• 1 Post
  • 77 Comments
Joined 1 year ago
cake
Cake day: July 6th, 2023

help-circle

    • VLC media player is the gold standard
    • Open broadcasting software / stream labs for broadcasting and studio management
    • Ffmpeg for video editing
    • Yt-dlp for downloading video
    • audacity MP3 editing
    • Plex / jellyfin / Stashapp for media server
    • Pixlr for cloud photo editing
    • Yarn / chocolatey / Asdf / node / poetry - package management
    • Flaresolver, pihole, home automation, nginx
    • Qbit-*arr for file sharing
    • Massgrave for windows activation
    • Filezilla for ftp (upgrade hosting)
    • Depending on bullshit level: discord, Google workspace offers custom domain Google accounts
    • Anything past that I write for myself or find a project with a dockerfile


  • The joke is that a person named Hans Duchtelstein was the previous timelines “Hitler” and after being successful Hitler just stepped in because fate is inevitable.

    Reverse: we time travel and kill Hitler, come to the present and Hans Duchtelstein takes Hitlers place but does the exact same thing.










  • Mostly customer provided certs, high end clients make all kinds of stupid requests like the aforementioned man-in-the-middle chain sniffers, clients that refuse DNS validation, clients that require alternate domains to be updated regularly. Management is fine for mywebsite.com, but how are you solving an EV on the spoofed root prod domain, with an sso cert chain for lower environments on internal traffic that is originally provided by a client? And do you want the cs reps emailing each other your root cert and (mistakingly) the key? I’ve been given since SCARY keys by clueless support engineers. I don’t want to do this every 3 months.


  • As someone who creates custom domain name applications, FUCK THEM WITH A PINEAPPLE SPIKY SIDE FIRST. This problem is on par with timezones for needless complexity and communication disasters. Companys and advertisers are now adding man in the middle certs for additional data collection/visibility. If the ciphers not cracked, changing the certs exposes significantly more failure, than letting one get a little stale.
    Sysadmin used slam! It’s super effective!





  • thirteene@lemmy.worldtoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    55
    arrow-down
    8
    ·
    3 months ago

    Hailey “Hawk Tuah” Welch is an influencer that gained a lot of popularity from her nickname (the sound of spitting, with HEAVY implications of performing fellacio). She used her platform to voice a very reasonable and intelligent opinion, which surprised a lot of people because her nickname is essentially blowjob queen.

    One of her opinions is that it’s important to spread cyber security and used her fame to try to educate the public (potentially a fake story from the image? Idk this drama). And some xit-head claiming to be a cyber security expert ate the onion and offered some shitty advice. Proton fact checked them, because there are a ton of fake news stories about her right now.