The revolution will not be televised. 🏴
- 0 Posts
- 9 Comments
ChaosMonkey@lemmy.dbzer0.comto linuxmemes@lemmy.world•You've been formally invited to laugh at me troubleshooting my first issue in Linux.1·24 days agoHow do you handle offline access, for example when using a Laptop? Syncthing seems to be an option.
ChaosMonkey@lemmy.dbzer0.comto linuxmemes@lemmy.world•You've been formally invited to laugh at me troubleshooting my first issue in Linux.5·25 days agoUse a separate home partition to decouple the system from your user data. Easier to snapshot and to replace the system.
ChaosMonkey@lemmy.dbzer0.comto cybersecurity@infosec.pub•Windows User Account Control Bypassed Using Character Editor to Escalate Privileges3·1 month agoYes, by default windows launches UAC prompts in the supposedly isolated “secure desktop” instead of the classical “interactive user desktop”.
ChaosMonkey@lemmy.dbzer0.comto cybersecurity@infosec.pub•Windows User Account Control Bypassed Using Character Editor to Escalate Privileges6·1 month agoIt is not necessary for the attack and was used to illustrate the vulnerable app manifest configuration.
Enigma balls
ChaosMonkey@lemmy.dbzer0.comto Technology@lemmy.world•Giving Up on Element & Matrix.orgEnglish3·2 months agoElement Desktop has profiles. But sadly there are no profiles on the mobile app.
ChaosMonkey@lemmy.dbzer0.comto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Mobilism suspicious comment ?English0·3 months agoAny modded app provided for free by some rabdom uploader is suspicious. You cannot blindly trust any platform. If you care about your privacy and your device’s security you should analyze the app’s content in depth or buy the app (or crack it yourself, but it usually means you need to buy the app first).
Obfuscated JS.