vvv

joined 1 year ago
[–] vvv@programming.dev 4 points 5 months ago* (last edited 5 months ago)

I use these two vim plugins for the same functionality without leaving $EDITOR:

I've also started dabbling with using fzf in scripts for the team to use. Don't sleep on the --query and --select-1 flags!

[–] vvv@programming.dev 5 points 5 months ago* (last edited 5 months ago)

is that more or less cursed than cat image.img > /dev/whatever?

[–] vvv@programming.dev 8 points 5 months ago (4 children)

dd if=image.img of=/dev/disk/flashdrive is usually all you need

[–] vvv@programming.dev 6 points 5 months ago

Definitely not what you're talking about, but still: https://www.destroyallsoftware.com/talks/a-whole-new-world

[–] vvv@programming.dev 1 points 5 months ago

it could explicitly be a reasonable deterrent. if you double your price, but lose half your customers, you've made the same amount of money for half the work.

[–] vvv@programming.dev 6 points 5 months ago* (last edited 5 months ago) (3 children)

"Hi, I just sent the ransom payment to the Bitcoin address you provided.
"Now you'll unlock my data, right?
"...... right?"

[–] vvv@programming.dev 16 points 6 months ago (1 children)

just to give you the term to search for, these types of applications are called snippet managers. for example, https://snibox.github.io/

there's a ton of them around. I don't have a particular one that I recommend, since it's not something I use in my workflow.

[–] vvv@programming.dev 57 points 6 months ago (1 children)

grep -r exists and is even more faster and doesn't require passing around file names.

grep -r --include='*.txt' 'somename' .
[–] vvv@programming.dev 5 points 6 months ago

Better than that, git config supports conditional includes, based on a repo URL or path on disk. So you can have a gitconfig per organization or whatever, which specifies an sshCommand and thus an ssh key.

[–] vvv@programming.dev 50 points 6 months ago* (last edited 6 months ago) (4 children)

(obligatory I'm not a network surgeon this is likely not perfectly correct)

The article mentions network interfaces, DHCP and gateways so real quick: a network interface usually represents a physical connection to a network, like an Ethernet port or a WiFi card. DHCP is a protocol that auto configured network routes and addresses once a physical connection is established, like when you jack in via an ethernet cable, it tells you the IP address you should go by, the range of IP address on the network you've connected to, where you can resolve domain names to IP addresses. It also tells you the address of a default gateway to route traffic to, if you're trying to reach something outside of this network.

You can have more than one set of this configuration. Your wired network might tell you that your an address is 10.0.0.34, anything that starts with 10.0.0. is local, and to talk to 10.0.0.254 if you're trying to get to anything else. If at the same time you also connect to a wireless network, that might tell you that your address is 192.168.0.69, 192.168.0.* is your local network, and 192.168.0.254 is your gateway out. Now your computer wants to talk to 4.2.2.2. Should it use the wireless interface and go via 192.168.0.254? or the wired one and use 10.0.0.254? Your os has a routing table that includes both of those routes, and based on the precedence of the entries in it, it'll pick one.

VPN software usually works by creating a network interface on your computer, similar to an interface to a WiFi card, but virtual. It then asks the OS to route all network traffic, through the new interface it created. Except of course traffic from the VPN software, because that still needs to get out to the VPN provider (let's say, at 1.3.3.7) via real Internet.

So if you're following along at home, your routing table at this point might look like this:

  • traffic to 1.3.3.7 should go to 10.0.0.254 via the wired interface
  • all traffic should go to the VPN interface
  • traffic to 10.0.0.* should go to the wired interface
  • all traffic should go to 10.0.0.254 via the wired interface
  • traffic to 192.168.0.* should go to the wireless interface
  • all traffic should go to 192.168.0.254 via the wireless interface

whenever your os wants to send network packets, it'll go down this list of rules until one applies. With that VPN turned on, most of the time, only those two first rules will ever apply.

If I'm reading the article correctly, what this attack does, is run a DHCP server, that when handing out routing rules, will send one with a flag that causes, for example, the last two rules to be placed at the top of the list instead of the bottom. Your VPN will still be on, the configuration it's requested the OS to make would still be in place, and yet all your traffic will be routed out to this insecure wireless network that's somehow set itself as the priority route over anything else.

[–] vvv@programming.dev 9 points 6 months ago

That's the other one. The Rabbit thing is $200, which, not that I would buy one, is not too unreasonable for an AI tamagotchi

[–] vvv@programming.dev 8 points 7 months ago (3 children)

yep. they're still here. they got smaller, and we call them "tracking pixels" now.

it's just an image, which, server side, you can count the number of times it got loaded. easy to embed and no js required.

view more: ‹ prev next ›