The binaries in question are various GNU and FOSS tools from elsewhere, not part of the Ventoy project itself. So no, the Ventoy author does not own the copyright of the tools in question.
The binaries in question are various GNU and FOSS tools from elsewhere, not part of the Ventoy project itself. So no, the Ventoy author does not own the copyright of the tools in question.
If it was plausible this would be bigger news. There’s a claim like this every couple of months and none have held up to scrutiny so far.
I can see that you’ve taken on a lot of the feedback from previous comments threads. This is great! Thank you.
And thank you for open sourcing it.
Question: I was using Quiblr before without logging in. If I sign up an account now and log in, will it transfer my locally stored data into the account to keep the recommendation (see more/see less) settings?
I think for now Forgejo is a drop-in replacement. However since they are a hard-fork, at some point in the future they will diverge enough to be mutually incompatible, so the clock is ticking on migrating.
Godus was a huge disappointment, basically a “what if Populous was a mobile skinner-box clicker with time-gating and micro-transactions?”
Magic Carpet (1994) was a really interesting take on the genre, also by Bullfrog. Imagine the god-sim mechanics of Populous combined with a 3D flight-sim/shooter and you get Magic Carpet.
Their post is specifically about Populous: The Beginning which came out in 1998 and was the first Populous game to use 3D graphics. It has quite different mechanics than the original Populous games, and you can see the DNA of Black & White emerging, with the concept of having a leader character that has an important role in the gameplay.
I’ve been using Firefox since the beginning, before that Mozilla, and before that Netscape Navigator.
But I think it’s finally time to switch to Librewolf.
I don’t want digital advertising of any kind, even if my privacy is “preserved” through fancy data-laundering.
deleted by creator
I think the post is supposed to link here: https://timemachiner.io/2022/06/18/windows-95-launch-video-reminds-us-how-90s-the-90s-were/
For some reason when I view the post it just links to a jpeg
This is the Windows 95 launch video in my mind: https://www.youtube.com/watch?v=kemivUKb4f4
Why not post your blogs to a fediverse platform? Do they need to be on a separate hosted system? You’ll probably get more people reading and engaging with your posts if you are just posting to a Mastodon instance rather than hosting on a separate web platform and hoping that people stumble across it.
If you’re not storing on a filesystem that calculates and checks erasure codes then you can always generate PAR2 files yourself.
deleted by creator
Ah, you’re talking about LUKS. LVM is just the volume manager.
The standard way is to add an sshd
(such as dropbear) to your initramfs
so that you can ssh in and run commands (such as entering the root partition password) during system boot.
See:
will that cause me problems on a headless server if I get a power outage and need to reboot? I think yes
Maybe I’m missing something obvious, but what is the problem that you anticipate with LVM after a power failure?
The Kaspersky analysis noted that the malware contained comments in the shell scripts written in Ukrainian and Russian, and used malware components detected in previous malware campaigns since 2013 that presumably have been attributed to a specific group.
FTA:
Meanwhile, the postinst script contains comments in Russian and Ukrainian, including information about improvements made to the malware, as well as activist statements. They mention the dates 20200126 (January 26, 2020) and 20200127 (January 27, 2020).
…
Having established how the infected Free Download Manager package was distributed, we decided to check whether the implants discovered over the course of our research have code overlaps with other malware samples. It turned out that the crond backdoor represents a modified version of a backdoor called Bew. Kaspersky security solutions for Linux have been detecting its variants since 2013.
…
The Bew backdoor has been analyzed multiple times, and one of its first descriptions was published in 2014. Additionally, in 2017, CERN posted information about the BusyWinman campaign that involved usage of Bew. According to CERN, Bew infections were carried out through drive-by downloads.
As for the stealer, its early version was described by Yoroi in 2019. It was used after exploitation of a vulnerability in the Exim mail server.
AFAIK even legitimate ad clicks will first direct to an analytics platform before redirecting to the destination site, so that they can track click through rates and where the referral came from. So it is unlikely that ad links will actually go to the website you expect them to even in normal scenarios. It is actually this mechanism that the malicious ads described in the article are using to fake the display URL.
https://github.com/thias/glim