Skip to content

Trump social media site brought down by Iran hackers

Technology
174 112 739
  • Compact but Capable: Oiwa Garage’s Custom Honda Acty Projects

    Technology technology
    1
    2
    2 Stimmen
    1 Beiträge
    10 Aufrufe
    Niemand hat geantwortet
  • 47 Stimmen
    4 Beiträge
    21 Aufrufe
    T
    Very interesting paper, and grade A irony to begin the title with “delving” while finding that “delve” is one of the top excess words/markers of LLM writing. Moreover, the authors highlight a few excerpts that “illustrate the LLM-style flowery language” including By meticulously delving into the intricate web connecting […] and […], this comprehensive chapter takes a deep dive into their involvement as significant risk factors for […]. …and then they clearly intentionally conclude the discussion section thus We hope that future work will meticulously delve into tracking LLM usage more accurately and assess which policy changes are crucial to tackle the intricate challenges posed by the rise of LLMs in scientific publishing. Great work.
  • 129 Stimmen
    22 Beiträge
    110 Aufrufe
    N
    I can’t believe he knows anybody like that. You think you know somebody…
  • Sierpinski triangle programs by 5 AI models

    Technology technology
    7
    1
    15 Stimmen
    7 Beiträge
    42 Aufrufe
    M
    oh, wow! that's so cool!
  • Tough, Tiny, and Totally Repairable: Inside the Framework 12

    Technology technology
    109
    1
    548 Stimmen
    109 Beiträge
    448 Aufrufe
    P
    What? No, the framework 12 is the thing the had before the 13 one. Nowadays, they call that model always 13 it seems. I think you're confusing something, I've got mine since a few years now.
  • Building a slow web

    Technology technology
    37
    1
    175 Stimmen
    37 Beiträge
    195 Aufrufe
    I
    Realistically, you don't need security, NAT alone is enough since the packets have nowhere to go without port forwarding. But IF you really want to build front end security here is my plan. ISP bridge -> WAN port of openwrt capable router with DSA supported switch (that is almost all of them) Set all ports of the switch to VLAN mirroring mode bridge WAN and LAN sides Fail2Ban IP block list in the bridge LAN PORT 1 toward -> OpenWRT running inside Proxmox LXC (NAT lives here) -> top of rack switch LAN PORT 2 toward -> Snort IDS LAN PORT 3 toward -> combined honeypot and traffic analyzer Port 2&3 detect malicious internet hosts and add them to the block list (and then multiple other openwrt LXCs running many many VPN ports as alternative gateways, I switch LAN host's internet address by changing their default gateway) I run no internal VLAN, all one LAN because convenience is more important than security in my case.
  • 68 Stimmen
    7 Beiträge
    42 Aufrufe
    heythisisnttheymca@lemmy.worldH
    Worked with the US federal government for much of my professional career, mostly in an adversarial role. "reliable federal data sources" do not exist
  • 143 Stimmen
    30 Beiträge
    142 Aufrufe
    johnedwa@sopuli.xyzJ
    You do not need to ask for consent to use functional cookies, only for ones that are used for tracking, which is why you'll still have some cookies left afterwards and why properly coded sites don't break from the rejection. Most websites could strip out all of the 3rd party spyware and by doing so get rid of the popup entirely. They'll never do it because money, obviously, and sometimes instead cripple their site to blackmail you into accepting them.