Cat calling rule
crossposted from: lemmy.blahaj.zone/post/2970203…
transcription: disembodies hand: "pspsps" buff catgirl: "the fuck you say punk!"
copymyjalopy likes this.
Extremists use gaming platforms to recruit - study
The study shows that gaming-adjacent platforms, which allow users to chat and live stream while playing, are being used as “digital playgrounds” for extremist activity and that video game players are being deliberately “funnelled” by extremists from mainstream social media platforms to these sites, in part because of the challenges faced in moderating them.
Extremists use gaming platforms to recruit - study - ARU
New research reveals how harmful content is evading detection on popular siteswww.aru.ac.uk
La mia Estate.
L’estate di Snow.
L’estate, per Snow, non è mai solo una stagione. È un momento sospeso, fatto di sole che filtra dalla finestra, di voci lontane che parlano di mare e di sabbia, di un silenzio interrotto dal ronzio dei computer. Da tempo Snow vive la vita in carrozzina, dopo l’asportazione di un tumore al cervelletto. Un cambiamento radicale, di quelli che ribaltano tutto, lasciando cicatrici non solo nel corpo ma anche nei pensieri.
Muoversi, viaggiare, fare le cose “semplici” non è più come prima. Ma Snow ha trovato un modo per restare in movimento, per sentirsi vivo e utile: Linux e il Fediverso. Non sono solo passioni, sono una valvola di sfogo, un terreno dove le limitazioni fisiche non contano, dove la mente può correre veloce e le mani, anche se più lente, sanno ancora creare, curare, aggiustare.
C’è Snowfan, la sua comunità, i suoi amici digitali. Prendersene cura significa sentirsi necessario, dare qualcosa a qualcuno, costruire relazioni e offrire supporto. Perché nella vita reale, con una carrozzina che pesa e giorni in cui ogni gesto richiede fatica, sentirsi utile non è semplice. Ma dietro lo schermo, Snow non è un peso per nessuno: è un punto di riferimento.
La famiglia è la sua priorità. Snow vuole che vadano al mare, che escano, che vivano. Non vuole trattenerli, non vuole che la sua presenza diventi un freno. Vuole solo essere lì, nel modo in cui può esserlo meglio: facendo quello che sa fare, dedicandosi al Fediverso, a Linux, alle piccole e grandi cose che scorrono nei suoi server.
E così, l’estate di Snow non è mai vuota. È un’estate di bit e di connessioni, di amicizie digitali che sanno essere vere, di onde che forse non tocca con mano ma che sente comunque vicine.
Max su Poliverso 🇪🇺🇮🇹 likes this.
reshared this
Pirate IPTV Operator Destroys Evidence Then Agrees to Pay Sky €580,000 * TorrentFreak
Pirate IPTV Operator Destroys Evidence Then Agrees to Pay Sky €580,000 * TorrentFreak
A man Sky describes as a "top level" pirate has agreed to pay the broadcaster €480,000 in damages following a rather eventful investigation.Andy Maxwell (TF Publishing)
like this
South Dakota election office publishes voter list labeling thousands as public assistance applicants: Information is included in newly required free version of statewide registration spreadsheet
Thousands of South Dakotans have been publicly labeled as applicants for government assistance and thousands more have had their email address and phone number exposed, due to a new state law and the way the state’s election office is implementing it.Although the legislation creating the law received some Democratic votes, it’s a product of the Republican-dominated Legislature. Republican Gov. Larry Rhoden signed it into law and Republican Secretary of State Monae Johnson is carrying out its provisions.
Several legislators, both Democrats and Republicans, are now telling South Dakota Searchlight they did not intend for the law to expose sensitive information — especially the identity of public assistance applicants.
“This is what happens when you put the wrong people in charge,” said state House Minority Leader Erin Healy, D-Sioux Falls, who voted against the bill. “We talk a lot about freedom and privacy in this state, so it’s a shame that this legislation led to this type of breach.”
adhocfungus likes this.
Florida prison data breach exposes visitors’ contact information to inmates: Department of Corrections has not communicated anything to those whose info was revealed to inmates.
Dozens and perhaps hundreds of individuals who applied to visit inmates at Everglades Correctional Institution (ECI) in Miami-Dade County last weekend had their personal contact information shared with every inmate at that facility, according to five different individuals who have spoken to the Phoenix over the past four days.The Florida Department of Corrections has not commented publicly about the incident since it occurred last week.
That data breach has frightened and infuriated some of the women who had their names, email addresses, and telephone numbers released to those incarcerated at the prison located near the Florida Everglades.
Inmates received that information via an email sent out by a staff member of the facility on Thursday. Florida inmates have access to emails through both interactive kiosks as well as secure tablets.
“It’s kind of disturbing when you think about it,” said Madeline Donate, who regularly visits her husband at the prison. “The privacy aspect of this is concerning. This is how other inmates get information and can sometimes extort family members and things like that. It’s concerning.”
Jan Thompson said she fears extortion.
“What if there’s some inmate that doesn’t like another inmate?” she said. “And he tells his family, ‘Okay, here’s his wife’s phone number. Call her and tell her if she doesn’t pay and put $500 on my book, I’m going to have her husband stabbed and killed.’ What’s stopping them from doing that?”
(Inmates can receive funds for deposit into their “inmate trust accounts” from individuals already identified on the inmate’s automated visiting record).
“I’m very worried. This is not okay,” added a woman who wanted to be identified only as Dakota, her middle name. “Someone needs to be held accountable for this. They need to take the necessary precautions to ensure that this does not happen. And what about this information that’s out there? There’s what, 1,600 [inmates] there? They all have information. God knows what they could do with it.”
Is making hard to get files more accessible always good practice (example in post body)?
Piracy in Germany often uses direct downloads via one click hosters(you get an url and download from there, people use services like rapidgator.net). These often get hit with copy right strikes and are slow to unusable for free users. Would downloading for example a TV show via this route and then creating a public torrent "good piracy"? (If anyone has a guide on how to create a torrent, pls share)
Reasons why I think it might be not so good:
- the groups/people need a motivation to provide the content. Distributing it without their consent might reduce their motivation. They also probably paid for some subscription to get the content
- in german context direct download links are often considered safer for people who just want to download, torrenting done wrong can get you pretty high legal fees (500+ €)
- it feels like stealing somebody elses effort
Why I think about doing it:
- this gives people another way to get the content
- torrents are free to use and way faster than those one click hosters (which often give you less than 100kB/s)
- the uploader usually profits via affiliate programs, so when someone buys a premium subscription of a one click hoster, they get a share. I think piracy shouldnt be done for profit
- people (especially outside germany) might have it easier to access torrents instead oneclick hoster solutions
- torrents have no captchas lol
like this
Archive everything. A torrent isn’t perfect but it is far more resilient than a shitty site like rapidgator or mega. If all the seeds drop off they may hop back on someday, if the link is dmcad or otherwise deleted it’s gone forever.
Fuck their e-cred. It’s all stolen. The only time you don’t spread something around is when someone posts something special to a private community to only be shared within that community because leaking it outside of that community could cause them grief or even serious consequences (eg someone leaking content to a private tracker community that they fear could be traced back to them so they specifically ask to keep it within x community). Though tbh I’ve seen this happen at least 4-5x over the years and it always leaks out to the wider internet, people will always share (as they should)
like this
Even then. My general experience is that all of those "please don't share this outside of our private tracker" style stuff is the same crap as everywhere else: They just want to feel special or encourage people to pay for ultra premium and so forth.
As for the actual truly sensitive stuff: If you are posting that to a "community" you are already the equivalent of a War Thunder player. And, quite frankly, there is zero reason that stuff like that should only be shared with a select few randos. Either it is evil shit (at which point I hope they DO get caught) or it is something that should be given to responsible journalists to share to the world at large.
like this
Piracy in Germany often uses direct downloads
Just in case someone doesn't know why that's the case: Torrenting is still used less then in the rest of the world, because of the unique legal situation. There are big law firms specializing in tracking IP addresses and real identities of torrent users and sending very costly cease and desist letters, even for just torrenting a single movie. I'm sure, people who know what they are doing can find ways to torrent safely. But for everyone who's just come to Germany, it's important to check their online habits and make sure you're still safe.
Concerning morality: What's the worst case? Imagine file sharing actually completely kills the movie, music, gaming and software industry (it won't). All that'd be left would be paying creators in advance to make content people actually want to see and use. As well as collaborative open source projects. All the best stuff comes from those anyway.
Waldorf Frommer Warning Letter: What to Do, How to Respond & How to Protect Yourself | Medium
Learn from my experience of dealing with a Waldorf Frommer Legal Letter in Germany for allegedly torrenting movies illegally. How to reduce your fine.BROWZR (Medium)
Consigli da Coach
China claims Nvidia built backdoor into H20 chip designed for Chinese market
China’s cyber regulator on Thursday said it had held a meeting with Nvidia over what it called “serious security issues” with the company’s artificial intelligence chips.
It said US AI experts had “revealed that Nvidia’s computing chips have location tracking and can remotely shut down the technology.”
The Cyberspace Administration of China requested that Nvidia explain the security problems associated with the H20 chip, which was designed for the Chinese market to comply with US export restrictions, and submit documentation to support their case. The announcement comes as Nvidia is rebuilding its China business after Washington this month lifted a ban on H20 sales to the country.
China claims Nvidia built backdoor into H20 chip designed for Chinese market
US semiconductor giant is trying to revive sales in the country.Financial Times (Ars Technica)
like this
Technology reshared this.
It might be China trying to force their own companies to use Chinese hardware. I heavily doubt that it would include a GPS chip. At most some way to guess the location by combining many different types of information such as nearby routers /WiFi networks etc.
There are crafty ways to guess a location without GPS. Though I have no idea what this one would entail if at all true.
Stefan Sarazin, Peter Keller – „Nicht ganz koscher – No Name Restaurant“ (2022)
Vielleicht beginnt Verständigung manchmal nicht mit einem Dialog, sondern mit einem Irrtum. So jedenfalls verheddern sich Ben und Adel, ein ultraorthodoxer Israeli und ein palästinensischer Beduine, mitten in der Negev-Wüste ineinander – an einem Ort, an dem es weder GPS noch ein Drehbuch für den Frieden gibt. Der eine will nach Alexandria, der andere nur weg, doch das Kino will, dass sie zusammenbleiben. Und manchmal gewinnt eben das Kino. (ARD)
Stefan Sarazin, Peter Keller - "Nicht ganz koscher – No Name Restaurant" (2022)
Vielleicht beginnt Verständigung manchmal nicht mit einem Dialog, sondern mit einem Irrtum. So jedenfalls verheddern sich Ben und Adel, ein ultraorthodoxer Israeli und ein palästinensischer Beduine, mitten in der Negev-Wüste ineinander – an einem Ort…NexxtPress
Tonno Vegan fatto con i piselli... Si chiama Vuna! 🐟
Buongiorno :blush:
Ecco qui il Vuna ormai presente in quasi tutti i supermercati d'Italia:
Fatto con pochissimi ingredienti tra cui i piselli per dargli la stessa consistenza del pesce e insaporitori naturali per riprodurre il sapore. A me piace più del tonno ahah anche perché è assente da antibiotici e sfruttamento come i tonni di allevamento che si comprano in scatoletta o "freschi" al banco (poverini)...
Lato negativo è il prezzo che per me è esagerato ma sono uscite altre 2-3 marche con prezzi paragonabili al tonno di qualità e poi che è un prodotto Nestlé e cioè di un'azienda fortesemente discutibile e che l'etica non sa' neanche come si scrive...
Per il resto è un prodotto assai innovativo e che se non si sa' che non è vegan l'unica cosa di cui ci si accorge è che è buono ahah :grinning:
L'avete provato?
#Vuna #Nestlé #tonno #vegan #pesce #fish #sea #mare #ocean #oceano #sostenibilità #sustainability #tuna #Citiverse #VeganCity
antonej likes this.
Re: Tonno Vegan fatto con i piselli... Si chiama Vuna! 🐟
Re: Tonno Vegan fatto con i piselli... Si chiama Vuna! 🐟
Shivablue ciao 🙂
Strano per la consistenza, con chiunque ho parlato mi ha detto che in tutto e per tutto era meglio del tonno 😀🙏
Ecce Datura, la capsula spinosa che contiene i semi del babelico delirio e del caos - Il blog di Jacopo Ranieri
Ecce Datura, la capsula spinosa che contiene i semi del babelico delirio e del caos - Il blog di Jacopo Ranieri
Difficile fu sempre la profonda aspirazione, dei cosiddetti imperi di epoca moderna e contemporanea, a governare su ampi territori da una capitale posta all’altro capo di oceani, vasti continenti, insuperabili catene.Jacopo (Il blog di Jacopo Ranieri)
UEA ŝanĝos statuton sed ne havas strategion
Kvar landaj asocioj de UEA riskas eksigon, inter tiuj Rusia Esperanto-Unio, konstatis la komitato en vendredo. Plu mankas fina versio de la strategia plano, kiun la nun eliranta prezidanto Duncan Charters nomis grava prioritato en 2020. Nova retejo estu preparita “rapide sed senhaste”.
I made a WordPress Devcontainer Template
cross-posted from: lemmy.ca/post/49042391
I was sick of always fighting with WordPress to get a local set up to develop a plug-in or update the theme for a client, so I made a dev container.As per the README, this supports:
* Automatic database dump import and site URL rename
* Automatic WordPress theme and plug-in loading from .zip, wpackagist or directory
* Mounting of a user-provided uploads directoryIt also means your IDE automatically gets access to a WordPress installation for easy auto complete of WordPress functions and features when writing PHP code.
Theoretically, it can also easily be converted into a normal container if you don't use VSCode by setting up /workspace as a mount. Dev containers are unfortunately a bit broken with JetBrains products, and this container will not launch.
Maxim Therrien / WordPress Dev Container Template · GitLab
Template for WordPress development in a dev containerGitLab
Peak Energy just shipped the US's first grid-scale sodium-ion battery
cross-posted from: lemmy.bestiver.se/post/528970
Comments
Peak Energy just shipped the US’s first grid-scale sodium-ion battery
Peak Energy debuts the US's first grid-scale sodium-ion battery, cutting costs and boosting reliability with passive cooling tech.Michelle Lewis (Electrek)
adhocfungus likes this.
‘Gaza, Gaza, Food and Water! U.S. Israel Stop the Slaughter!’
Mark Satinoff
July 31, 2025
NEW YORK CITY, July 25, 2025 — As part of an International Day of Action, more than 1,000 people rallied in front of the United Nations (UN) headquarters here today to demand “Stop Starving Gaza Now!”The rally, and subsequent march through midtown Manhattan, were organized by the local chapter of the Palestinian Youth Movement (PYM), with the support of many partner organizations. Jewish Voice for Peace (JVP) played an important role as it was asked by PYM to mobilize its members and hold down a picket line prior to the start of the rally.
Protesters were urged to bring pots & pans, noisemakers — and their rage.
Signs and banners were welcome, especially those emphasizing ending the Israeli siege and the starvation of Gaza.
‘Gaza, Gaza, Food and Water! U.S. Israel Stop the Slaughter!’ - World-Outlook
As part of an International Day of Action, more than 1,000 people rallied in front of the United Nations headquarters here on July 25 to demand “Stop Starving Gaza Now!” The rally, and subsequent march through midtown Manhattan, was organized by the …world-outlook.com (World-Outlook)
[GOG] Freedom to Buy Games Bundle (until aug 3)
Sensitive content
like this
Microsoft Used China-Based Engineers to Support Product Recently Hacked by China
SharePoint Exploit: Microsoft Used China-Based Engineers to Maintain the Software
Microsoft announced that Chinese state-sponsored hackers had exploited vulnerabilities in its popular SharePoint software but didn’t mention that it has long used China-based engineers to maintain the product.ProPublica
like this
Tesla ordered by Florida jury to pay $329 million in the 2019 fatal crash of an Autopilot-equipped Model S
A Florida jury on Friday found Tesla liable in the 2019 fatal crash of an Autopilot-equipped Model S, and ordered Elon Musk’s automaker to pay $329 million to the family of a deceased woman and an injured survivor.Jurors in Miami federal court ordered Tesla to pay $129 million in compensatory damages and $200 million in punitive damages to the estate of Naibel Benavides Leon and to her former boyfriend Dillon Angulo.
Lawyers for the plaintiffs said the trial was the first involving the wrongful death of a third party resulting from Autopilot. The plaintiffs had sought $345 million.
Google has sharply reduced its support for nonprofit groups devoted to DEI, in what appears to be another sign that the company is falling in line with President Trump’s anti-DEI crusade.
Google has sharply reduced its support for nonprofit groups devoted to diversity, equity, and inclusion, in what appears to be another sign the company is falling in line with President Trump’s anti-DEI crusade, the Tech Transparency Project (TTP) has found.Google publishes a list of organizations that receive the “most substantial contributions” from the company. In early 2025, Google removed more than 200 groups from the list, its biggest purge in at least five years. The largest category of removals related to diversity, equity, and inclusion (DEI), a concept that has come under sustained attack by the Trump administration. A total of 58 DEI-related groups disappeared from the list.
It is unclear if Google stopped funding these organizations or is simply seeking to hide its support for them. However, either scenario suggests Google is taking further steps to distance itself from DEI programs.
After Trump took office and began rolling back DEI efforts, Google removes references to diversity, equity, and inclusion from its annual report filed with the Securities and Exchange Commission and ended diversity-related hiring goals. Like other Big Tech companies and executives, Google donated $1 million to Trump’s inauguration.
Google and most of the groups removed from Google's list did not respond to questions. One of the groups, the ACLU of Illinois, declined to comment and directed questions to Google.
In a statement to CNBC, which covered this report, Google said, “We contribute to hundreds of groups from across the political spectrum that advocate for pro-innovation policies, and those groups change from year to year based on where our contributions will have the most impact.”
TTP identified Google’s disappearing DEI groups while updating its Tech Funding Database. The searchable database, which is linked on TTP’s website, provides information on whether organizations have received funding from Big Tech firms, based on company disclosures. The latest update adds disclosures from 2021 to the most recent available.
Google has dropped more than 50 DEI-related organizations from one of its funding lists
The dropped groups had mission statements that included the words "diversity, "equity," "inclusion," or "race," "activism," and "women."Jennifer Elias (CNBC)
South Dakota election office publishes voter list labeling thousands as public assistance applicants: Information is included in newly required free version of statewide registration spreadsheet
Thousands of South Dakotans have been publicly labeled as applicants for government assistance and thousands more have had their email address and phone number exposed, due to a new state law and the way the state’s election office is implementing it.Although the legislation creating the law received some Democratic votes, it’s a product of the Republican-dominated Legislature. Republican Gov. Larry Rhoden signed it into law and Republican Secretary of State Monae Johnson is carrying out its provisions.
Several legislators, both Democrats and Republicans, are now telling South Dakota Searchlight they did not intend for the law to expose sensitive information — especially the identity of public assistance applicants.
“This is what happens when you put the wrong people in charge,” said state House Minority Leader Erin Healy, D-Sioux Falls, who voted against the bill. “We talk a lot about freedom and privacy in this state, so it’s a shame that this legislation led to this type of breach.”
Freedom to Buy Games Bundle Work-around for Australians and Germans, page 2 - Forum - GOG.com
Download the best games on Windows & Mac. A vast selection of titles, DRM-free, with free goodies, and lots of pure customer love.www.gog.com
Pro-Palestinian protesters arrested outside Chuck Schumer’s office in New York City
Pro-Palestinian protesters arrested at Chuck Schumer’s office in New York City
Demonstrators were banging pots and pans at one of several gatherings that took place across major US citiesMarina Dunbar (The Guardian)
adhocfungus likes this.
Social science researchers use AI to simulate human subjects: LLMs that emulate human speech are being used to cost-effectively test assumptions and run pilot studies
Social science researchers use AI to simulate human subjects
LLMs that emulate human speech are being used to cost-effectively test assumptions and run pilot studies, producing promising early results. But researchers note that human data remains essential.news.stanford.edu
testi scolastici autoprodotti, liberi, gratis e moderni
Testi scritti da volontari, distribuiti a fascicoli per non caricare gli zainetti, pagine singolarmente ristampabili in caso si danneggino o deteriorino, versione epub sulla lavagna luminosa della classe.
#scuola #libri #copyleft
universitarietà sperduta finalmente richiustornata
Non pensavo sarebbe servito (o sarebbe stato possibile?) fare questo post, perché banalmente le mie previsioni prevedevano uno scenario previsto molto più prevedibilmente banale e/o avvilente… e invece la sessione di esami di questa estate alla mia assurdiversità è finita nel modo che nell’universo intero francamente meno pareva possibile. E quindi boh, bona, il bilancio […]
Microsoft announced that Chinese state-sponsored hackers had exploited vulnerabilities in SharePoint, but didn’t mention that it has long used China-based engineers to maintain the product.
SharePoint Exploit: Microsoft Used China-Based Engineers to Maintain the Software
Microsoft announced that Chinese state-sponsored hackers had exploited vulnerabilities in its popular SharePoint software but didn’t mention that it has long used China-based engineers to maintain the product.ProPublica
Comments sorting defaults to New - can I change this?
When you browse a community using 'Active', going to a post defaults to New comments. This is because Active is for finding new comments.
Otherwise, the setting in your profile applies.
Thank you, this cleared everything!
A Piefed FAQ for similar "hidden" logic settings could be useful
Tested: Microsoft Recall can still capture credit cards and passwords, a treasure trove for crooks
Tested: Microsoft Recall can still capture credit cards and passwords, a treasure trove for crooks
exclusive: Our tests have shown there are ways to get around the promised security improvementsAvram Piltch (The Register)
copymyjalopy likes this.
$10 billion, 10 year US Army contract elevates Palantir to defense contracting royalty
U.S. Army Awards Enterprise Service Agreement to Enhance Military Readiness and Drive Operational Efficiency
WASHINGTON (31 July 2025) – The U.S. Army today awarded Palantir a new Enterprise Agreement that establishes a comprehensive framework for the Army's fu...www.army.mil
X/Twitter criticizes UK Online Safety Act as regulatory overreach threatens free speech
UK’s Online Safety Push Shows What Happens When Oversight Becomes OverreachThe UK’s Online Safety Act began rolling out early 2025, introducing several new mandates, some of which are aimed at protecting children from harmful online content. Included in the Act’s mandates, however, are measures that prevent adults from encountering “illegal” content and steps to ensure age verification that limit adults’ anonymity online.
As a result, the Act’s laudable intentions are at risk of being overshadowed by the breadth of its regulatory reach. Without a more balanced, collaborative approach, free speech will suffer.
To date, regulators have taken a heavy-handed approach by rapidly increasing enforcement resources, adding layers of bureaucratic oversight and signaling an aggressive approach to ensuring compliance. Instead of specifically and collaboratively addressing a problem everyone agrees needs to be solved, many are now concerned that a plan ostensibly intended to keep children safe is at risk of seriously infringing on the public’s right to free expression.
This risk is not a surprise to the UK government. When lawmakers approved these measures, they made a conscientious decision to increase censorship in the name of “online safety.” It is fair to ask if UK citizens were equally aware of the trade-off being made.
Recent events indicate the public is not comfortable with this level of intervention. For instance, a petition to repeal the Act is gaining momentum, collecting over 450,000 signatures in just the first few days after it was created.
X is among the companies to have worked hard to be in compliance. However, the timetable for meeting mandatory measures has been unnecessarily tight. And, despite being in compliance, X and its counterparts still face threats of enforcement, fines and rigid oversight, encouraging over-censorship.
Consider as well the emergence of a new "Voluntary” Code of Conduct recently enacted by the UK Home Office and the Violence Prevention Network (VPN) purportedly to address harmful online behaviors before they escalate. Supported by Ofcom, this parallel and duplicative effort was introduced at a time when companies were already pushing hard to meet the requirements in the Online Safety Act.
Government officials responded to questions about additional oversight by saying that the Online Safety Act isn’t “adequate enough to address harmful online behaviors.” This new code of conduct is specifically targeted at social media, gaming, and other interactive platforms to “encourage” proactive enforcement efforts, such as training staff and campaigns to curb “harmful content.”
Because the Voluntary Code of Conduct comes so quickly on the heels of the Act’s enforcement, it inevitably creates a “double compliance” burden. Facing pressure to adopt additional measures on top of the already demanding legal obligations set forth in the Act will only lead to additional curbs to freedom of expression.The UK government doesn't stop there. In addition to increased regulations, a new National Internet Intelligence Investigations team within the British Police will further intensify scrutiny. The team’s sole focus is monitoring social media for signs of unrest, such as anti-immigrant sentiment, to prevent real-world violence. While positioned as a safety measure, it clearly goes far beyond that intent. This move has set off alarm bells for free speech advocates who characterize it as excessive and potentially restrictive.
While everyone agrees protecting children is a critical responsibility, it is also clear that an overly rigorous statutory framework layered with a “voluntary” code and heightened police monitoring, oversteps the intended mission.
To be clear, X is in the business of solutions and we have been vigorously committed to providing a safe and constructive experience for users in the UK and worldwide. A balanced approach is the only way to protect individual liberties, encourage innovation and safeguard children. It’s safe to say that significant changes must take place to achieve these objectives in the UK.
I made a simple graphical SSH connection manager
sshPilot is an ssh connection manager made with GTK and Python.
Here are the features:
- Manage multiple SSH connections
- Open eac h connection in a separate tab
- Both password and SSH key authentication methods are supported
- Automatically detects SSH keys in ~/.ssh/
- Use your desired color theme and font style for the terminal
- Uses secure password storage (GNOME secure password storage)
If you manage multiple remote machines, this might come in handy.
GitHub - mfat/sshpilot: Simple, user-friendly SSH connection manager
Simple, user-friendly SSH connection manager. Contribute to mfat/sshpilot development by creating an account on GitHub.GitHub
reshared this
Are smartphones too big?
How will we overcome this?
TotallynotJessica
in reply to Rozaŭtuno • • •bigboitricky
in reply to TotallynotJessica • • •Rozaŭtuno
in reply to bigboitricky • • •