markstos

joined 2 years ago
[–] markstos@lemmy.world 7 points 1 day ago

Must be completely unrelated.

[–] markstos@lemmy.world 12 points 1 day ago (3 children)

In 2004, Munich, Germany led the creation of LiMux and switched the city to that from Windows.

In 2017 they reverted to Windows.

In 2020 they re-asserted the intent to switch to open source.

What’s old is new again.

[–] markstos@lemmy.world 5 points 1 day ago

MCP sounds like a standardized way for AI clients to connect to data sources, the Model Context Protocol.

https://www.anthropic.com/news/model-context-protocol

It sounds like it may compete some with Google’s A2A protocol, which is for AI agent to agent communication.

Both share the same goal of making services easier for AI to consume.

[–] markstos@lemmy.world 4 points 4 days ago

This was downvoted, but is a good question.

If your account is compromised, the shell init code could be modified to install a keylogger to discover the root password. That’s correct.

Still, that capture doesn’t happen instantly. On a personal server, it could be months until the owner logs in next. On a corporate machines, there may be daily scans for signs of intrusion, malware, etc. Either way, the attacker has been slowed down and there is a chance they won’t succeed in a timeframe that’s useful to them.

It’s perhaps like a locking a bike: with right tool and enough time, a thief can steal the bike. Sometimes slowing them down sufficiently is enough to win.

[–] markstos@lemmy.world 1 points 5 days ago (1 children)

Do you have a source to cite for the literal 99%?

[–] markstos@lemmy.world 0 points 6 days ago* (last edited 6 days ago) (3 children)

The top-rated answer to this question on the Security StackExhange is “not really”. https://security.stackexchange.com/questions/189726/does-it-improve-security-to-use-obscure-port-numbers

On Serverfault, the top answer is that random SSH ports provide “no serious defense” https://serverfault.com/questions/316516/does-changing-default-port-number-actually-increase-security

Or the answer here, highlighting that scanners check a whole range ports and all the pitfalls of changing the port. Concluding: “Often times it is simply easier to just configure your firewall to only allow access to 22 from specific hosts, as opposed to the whole Internet.” https://security.stackexchange.com/questions/32308/should-i-change-the-default-ssh-port-on-linux-servers

[–] markstos@lemmy.world 7 points 1 week ago (10 children)

Using a nonstandard port doesn’t get you much, especially popular nonstandard ports like 2222.

I used that port once and just as much junk traffic and ultimately regretted bothering.

[–] markstos@lemmy.world 2 points 1 week ago

The quotes are specifically about early stage startup founders, not employees of huge established startups corporations.

[–] markstos@lemmy.world 2 points 1 week ago (1 children)

I'm glad to have some competition for the Frost Oven Squoosh, which is being lightly maintained. I opened some issues in the Mazanoke issue tracker for some features to consider.

One feature I started on for that project but got stuck on was implementing a STDIN / STDOUT CLI workflow.

https://github.com/frostoven/Squoosh-with-CLI/issues/10

As I said there, the goal was a workflow where I take a screenshot, annotate it, optimize it, copy it and paste it into my blog... without creating any intermediate temp files.

At least on Linux, all the the steps of the pipeline are solved, except for a CLI image compressor that could accept an image STDIN and produce a compressed image on STDOUT.

[–] markstos@lemmy.world 1 points 1 week ago

Sounds like an oversight. Consider filing a bug with them.

https://github.com/frostoven/Squoosh-with-CLI

[–] markstos@lemmy.world 1 points 1 week ago (2 children)

Nice. I use Squoosh for this, which is also free and runs in the browser.

https://squoosh.frostoven.com/

[–] markstos@lemmy.world 4 points 1 week ago

Https give you encryption in transit. The files you view will be accesible to the host.

Same idea with email.

view more: next ›