• 2 Posts
  • 89 Comments
Joined 2 years ago
cake
Cake day: December 27th, 2023

help-circle



  • Router is my own and up to date.

    that does not say its dns settings are as you set them. if you use a default or weak password for your routers config page, an attacker could change its setting from the outside via dns rebinding, then scanning your net, finding your router, trying passwords and when succesfull changing firewall rules or change dns settings to make your programs check the attackers repository proxies instead of their vendor ones.

    dns rebind: https://www.packetlabs.net/posts/what-are-dns-rebinding-attacks/

    so better check its dns settings, that it likely is pushing to dhcp clients, too.

    Thanks to flatpak it also doesn’t have the ability to see anything else from my system. it at least seems to asks for seeing way more…

    jdownloader could theoretically also got hacked by a site you were downloading from. maybe having a complete list of what you downloaded and check those again but using source provided (and signed?) hashes could reveal something fishy.

    maybe (if thats possible there) make a memory/debug dump from the process in that condition and ask the vendor to look at it.

    maybe check your downloaders binary hashes and compare it to the vendors signed ones.


  • the jackass addition was a joke from my side as it fits the j in front and the situation presented perfectly, no matter if the original app did so or if it was hijacked somehow.

    however i used to use a separate downloader a very long time ago, when downloading i.e. an iso image for a new foss os took just too long, could be interrupted by time-togo-to-bed or anything else.

    one day i learned about another downloader to be spying. at that time the downloaders in good browsers did what i needed and i turned completely away from separate downloaders as using more products always increase the attack surface and i didnt need such any longer.

    for crawling i guess there are better tools than a downloader that needs to be fed by clipboard.

    for downloading a lot of files in parallel from a list, i would personally use a quickly coded script (download link from parameters using wget or on failure append the link to a failed-list) and then use something like:

    cat list | xargs --some-parameters ./dl-script.sh

    so that i could set limits of parallel downloads using the xargs parameters while not needing any extra software and beeing able to redownload the failed ones by just renaming the lists filename and run the command again.

    wget seems to support resume too, so i’ld try it that way but i never needed to.

    if you need the resume feature or download a lot on a daily basis, want adjustable speed limits by few clicks etc. a specialized downloader application is probably a better way to go and usually has a gui if you need that, but i have no need for downloaders and thus cannot recommend any except for quick use of wget and xargs maybe ;-)

    in general however i have ‘learned’ to try to prevent the use of products of specific programming languages which i had often more problems with than with others. its perl, ruby and java programs i try to prevent to use whenever possible. but that is based on personal experience like with ruby programs often basics (like turn on logging to find the problem didnt even log a single line not even in its debug mode) that are needed to at least administrate such programs were missing, bad or unhandy like java’s log4js default log rotation was horrible to use when forwarding logs and log4j was another thing by itself. However thats personal preferece to not use programs coded in these languages. same as with not using that one os vendors programs that are always in the news since decades with every week or so yet another 100% preventable security issue ;-) i just don’t like such.



  • thanks for the great picture 👍

    so here is the current cloud clima forecast:

    The saturated clouds will rain into the data lakes that are already overspilling here and there into the ransomstreams already taking all soil in their way with them. During the day there will be security clouds preventing from visible rain only while during the night those same security clouds rain themselves all collected data to their homelake while their homelake security already is corrupted and spills over regulary.

    As soon as the fort-cisc-pal-ocstricken-redm-ondams breach it’ll gonna have floods with multi-exabyte waveheights and the ripples of the release will be felt over to far east china and the currents will circulate around the world multiple times causing damage and devastation in their wake around the world and eventually even reach connected orbit.

    The floods will have the potential to also wash away and /or drown or choke all the big tech dinosaurs. Only small foss mammals and deep sea amphibics will survive this historic event.

    … you kinda asked for it 😉 same as “they” kinda asked for it too. 🤔







  • Democracy is mathematically impossible.

    if democracy was not possible, how does it come that the greek did democracy and it is said they were once overrun in a war because of beeing democratic? if something was a cause for a turn of a war, i pretty much believe it to really exist, no matter what some kind of half baked formulars “predicted” once.

    if democracy existed and your math says thats not possible, i’ld guess your math might simply be ‘slightly’ wrong about it or was created with (un-)intentional biases in mind ;-)

    just to note:

    in the history of human predictions based on thought through and wordly/mathmatically described rules, the most common thing afterwards was, that those rules and also their predictions were just fundamentally wrong and biased.


  • smb@lemmy.mltoMemes@lemmy.mlVoting for the lesser evil is still evil
    link
    fedilink
    arrow-up
    5
    arrow-down
    1
    ·
    edit-2
    1 year ago

    a system where you get served only two options to vote for but are held responsible for the outcome instead of those who limited the available options in the first place?

    eh yes, you are right, this is stupid.

    as a completely unrelated sidenote:

    “winner takes it all” is the actual opposite of democracy, no matter how the voting was done, and this fact can already be read 1:1 within those 4 simple words 😉


  • well, before that and for generations, banks printing money was an acceptable way of governments to make rich people richer and all others poorer, so i can fully accept that stealing was learned from govs and the richies there. change how “the successfull” accomplish their successes and you can teach the kids how to live without stealing, keep abuse by gov and richies as is and all the theft is done exactly as ordered by govs and richies, no matter the age.


  • i would try printing the filter part as a flat surface (without retractions) directly on the printer bed (only 3 layers maybe) and bend it later to become a tube ( like a “C”) i am not sure about petg, i did this bending with pla. hot water comes in handy and maybe a glas bottle. also prepare something to tighten where the ends of the C connect, a border without the small filter holes but some larger holes for something like cable ties or even a printed part for connecting the C edges.



  • i meant improving society and strengthen its immune system against threats that would otherwise cause collapses. imperiums cause and collapse/vanish all the time, just try to count the already vanished ones in “known” history, i guess while you are still busy counting the known ones there will be even more “newly found” by archaelogists. while lots of them just vanished without trace, some vanished but just weren’t found yet.