I don’t really understand this reply and why this is a shower thought.
But, I take it back. Clearly not a pastor or sermon. Sorry, my bad…
https://lemmy.world/pictrs/image/b6781fe4-3459-42bf-adce-b9e26f7078b1.jpeg
I don’t really understand this reply and why this is a shower thought.
But, I take it back. Clearly not a pastor or sermon. Sorry, my bad…
https://lemmy.world/pictrs/image/b6781fe4-3459-42bf-adce-b9e26f7078b1.jpeg
Is this one of those “how do you do fellow kids” accounts made by a very young looking , middle aged pastor attempting to infiltrate social media?
Tim Minchin has a couple that’d entertain me.
Woody Allen Jesus (from memory this got cut from the original broadcast?) - https://m.youtube.com/watch?v=_SFdUJLebzU
A serious take on the season…
White Wine in the Sun - https://youtu.be/_CeY0VdhXK8
These are fully stand alone. Downloadable. So not strictly hosted I guess?
Does it need to be “hosted”?
I like both these:
yEd (https://www.yworks.com/products/yed)
Dia Diagrams (http://dia-installer.de)
I think yEd had a free version but closed source.
Yeah, it depends on what you mean.
In many cases malware and phishing is hosted off other compromised sites. So, they build a list of Wordpress sites with vulnerabilities, and use the vulnerabilities to host their files on them. For example, imagine “legitimate-medical-site.net.com” is a real site. The attacker will use the exploit to upload malicious files in there somewhere like “legitimate-medical-site. net. com/qwertasdf/invoice.pdf”.
If the site gets blocked or shutdown it’s no loss to them.
Another technique, especially phishing wise, they will have a semi-plausible domain name (e.g. youbank-security-server .con). But they will register heaps of these. There are tonnes of top level domains that do next to no checking. These things cost a few bucks, so having it taken down is not a problem.
The combination of burner sites and domains mean they have a window of opportunity to run their attacks and scams before other protections kick in.
We’ve had many of these. We just leaver up the boards and tear them out.
You could plunge cut with a circular saw along the edge. Then work a chisel under it and just tear out the floor boards any way you can.
Then for the screws, I either tear them out with pincer pliers for the shallow ones (you can get decent leverage with pincer pliers). Or just cut them flush with the joists and leave them there (quick work with an angle grinder and cut-off disc).
PS. Sorry been trying to reply to you for a few hours but my client wouldn’t connect.
Just wondering, do you need to save the floor board?
“size… of a dinner plate” !!
Yeah. “Nation state”, “Sophisticated”, “command injection”… where have I heard this before?
Ahh, that’s right - with every breach where they had basic vulnerabilities exposed, or admin credentials compromised.
One of our jokes for pretty much every sale we see is: “20% off of 50% more”.
Breadboard is a cool idea, but your first experiments will likely be super simple right?
Here’s a few thoughts.
How about some double conducting copper tape and sheets of craft paper or cardboard. (Double conducting conducts on the top as well as the sticky side so overlapping joins completes the circuit).
You can draw/plan and then route the copper sticky tape like a circuit board. Fashion basic switches from the copper tape around a cardboard flap, tape down any “flat” components like resistors.
Add some tinned leads to anything that would stick up from the board.
I often find the more tactile “MacGyver” approach is a better teaching aid as there’s no mystery behind the scenes (no hidden board wires, no pre-mounted components or connectors). Everything is built up from existing skills and experiences.
When you start to get more advanced, 80s Aussie kids grew up with:
That has a complete list of components needed for the projects in the book. Same idea as the copper tape, just with bits of wire and screws. The project in the book were all built onto a pre-drilled block of plastic with the schematic laid on top. They were fun little projects and easy enough to do - the flashers and sirens were a hit for me.
You might find some starting points or even projects or terms to look for in this article:
I ended up on Piwigo. It’s pretty fully featured and allows you to set up access controls for groups. Also has client apps.