

Authorities in Les Sables d’Olonne, located in the Vendée region on France’s Atlantic coast
Authorities in Les Sables d’Olonne, located in the Vendée region on France’s Atlantic coast
I hope it’s a 3D open world action RPG, you know, just for a laugh.
Explain to your boss that it’s slowing down your work to have to take these calls. If your boss is fine with that, get in writing, ie. over email so you can’t be blamed for low productivity later. Now it’s not your problem.
If your boss isn’t fine with it impacting your work then get permission to decline these calls with “sorry I’m busy with my own work, please put something in my calendar.” Use your busy/available status in your calendar to manage when they can schedule these calls.
Have you ever experienced any kind of rate limiting or lock-out based on how fast and how much you are downloading?
Were you reminded of this after seeing I Saved a PNG Image To A Bird by Benn Jordan?
You’re welcome. I’ve been using Linux for 26 years and had never heard of (or at least didn’t remember hearing of) MPD, so it’s not just new users. We all feel a different part of the elephant.
What is MPD?
MPD (Music Player Daemon) is a server-client audio player long popular with Linux users. The headless daemon runs as a background service, typically on a remote audio server. Music is then accessed via a GUI client frontend, which connects to the MPD server to stream content.
Kind of like running your bespoke, curated music streaming service, in a sense.
They found a way to inject text into a google email notification (by setting the name of their google workspace account to the phishing message), and then set up a mail forwarding service to redirect the notification to the victim accounts. That way the victims receive a legit email from google but the text of the email is attacker-controlled and can point the victim to their phishing site.
It’s not really a vulnerability in DKIM. The bug is in google’s use of attacker-controlled text fields in their notification emails.
I can’t find any videos with examples of the kinds of effects that this software can produce. They have a youtube channel but it has no content.
Capitalism.
Fund forgejo and Codeberg.
If you don’t use an ad-blocker then advertisers on every site that you visit can connect your identity to your use of that website.
TD?
Thank you
There must be a better news source reporting this than the fucking Sun.
Is it because the 1s get stuck in the bends in the pipe, but the nice round 0s can get around the corners more easily?
“no file size limit” sounds like a challenge…
The supported hardware/targets with Debian 13.0 on RISC-V include the SiFive HiFive Unleashed, SiFive HiFive Unmatched, Microchip Polarfire, and the VisionFive 2 and other JH7110 SoC platforms. Plus QEMU can work with Debian RISC-V as an emulated/VM target. Other RISC-V single board computers may work fine with Debian 13.0 if resorting to using their vendor kernels. Support for additional boards in the future may come to Debian 13 via Trixie-Backports.
Yeah I would just retract my contribution right there.
please share