4
mirrors search? (programming.dev)
submitted 2 months ago* (last edited 2 months ago) by [email protected] to c/[email protected]

Is there a site to search packages for Raspberry OS, like Ubuntu's or Debian's?
The only site i can find is https://www.raspbian.org/RaspbianMirrors which is currently 502ing and may be outdated.

I'd like to search packages and get a list of mirrors.

297
submitted 2 months ago by [email protected] to c/[email protected]
[-] [email protected] 102 points 3 months ago

This is news? What are they doing, throwing juniors into server rooms and expect them to learn through looking at blinking lights?

7
submitted 3 months ago by [email protected] to c/[email protected]
6
submitted 3 months ago by [email protected] to c/[email protected]
33
submitted 3 months ago by [email protected] to c/[email protected]
[-] [email protected] 116 points 4 months ago

Must be a bummer to be the CEO of one of the most privacy-invasive companies in the world and have one's privacy constantly invaded, eh?

1
submitted 4 months ago by [email protected] to c/[email protected]
4
submitted 4 months ago by [email protected] to c/[email protected]

a22-65.akam.ne.

20
submitted 4 months ago by [email protected] to c/[email protected]

According to a DOJ press release, the FBI was able to delete the Chinese-used PlugX malware from “approximately 4,258 U.S.-based computers and networks.”

Details:

To retrieve information from and send commands to the hacked machines, the malware connects to a command-and-control server that is operated by the hacking group. According to the FBI, at least 45,000 IP addresses in the US had back-and-forths with the command-and-control server since September 2023.

It was that very server that allowed the FBI to finally kill this pesky bit of malicious software. First, they tapped the know-how of French intelligence agencies, which had recently discovered a technique for getting PlugX to self-destruct. Then, the FBI gained access to the hackers’ command-and-control server and used it to request all the IP addresses of machines that were actively infected by PlugX. Then it sent a command via the server that causes PlugX to delete itself from its victims’ computers.


The title is a bit blick-batey as it implies the FBI did it directly to said computers.

7
submitted 4 months ago by [email protected] to c/[email protected]

As the title says.
pacman -Q lists only name and version;
pacman -Qi does have a "Packager" field, but i think it's not the same thing;
pacman -Qs seems to be what i want (if local means "all installed packages atm") but it's all prefixed by local/ instead of repo name like mingw32/ which is what i want.

I'm using MSYS2 in windows.

10
submitted 4 months ago by [email protected] to c/[email protected]

cross-posted from: https://programming.dev/post/24130558

My Win10 work laptop has a network share of a remote windows server. I access it everyday. If i change passwords, i have to remap the share.

I have a linux vm that does the builds for my project. It too has a mounted directory mapped to that remote windows share, using my credentials.

I tried mapping the share in another linux vm but got errors so ended up quitting as it wasn't that important.

However, now i can't access said share in any device, by name or IP address. WTF happened?

The mount command i use in linux is mount -t cifs -o rw,relatime,vers=default,cache=strict,username=my.username,domain=,uid=118,noforceuid,gid=130,noforcegid,addr=10.10.10.10,file_mode=0755,dir_mode=0755,soft,nounix,serverino,mapposix,rsize=1048576,wsize=1048576,echo_interval=60,actimeo=1 //10.10.10.10/dir1/dir2 /media/remoteshare, the UID/GID are of the user that runs the builds.

I'd get having errors on mounting the remote share, but i'd expect that to be limited to the local computer i was trying to mount on, not that it would propagate to any device that has this share mapped!

6
submitted 4 months ago by [email protected] to c/[email protected]

My Win10 work laptop has a network share of a remote windows server. I access it everyday. If i change passwords, i have to remap the share.

I have a linux vm that does the builds for my project. It too has a mounted directory mapped to that remote windows share, using my credentials.

I tried mapping the share in another linux vm but got errors so ended up quitting as it wasn't that important.

However, now i can't access said share in any device, by name or IP address. WTF happened?

The mount command i use in linux is mount -t cifs -o rw,relatime,vers=default,cache=strict,username=my.username,domain=,uid=118,noforceuid,gid=130,noforcegid,addr=10.10.10.10,file_mode=0755,dir_mode=0755,soft,nounix,serverino,mapposix,rsize=1048576,wsize=1048576,echo_interval=60,actimeo=1 //10.10.10.10/dir1/dir2 /media/remoteshare, the UID/GID are of the user that runs the builds.

I'd get having errors on mounting the remote share, but i'd expect that to be limited to the local computer i was trying to mount on, not that it would propagate to any device that has this share mapped!

634
submitted 4 months ago by [email protected] to c/[email protected]

...surprising no one...

[-] [email protected] 187 points 7 months ago* (last edited 7 months ago)

Surprised Pikachu face...

IS-33e was the second satellite to be launched as part of Boeing's "next generation" EpicNG platform. The first, dubbed IS-29e, failed due to a propulsion system fuel leak.

I see a pattern.

[-] [email protected] 159 points 7 months ago

Technical debt is the number one cause of developer frustration. Working with imperfect systems demoralizes programmers, making it difficult to do quality work.

I'd wager not being given time to tackle technical debt is indeed frustating...

[-] [email protected] 85 points 8 months ago

So the EU's been forcing Apple to allow sideloading and Google goes Nah, it'll be fine?

[-] [email protected] 92 points 9 months ago

Anglos can't help sexualizing nudity.

[-] [email protected] 93 points 10 months ago

decades of IT experience

Do any changes - especially upgrades - on local test environments before applying them in production?

The scary bit is what most in the industry already know: critical systems are held on with duct tape and maintained by juniors 'cos they're the cheapest Big Money can find. And even if not, There's no time. or It's too expensive. are probably the most common answers a PowerPoint manager will give to a serious technical issue being raised.

The Earth will keep turning.

[-] [email protected] 90 points 10 months ago

Was the driver asleep or something? The car drove quite a bit on the tracks... sure, blame Tesla all you want (and rightly so), but you can't really claim today that the car has "autopilot" unless you're hunting for a lawsuit. So what was the driver doing?

[-] [email protected] 207 points 11 months ago

We must cut all options for the end user to own anything, let'em pay subscriptions instead.

In a SONY board meeting, probably.

[-] [email protected] 129 points 11 months ago

The vast majority of projects on GitHub is open-source and forkable, why would that need authorization?

It's... suspicious that China's doing it en masse, but there's nothing wrong in cloning or forking a repo last i heard.

view more: next ›

0x0

0 post score
0 comment score
joined 2 years ago