Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)S
Posts
6
Comments
24
Joined
2 yr. ago

  • You know already? Teach me

  • I see, thx

  • You are just learned the price of free.

    said one who immediately propoused me to use a self-hosted model. For free, that is. Whist on lemmy which is a free forum as well.

    Are you an Idiot or what?

  • ChatGPT @lemmy.world

    All the chats for the last month -- gone

  • KDE @lemmy.kde.social

    Can’t create a contact in Merkuro Contacts

  • Arch Linux @lemmy.ml

    How to switch between the black and light themes authomatically?

  • but an attacker isn't obliged to take on all the open ports, he could work with some of them - the ones that may seem the most interesting to him

  • Ok, back to this then:

    If everything reports open then what ports do you focus on first?

    I don't see an issue here. An attacker would be overwhemed with choise and excitement so that he wouldn't be able to decide which port to choose first, get stuck for a several months unable to decide? He'd toss a coin then.

  • My ports are always open for you, my son. And doors, and windows.

  • You can’t pretend-close it and still have that service work.

    indeed, a service on a port would no longer properly work. However, pretending that an open port is closed is possible the same way when pretending that's open

  • No!

  • Do you youself understand what you're talking about?

    then focus on those ports with more expensive/slower scans to find out what is running on those ports.

    What do you mean by "focus on those ports"? What are "more expensive/slower scans"?

    If everything reports open

    not every port gets reported to be open but only some of them

    what ports do you focus on first?

    me? or an attacker? he could work with any ports he wishes

  • how so?

  • it has nothing to do with it. Welcome to the real English

  • Programming @programming.dev

    How could simulating the ports as open be useful?

  • It's got CLI too - alright. But is it any de-facto, mature, well-known, widely used? What gurantees that it's as secure as openssl or gpg? It might have plenty of bugs and vulnerabilies.

    1. backups, non-incremental ones
    2. prevent others from viewing information that may be sensitive
    3. encrypted files and directories will then be copied over to external drives and third-party servers
  • re-read my question carefully

  • "I don’t want to encypt them in-place because I’ll be uploading them onto a server, copying them on an external drive."

  • I don't want to encypt them in-place because I'll be uploading them onto a server, copying them on an external drive.

  • You mean? Or you say?

  • Programming @programming.dev

    Simple and de-facto way to encrypt files and directories in Linux

  • that's why you should be logged out of Google and also delete your cookies periodically :) To reset the memory of Google

  • Nothing. But mentioning it, don't forget to mention Youtube as well.