

I’ve been using it since 2017, it’s an excellent headless SBC operating system.
Their command line utilities are top notch and they have excellent support and development cadence.
That there is no perfect defense. There is no protection. Being alive means being exposed; it’s the nature of life to be hazardous—it’s the stuff of living.
I’ve been using it since 2017, it’s an excellent headless SBC operating system.
Their command line utilities are top notch and they have excellent support and development cadence.
When I read “open shell account server” I thought this meant anyone can get access programmatically. This sounded like a disaster.
But turns out, at least with the respect to this NetBSD specific offer, you have to send out an application.
Very cool article (and series).
Thanks for sharing.
Fascinating article. I thought the automated pointless commit system (basic time and date updates) to the give the illusion of activity was funny.
Thanks for sharing!
Thanks for sharing, this is cool!
Also nice to find interesting content creators who mirror on peertube.
Fascinating article. We don’t really get these types of attacks any more. It’s all professional criminals or nation state actors.
Wait so ASUS’s Armoury Crate software handles ASUS drivers and this DriverHub applications handles non-ASUS drivers?
Was this posted in self-hosted because the term is vaguely associated with the concept of getting pregnant?
Something along the lines of being able to access seeders for dead torrents on your tracker from other trackers (with some sort of accounting for economy).
Notification/warning that an executable was downloaded from the internet.
I like the interface of WinRAR more (just a matter of habit).
I even have a license for WinRAR that I bought 15 years ago.
I once got a really nasty cryptominer that shut down all attempt to remove it via a fully patched WinRar opening an archive with what seemed to mostly JPEGs (maybe some PDFs as well). Perhaps this vulnerablility the root enabler of the cryptominer.
Agreed, the trackers don’t have a protocol for automatically federating.
But even beyond DHT, you can upload public torrents on new (for the torrent) trackers and they automatically get added to the swarm.
The real issue with torrents is that there is no method for federating private trackers.
Public torrents are already federated, no? You can publish a torrent with a single public tracker and when you check back two years later, the torrent is indexed by ~10+ public trackers.
Thanks for sharing!
I did not know rockbox was still around.
I remember writing a review of running Rockbox on my HDD based iRiver MP3 player for a tech site when I was a teen.
It was a great system for its time.
A novel approach indeed.
The article mentions something called Windows Fibers; first time I heard about this. They go to explain what it is:
Windows fibers: The malware leverages Windows fibers, an obscure mechanism for implementing user-mode multitasking, to evade detection, as some EDRs may not monitor or track them.
I stand corrected. Thanks!
While I think this is cool, I didn’t really see any explanation of what their products will be. Retro computers for gaming? A new Amiga computer? A Linux derived platform running on their own hardware?