Damn. You’ve given me a vision of a future where people call applications that are installed locally and don’t leverage any cloud/server backend for any functionality “self-hosted” programs and I hate it.
Cybersecurity professional with an interest/background in networking. Beginning to delve into binary exploitation and reverse engineering.
Damn. You’ve given me a vision of a future where people call applications that are installed locally and don’t leverage any cloud/server backend for any functionality “self-hosted” programs and I hate it.
It is pretty easy. There’s tons of tutorials and walkthroughs for doing it, but anyone familiar with UIs will be able to work it out pretty quickly I think. Maybe a friction point in using the filter query, but again there’s tons of walkthroughs and guides for using it online.
If you can’t conceptualize a packet, or sockets, or network flows, even with the help of online guides/manuals, I guess it wouldn’t be easy. In that case I’d be wondering why someone would want to use those tools in the first place though, as then they probably wouldn’t have the skills necessary to leverage the information gleaned from the tool in any useful way.
Edit - As we’re in the self-hosted community, I’d argue that anyone who is self-hosting anything would probably be able to easily install wireshark and view http requests, both individual packets and the stream as a whole.
I just installed it out of curiosity. The watchlist is the page that has your up next stuff in the first line, then like new movies added to your movies library, new shows in your tv library, etc. The discover section is what you’re talking about, and it’s still on its own discrete section.
I understand that, but they’re wrong.
That’s still just a cellular modem stuffed in to a much better router though. It’s a cellular connection. Yea, with 5g it’s a ton better than 3g, but it’s a cellular connection, provided to you by a cellular network operator. Cellular network operators are their own thing, regulated by the FCC as their own thing, whether the cellular connection is happening on your phone or on your cellular company provided router, it’s still connecting to the cellular network.
Look. Starlink is a satellite internet provider right? But you understand that no wires are physically connecting the starlink terminal to the starlink satellites right? It’s “wireless”. Starlink is not a WISP, it’s a satellite internet provider. T-Mobile or Verizon or whoever aren’t WISPs, they are cellular network operators. They are separate and distinct things.
Language has meaning, words have meaning. A WISP isn’t just an ISP using technology that doesn’t need a wire to your house, it’s a specific thing. You’re using it wrong.
Edit - I can put a SIM card in my MikroTik right now, then unplug the Ethernet cable that runs to my ONT box, and have unbroken internet access. That doesn’t suddenly make the cellular network provider a WISP, it makes them a cellular network provider. I’m accessing the cellular network. They’re providing me access to the network over cellular. Idk how else to explain this.
Ah, that would make sense.
I never said anything about a microwave cooking food, I said they used microwave radios.
A hotspot is a cellular modem with a wireless lan radio. It is provided by cellular network operators in order to allow the connection of non-cellular network devices to connect to the cellular network, and thus the internet as a whole.
A WISP is not a cellular network operators, a WISP is a Wireless ISP, who provide internet to customers over wireless microwave radios.
The FCC classifies and regulates these operators as distinct entities. I am not splitting hairs, they are different.
Go to WISPAPALOOZA and tell all the WISP people that cellular operators are WISPs lol.
I guarantee you there’s no cellular network operators who are members of WISPA.
That’s not a WISP, just fyi. That’s just a cellular hot spot. Cellular hot spots operate on frequencies in the RF spectrum, the same frequencies that your cell phone connects to.
A WISP is an ISP that serves internet over microwave radios, which operate not in RF frequencies but in microwave frequencies. They might use point to multi point radios, where a radio on a mountain top feeds signal to many smaller radios at each subscribers house in a valley below. They might also have fiber to an apartment building, with fiber to each unit, then use a point to point radio as a wireless backhaul to connect another apartment building across a river that can’t have fiber run directly to it. They’ll still have fiber running to each unit in that second building though.
TLDR; cellular providers are not WISPs.
So I’m familiar with the Fiber to the Cabinet/Curb (FTTC), but the only FVA I’m familiar with is an attenuator and I know you’re not talking about checking light levels through fiber. What’s FVA in this context?
This is very anecdotal, but both myself and the vast majority of my peers use macOS as their base host system. I work in cybersecurity, specifically offensive penetration testing. Myself, most of my coworkers, and probably half of my peers I’m competing against at local conference CTFs or that I know at local meetups are using a MacBook host with VMs spun up to need.
Something like 75% of my job is done in a Linux VM. Doing it on a MacBook is infinitely more pleasant than any other laptop I’ve ever tried using, regardless of what OS it’s running.
Also, and again extremely anecdotal, the most technical people I’ve ever known were all using hackintoshes when I knew them, and would use MacBooks when away from the home/office.
I really don’t understand where this “Mac products are for non-technical people who want to appear technical” trope comes from. MacOS is a phenomenal product for non-technical people. My partner is the least technical person in the world, but they started using macOS in art school and found it intuitive and easy to use. As a technical person, I appreciate the polished UI built on top of the Unix kernel and that I can do everything I need to do from a terminal shell. The fact that the product is excellent for both wildly disparate types of users is testament to how great it is imo.
Holy shit that got spicy. I was not expecting a Ukrainian and a Serb to start bickering back and forth while stacking racks over the level of support a country gave to the Nazis in WW2 on a kernel mailing list like they were in the comments here on Lemmy.
I get that tensions are high, and for many people the geopolitical reality is their homes being used as cover on an active front line, but like bro your actual fucking name is attached to these messages. At least I keep my most unhinged shit on a semi-anonymous platform. They need to lock it the fuck up.
Edit - jfc, a few messages later somebody comes in with something along the lines of “Taiwan isn’t a country, it’s part of China. When reunification comes sanctions won’t be appropriate against Chinese entities.” Is Lemmy just a front end for this mailing list and I had no idea this entire time?
I mean is there a material pronunciation difference between the two conjunctions? I don’t think so, but I can still somehow manage to work out what people mean when they say use “your” and “you’re” in the same spoken sentence.
The non credible defense bucket.
I really don’t think they intended for everyone to buy it. I think they wanted to get it out into devs and enthusiasts hands, and let people who are interested but not!willing to spend that much money demo it in an Apple Store. They gives time for apps to get tested, independent devs time to port their apps over and iron out any bugs, etc.
I feel like the fact that the first one didn’t move even 100k units but they’re still working on a second generation one that will cost less proves that. That’s kind of what everyone’s being saying about this ever since the price was first announced.
Bruh. Obviously. The person said pay off their mortgage, which is distinctly different from making a mortgage payment. Jfc.
Also, the Vision Pro isn’t outrageously expensive, it’s just expensive. It’s not even just Apple. MSI, Asus, Lenovo, Dell, and Acer all have laptops in the $3,000+ range. I don’t really understand what your point is really, there’s tons of shit that I couldn’t afford for the decade I made minimum wage, but that I can afford now that I make much more. I wasn’t mad those things existed when I couldn’t afford them, and I definitely didn’t think they shouldn’t exist just because they were out of my budget.
It’s $3,500. That’s the price of a specced up MacBook Pro. That’s almost half the price of the Pro Display XDR. I mean I didn’t buy one because it is pretty expensive, plus I barely use my Index, but it’s definitely not “pay of your mortgage” level of expensive.
My dude. You are not a serious person. I’m blocking you so I don’t waste my time with you in the future. Enjoy your life I guess.
Wow you found three different articles, all about the same CVE, that the manufacture published a firmware patch for before any public disclosure was made. That’s definitely just as bad as pretending you don’t know about CVEs in your products lol.
You presented one that doesn’t have security vulnerabilities? Here’s yet another CVE out for trendnet: https://nvd.nist.gov/vuln/detail/CVE-2018-19239
Every. Single. Brand. Has. CVEs. I’ve used Mikrotik, I’ve used Cisco, I’ve used Juniper, I’ve used Ubiquiti. I have a trendnet Poe switch in my attic powering some cameras and an AP right now. I have no “problem” with any brand of anything.
I do have a problem with you implying that a company doesn’t take security seriously when they do. I start to think you’re intentionally lying when you lift up trendnet as the model, because they have quite an especially atrocious history of it.
You’re asking how to set up c2 infrastructure. You’re asking this question on a programming community, not a cybersecurity community, which is an odd decision by itself. You have made it abundantly clear that you are not asking this bc you’re trying to start up some red team ae program at your work, you’re doing this to perform illegal activity.
Nobody is going to help you with this. No security professional is going to help you bc it’s completely unethical, and maintaining appropriate ethics is a huge part of maintaining employability in that sector. No one who does this stuff criminally will help you bc you’ve proven to have zero discretion and helping you will probably lead to the feds taking their front door off its hinges. Also you’re competition.
If you don’t know how to do this already, which you obviously don’t, you put in the work to learn this skill set. Once you’ve done that, doing it professionally is much more stable, and has a much better risk vs reward, than doing it illegally.