fraksken

joined 1 year ago
[–] fraksken@infosec.pub 7 points 1 day ago

Here come the lists ...

[–] fraksken@infosec.pub 1 points 5 days ago

That was their second reaction to it as well. They are well behaved though. Once we made clear it was not for mauling and destroying, they seem to be fine.

Still hiding them at night ...

 

Bought some sheep skin for the cats. They both enjoy it very much. I just need to mind them not tearing it apart ...

[–] fraksken@infosec.pub 6 points 6 days ago (3 children)

18°c is uncalled for though? Above 12 should be fine

[–] fraksken@infosec.pub 29 points 6 days ago (1 children)

I hope the foundation of your house is deeper than that.

[–] fraksken@infosec.pub 2 points 1 week ago
[–] fraksken@infosec.pub 2 points 1 week ago (1 children)

This is not the first time you have contemplated this, now have you?

[–] fraksken@infosec.pub 1 points 1 week ago

I suspect a printable finger extender will be available soon.

[–] fraksken@infosec.pub 3 points 1 week ago (3 children)

The ~~best~~ most effective kind of spanking is a crowded spanking. Really drives the point.

[–] fraksken@infosec.pub 5 points 1 week ago

The response is very clear. Anoyhet user is tunning a process which blocks unelevated shutdown. You can override it with the command privided in the response. Like mentioned in a peer comment, sudo shutdown now would resuly in the immediate shutdown of the system, ignoring any interrupts. If anything else fails, interrupt power. It should start fine.

It could be a process you are running under a different user (safe), which demands you to shut it down cleanly.

Linux provides the mechanics to prevent the problem you're angry about.

[–] fraksken@infosec.pub 23 points 1 week ago (8 children)

Spitroasting is not quite bdsm, as fun as it might be...

[–] fraksken@infosec.pub 20 points 1 week ago (1 children)

Fetish shaming is not ok.

 

On quite a few news websites there's a new hot topic how the Australian "Ghost" app got hacked by Interpol and has led to prevention of murders and resulted in a few arrests.

Is there any information out there on what security methods Ghost used and how it was exploited?

 

Just wanted to reach out to mention I think the linked page may be missing an opening ( in the image example: ![Lemmy from Motörhead]https://upload.wikimedia.org/wikipedia/commons/8/84/Lemmy-02.jpg)

great documentation by the way!

view more: next ›