Skip Navigation

Posts
0
Comments
67
Joined
9 mo. ago

The revolution will not be televised. 🏴

  • Is it worth it?

  • Or at least streamline "forget": dismember

  • Embrace the ban. Never look back.

  • That wouldn't be too bad. There could be a new permission for precise time.

  • Kebabius?

  • In my experience this can be beneficial when committing and rebasing small and distinct changes.

  • Obfuscated JS.

  • How do you handle offline access, for example when using a Laptop? Syncthing seems to be an option.

  • Use a separate home partition to decouple the system from your user data. Easier to snapshot and to replace the system.

  • Yes, by default windows launches UAC prompts in the supposedly isolated "secure desktop" instead of the classical "interactive user desktop".

  • It is not necessary for the attack and was used to illustrate the vulnerable app manifest configuration.

  • I found Kanboard to be useful for managing my projects tasks. There is also a Gantt plugin that can be used to schedule tasks with an ergonomic UI.

  • Enigma balls

  • Element Desktop has profiles. But sadly there are no profiles on the mobile app.

  • You're right to be reluctant to apply everything by hand. K3s has a built-in feature that watches a directory and applies the manifests automatically: https://docs.k3s.io/installation/packaged-components

    This can be used to install Helm charts in a declarative way as well: https://docs.k3s.io/helm

    If you want to keep your solution agnostic to the kubernetes environment, I would recommend that you try ArgoCD (or FluxCD, but I never tried it so YMMV).

  • NSFW Deleted

    Permanently Deleted

    Jump
  • You could try to dump the EEPROM and get a hold of the user password or override it by reprogramming it.