode=0755,dir_mode=0755,soft,nounix,serverino,mapposix,rsize=1048576,wsize=1048576,echo_interval=60,actimeo=1 //10.10.10.10/dir1/dir2 /media/remoteshare
, the UID/GID are of the user that runs the builds.
I'd get having errors on mounting the remote share, but i'd expect that to be limited to the local computer i was tryi
Instagram, Facebook, and Threads are removing 404 Media stories for “nudity” as the company is paid to put ads with explicit pornography in front of its users.
...surprising no one...
A central theme of Walled Culture the book (free digital versions available) and this blog is that the copyright industry is never satisfied. Now matter how long the term of copyright, publishers a…
The second step, which we still need to evaluate because some companies want it, and others are more hesitant, is to allow Anatel to have access to the core routers to place a direct order on the router
When you think of languages you might read about on Hackaday, COBOL probably isn’t one of them. The language is often considered mostly for business applications and legacy ones, at that. The…
Hackers Can Jailbreak Digital License Plates to Make Others Pay Their Tolls and Tickets
Yet another case of just because you can...
Is there any table with minimum *sdk requirements?
cross-posted from: https://programming.dev/post/22983650
I know that Android 14 requires
targetSdkVersion
>= 23 (or higher on the Play Store), but are there other minimums for this andminSdkVersion
?
As reports of drones swarming U.S. skies increase, speculation online as to who is behind them ranges from military ops to alien visitors.
The Missing Nukes/Dirty Bomb Sweep Theory
The PSY-OP/Government Conspiracy Theory
The ET Theory
The Mass Hysteria Theory
The Copycats/Hoaxers Theory
The Iranian Mothership/Foreign Spy Theory
The Angels Theory
I have talked about old curl bugs before, but now we have a new curl record. When we announced the security flaw CVE-2024-11053 on December 11, 2024 together with the release of curl 8.11.1 we fixed a security bug that was introduced in a curl release 9039 days ago. That is close to twenty-five year...
I like the clarification:
Let me also touch this subject while talking security problems. This bug, the oldest so far in curl history, was a plain logic error and would not have been avoided had we used another language than C.
Otherwise, about 40% of all security problems in curl can be blamed on us using C instead of a memory-safe language. 50% of the high/critical severity ones.
Almost all of those C mistakes were done before there even existed a viable alternative language – if that even exists now.
Apple has become aware of a security flaw that could let hackers take control of a user’s iPhone or iPad if they visit a harmful website.
cross-posted from: https://programming.dev/post/22002771
Apple has become aware of a security flaw that could let hackers take control of a user’s iPhone or iPad if they visit a harmful website.
Maybe i'm reading this wrong but it doesn't seem to be cryptocurrency-specific:
Jeremiah O’Connor, CTO and co-founder of crypto cybersecurity firm Trugard, told Decrypt that “attackers could access sensitive data like private keys or passwords” stored in their browser, enabling crypto theft if the user’s device remained unpatched.
Mirror is an entirely new concept in programming — just supply function signatures and some input-output examples, and AI does the rest.
Mirror is an entirely new concept in programming — just supply function signatures and some input-output examples, and AI does the rest.
Eighteen years of ABI stability in curl
Exactly eighteen years ago today, on October 30 2006, we shipped curl 7.16.0 that among a whole slew of new features and set of bugfixes bumped the libcurl SONAME number from 3 to 4.
Law Enforcement Deanonymizes Tor Users
The German police have successfully deanonymized at least four Tor users. It appears they watch known Tor relays and known suspects, and use timing analysis to figure out who is using what relay. Tor has written about this. Hacker News thread.
The German police have successfully deanonymized at least four Tor users. It appears they watch known Tor relays and known suspects, and use timing analysis to figure out who is using what relay.
Tor has written about this.
Hacker News thread.