

Also there in Passin’ Me By by The Pharcyde (1992)
When I try or make some sort of attempt, I simp
Damn, I wish I wasn’t such a wimp
InfoSec Person | Alt-Account#2
Also there in Passin’ Me By by The Pharcyde (1992)
When I try or make some sort of attempt, I simp
Damn, I wish I wasn’t such a wimp
Not exactly what you asked, but do you know about ufw-blocklist?
I’ve been using this on my multiple VPSes for some time now and the number of fail2ban failed/banned has gone down like crazy. Previously, I had 20k failed attempts after a few months and 30-50 currently-banned IPs at all times; now it’s less than 1k failed after a year and maybe 3-ish banned at any time.
There was also that paid service where users share their spammy IP address attempts with a centralized network, which does some dynamic intelligence monitoring. I forgot the name and search these days isn’t great. Something to do with “Sense”? It was paid, but well recommended as far as I remember.
Edit: seems like the keyword is " threat intelligence platform"
PR Videos to save you a click:
Thanks loads! It’s pretty sick and now is my lock screen wallpaper ;D
These are gorgeous! If it’s okay with you, may I use this as my wallpaper?
https://metapixl.com/p/Stoy/797940603119447726
If yes, is there a high res image? Thanks!
Someone asked the same question on a cross-post: https://lemmy.world/comment/14943883
Tl;Dr is the recent rust drama.
More info: https://www.phoronix.com/news/Asahi-Linux-Lead-No-Upstream
My personal website is made using Hugo, sitting behind Caddy, and hosted on Racknerd. I see elsewhere in the thread that you’re looking for something akin to a $5/month VPS, but racknerd is MUCH cheaper for much more vCPU + vRAM (older hardware, but that’s not a deal breaker for hosting a static website).
I used to do $6/Month on Digital Ocean for 1 vCPU + 1GB vRAM + 1TB bandwidth, but now I’m somewhere like $3/Month for 2 vCPU + 2.5GB vRAM + 5TB bandwidth [1]. In fact, I paid $6 extra to have the server in France. Otherwise it’s $30 a year.
Check out racknerd tracker [2]. I found out about it through lemmy many months ago [3]. The person who made the website gets some affiliate stuff.
[1] https://racknerdtracker.com/?product=211%2F25gb-kvm-vps
I’m unsure whether your formatting messed up, but you shouldn’t have a space between the shebang (#!
) and the interpreter path (/bin/bash
). Also add a new line before your command:
#!/bin/bash
gnome-terminal -- sh -c gotop
I tried this on my system (with htop instead of gotop) and it worked.
https://en.m.wikipedia.org/wiki/File:QR_Code_Structure_Example_3.svg
https://en.m.wikipedia.org/wiki/QR_code
OP is talking about the alternating pattern between the two straw papers. In the SVG from Wikipedia, this corresponds to the “timing”
I suggest using two different spellings:
Mold is the fungus.
To mould is to shape.
Nvm I’m an idiot. Lol
That seems to be the consensus online. But thanks for that tidbit! It feels even more bizarre now knowing that.
I wonder why a handful of people think the way I presented in the post. Perhaps American/British influences in certain places? Reading books by british authors and books by american authors at the same time? Feels unlikely.
Yes, this would essentially be a detecting mechanism for local instances. However, a network trained on all available federated data could still yield favorable results. You may just end up not needing IP Addresses and emails. Just upvotes / downvotes across a set of existing comments would even help.
The important point is figuring out all possible data you can extract and feed it to a “ML” black box. The black box can deal with things by itself.
My bachelor’s thesis was about comment amplifying/deamplifying on reddit using Graph Neural Networks (PyTorch-Geometric).
Essentially: there used to be commenters who would constantly agree / disagree with a particular sentiment, and these would be used to amplify / deamplify opinions, respectively. Using a set of metrics [1], I fed it into a Graph Neural Network (GNN) and it produced reasonably well results back in the day. Since Pytorch-Geomteric has been out, there’s been numerous advancements to GNN research as a whole, and I suspect it would be significantly more developed now.
Since upvotes are known to the instance administrator (for brevity, not getting into the fediverse aspect of this), and since their email addresses are known too, I believe that these two pieces of information can be accounted for in order to detect patterns. This would lead to much better results.
In the beginning, such a solution needs to look for patterns first and these patterns need to be flagged as true (bots) or false (users) by the instance administrator - maybe 200 manual flaggings. Afterwards, the GNN could possibly decide to act based on confidence of previous pattern matching.
This may be an interesting bachelor’s / master’s thesis (or a side project in general) for anyone looking for one. Of course, there’s a lot of nuances I’ve missed. Plus, I haven’t kept up with GNNs in a very long time, so that should be accounted for too.
Edit: perhaps IP addresses could be used too? That’s one way reddit would detect vote manipulation.
[1] account age, comment time, comment time difference with parent comment, sentiment agreement/disgareement with parent commenters, number of child comments after an hour, post karma, comment karma, number of comments, number of subreddits participated in, number of posts, and more I can’t remember.
Ah if you messed it up, you can press “e” on the grub entry and edit the command line parameters to remove the thing that messes it up. Good luck with your fresh install [and use Debian this time… jk :)]
Make sure to update your grub after you do. I’ve messed that one up before lol 😅
Do you not need the nvidia-drm.modeset=1
in GRUB_CMDLINE_LINUX
?
https://www.if-not-true-then-false.com/2015/fedora-nvidia-guide/#262-edit-etcdefaultgrub
Could you show us the kernel command line parameters (in /etc/default/grub)? Is the modeset along with other params enabled? I’m not a fedora user, so I may not be of too much help.
This doesn’t always work. For example, I used to (and still do) see a lot of fake websites when I l type revanced (https://revanced.app/) on duckduckgo, and I’ve nearly fallen for two of the fake ones before (I think two of .com / .org / .to…?)
Thankfully ublock origin warns users of this:
Otherwise, I’d have 100% downloaded some malware-loaded crap.