Pretty sure that certain versions of the Office apps ONLY support files stored in one drive. Like you can’t open a OneNote .toc in the app version of OneNote, whether on local disk or mounted network share.
Cybersecurity professional with an interest/background in networking. Beginning to delve into binary exploitation and reverse engineering.
Pretty sure that certain versions of the Office apps ONLY support files stored in one drive. Like you can’t open a OneNote .toc in the app version of OneNote, whether on local disk or mounted network share.
Exactly. I have some space on there that comes with Office365 or whatever. I use rclone to back up my personal, non-git stuff to my nas from my laptops and pc. I use rclone on my nas to push encrypted backups of all those personal files to one drive. I have the space, I might as well use it. If my house burns down and the house with cold backups burns down, well hopefully I’ll still have access to my pictures and memories and shit.
I just installed it out of curiosity. The watchlist is the page that has your up next stuff in the first line, then like new movies added to your movies library, new shows in your tv library, etc. The discover section is what you’re talking about, and it’s still on its own discrete section.
It’s copying Star Wars Galaxies. Never forget what they took from us.
I just hit 80% capacity on my NAS, so I was already prepping to buy a couple drives this Black Friday. Maybe I’ll just buy one or two more, which should ride me through the next 4 years.
Just got a 4080s this past winter, and my CPU is still going pretty strong so I’m feeling pretty lucky. It’s fucking bullshit that I even need to think like this though.
Black Friday sales are coming up if you’re in the US, start buying hard drives so you can actually download what you want and don’t have to rely on a streaming site.
If it got to the point you were being investigated/prosecuted and you used a computer you didn’t properly dispose of afterwards, yes. They’ll take a forensic image of the system and trawl through it to find any artifacts left by your participation.
If you went and downloaded LOIC manually, you probably didn’t get compromised.
If a suss encoded powershell command loads and executes some dll in memory from the internet, which then runs some dechained process that’s sending the ddos traffic you probably got compromised.
Just like anything, you could make your intentional participation look like a compromise. You could also just buy a laptop with cash on fb marketplace, go to McDonald’s or Starbucks or some shit, get on their public WiFi, then just stash the laptop under a booth or something.
Side note, does anyone know if anyone wound up getting prosecuted for their participation in LOIC campaigns?
Bro you can’t say that then not drop the links.
Damn bro. Porn sites pulling out of regions because of ID laws are really causing us to go to some weird places huh?
I’ve seen a ton of response across lemmy like this. People are just primed to get hostile/argumentative for no reason and, as in this case, because they completely failed to comprehend the original post.
If you can frame every guess so that it can only ever have a binary A/B answer, troubleshooting and guessing are pretty much identical.
Oh I don’t blame it at all, I totally realize I threw a weird edge case at it! If it sounded like I was slagging TeX I didn’t mean it that way at all.
I ran into this issue when using code blocks in LaTeX that contained a bash command like ‘echo aBcdEF32… > /var/www/index.php’, where aBcdEF32… was the base64 encoded string of a web shell. I wound up having to set the line break behavior to split on some random letters/numbers to get everything to wrap appropriately, although that was probably some hacky heretical solution.
No.
They’re not killing Blu-Ray. They’re killing consumer writeable Blu-Rays. Tell me you only read headlines without telling me you only read headlines.
In the US nobody really mentions their salary as an after tax amount, it’s almost always give as the pre-tax, pre-deduction amount.
All most apps like these are is a wrapper around API calls anyway. I’ll keep using my iPhone and just self host whatever replacement gets released.
Worst case I can just spin up an Android qemu vm on my real computer, and let my pocket computer just make phone calls, send messages, and shit post on the internet as nature intended.
Yes, treating crypto as a way to invest is a scam. The vast majority of crypto and crypto-adjacent “projects” are scams.
We live in a world where payment providers have the power to force Etsy to delist vendors that sell sex toys to customers of a legal age, payment apps like Venmo or PayPal will permaban your account for selling NSFW art or products, and physical cash is being largely abandoned for cards and digital wallets. Surely you can see the benefits of a completely anonymous payment method?
To be clear, I vastly prefer cash, but there’s an obvious issue with trying to anonymously use cash to pay for something on the internet or to send money to someone who isn’t within easy driving distance.
Slam an Edge user agent up in there.
If you run rclone to push encrypted backups to it, every single time you log in to the web client it freaks out, asks you if you’ve been ransomwared, and if you want to restore your files. Restore to what MS? The only state you’ve ever seen these files in is the one they’re in currently.