

It’s more likely the result of automated login attempts because your email is on a leaked list and they forced a password reset on you to protect your account.
It’s more likely the result of automated login attempts because your email is on a leaked list and they forced a password reset on you to protect your account.
Then like something else.
Free as in freedom has always referred to the availability of the source code and the power to make changes to it.
That’s because each tab is sandboxed.
It’s good to be paranoid when it comes to IT security (and software development). 👍
Listen.
Don’t expose any port to any service if you don’t need it.
If you do, make sure it’s as secure as you can reasonably make it.
I’m not disagreeing.
Sure, don’t open ports you don’t need. I said in a different here that I reject all expect IP ranges I’m in for home, mobile and work. That works for me. That blocks the vast majority of the world.
I agree with the other guy that I’m not a target for these vulnerabilities. They are rare and hard to exploit, and valuable. But the basic advice you give is good, obviously.
Don’t expose what you don’t need to expose. Still I have Immich and all of my photos on there. Good luck scamming me with threats of sending them to my family and work. 😀
Ah, now I remember. It took a quick configuration change to mitigate this. Still, I’d call this very rare.
I’m going side with @drkt@scribe.disroot.org on this one.
Well, those won’t typically have ssh exposed on them. But we could argue what is more risky to have exposed, ssh or http. Any publicly available server could be vulnerable, it’s just very unlikely these days (with up to date software).
I remember that one. Those are pretty rare and usually involve a specific configuration that is often not the default, though, right? When such a vulnerability is found, is it rightly so major news.
I have the firewall of my VPS reject any IP range except the ones I’m on frequently, that is mobile, home and work. Sucks when you travel, but otherwise works alright.
Still exposes ports to some people on the same mobile or home internet service networks…
Not saved as Markdown files, but in a database. I prefer editing my own files when I need to. I prefer Silverbullet.
This is not necessarily true. Many models have been trained on assembly code, and you can ask them to produce it. Some mad lad created some scripts a while ago to let AI “compile” to assembly and create an executable. It sometimes worked for simple “Hello, world” type stuff, which is hilarious.
But I guess it is easier for a large language model to produce working code for a higher level programming language, where concepts and functions are more defined in the body that it used to get trained.
This is a KDE community. I would expect discussing desktop environments would be on topic here, including comparing them to others. Starting a political discussion here would be off topic.
Alright dude. If that’s the way you think it should be. I think your tone is off, not the other way round.
Sorry.
Because that’s totally same thing as a desktop environment?
Oh come on. He’s just stating his preference.
Does it do gym workouts like Hevy? I can’t tell from the description and screenshots. I think this is the area that is missing most in selfhosted apps.
Ticketmaster database with credit card information got hacked years ago. I got an email confirming it and got a credit card transaction for about 1000 euros. Got a bit to explain and convince the credit card company, but they reversed it and blocked the card.
As for your case, just use very strong and unique passwords in a password manager like KeePass and you’ll be fine. It won’t hurt to rotate your password now, though.