Skip to content

Duckstation(one of the most popular PS1 Emulators) dev plans on eventually dropping Linux support due to Linux users, especially Arch Linux users.

Technology
433 192 604
  • How Android phones became an earthquake warning system

    Technology technology
    7
    1
    78 Stimmen
    7 Beiträge
    124 Aufrufe
    G
    Fake news! Everyone knows that "The Gays" are what causes earthquakes, tornados and floods, so just need Grindr! ::: spoiler Spoiler it's sarcasm, in case it's not obvious enough. :::
  • Funny AI Love Calculator - try out it funny.

    Technology technology
    1
    2
    1 Stimmen
    1 Beiträge
    25 Aufrufe
    Niemand hat geantwortet
  • Algorithmic Sabotage Manifesto.

    Technology technology
    19
    1
    25 Stimmen
    19 Beiträge
    211 Aufrufe
    V
    How can you write so many words but say so little.
  • 148 Stimmen
    4 Beiträge
    48 Aufrufe
    czardestructo@lemmy.worldC
    Likely. The coils only job is to ignite the lamp by whacking it with high voltage to strip some barium elections off the coil to induce plasma and therefore electrical flow. The plasma then excites the phosphorus to make light. After that the coils could just be stubs of wire so long as current keeps flowing through the excited plasma. If you did it inductively it would achieve the same means but I don't think the plasma would be as dense so the lamp not as bright. My theory anyways.
  • Electric Bikes

    Technology technology
    1
    2
    0 Stimmen
    1 Beiträge
    16 Aufrufe
    Niemand hat geantwortet
  • 161 Stimmen
    11 Beiträge
    101 Aufrufe
    real_squids@sopuli.xyzR
    Why are you using quotations marks? On a serious note, Google's bloat isn't inherent to android, their stuff is added on top as apps and services.
  • Building a slow web

    Technology technology
    37
    1
    175 Stimmen
    37 Beiträge
    452 Aufrufe
    I
    Realistically, you don't need security, NAT alone is enough since the packets have nowhere to go without port forwarding. But IF you really want to build front end security here is my plan. ISP bridge -> WAN port of openwrt capable router with DSA supported switch (that is almost all of them) Set all ports of the switch to VLAN mirroring mode bridge WAN and LAN sides Fail2Ban IP block list in the bridge LAN PORT 1 toward -> OpenWRT running inside Proxmox LXC (NAT lives here) -> top of rack switch LAN PORT 2 toward -> Snort IDS LAN PORT 3 toward -> combined honeypot and traffic analyzer Port 2&3 detect malicious internet hosts and add them to the block list (and then multiple other openwrt LXCs running many many VPN ports as alternative gateways, I switch LAN host's internet address by changing their default gateway) I run no internal VLAN, all one LAN because convenience is more important than security in my case.
  • 1 Stimmen
    8 Beiträge
    72 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.