rowdy

joined 10 months ago
[–] rowdy@piefed.social 11 points 1 day ago (2 children)

I see that as a generous interpretation. But to each their own.

I didn’t even mention the dude.

[–] rowdy@piefed.social 26 points 1 day ago (4 children)

Right, which is why I said so I can block it. Not that it should be outright banned.

I’m just not interested in comics where the only ‘joke’ is slim thick mummy wants to fuck.

[–] rowdy@piefed.social 36 points 1 day ago (15 children)

The comm needs to implement a gooner tag so I can block these.

[–] rowdy@piefed.social 15 points 1 month ago

Yeah, kinda. GamersNexus is popular for their no-bullshit PC benchmarking and their “indie” documentaries on anti-consumer behaviors tangentially related to gaming hardware.

The tldr is pretty much the title - the context is the video if you’re interested. The video may be long format but I don’t agree with what the other dude said about this being better served as an article. Steve (long hair dude) is pretty respectful of his consumer’s time. I think they post most of their videos as articles on their website too - ad free.

 

Hopefully I’m just doing something wrong but I still see comments from users I have blocked on Voyager. Is this a known bug?

[–] rowdy@piefed.social 4 points 3 months ago* (last edited 3 months ago)

Not completely accurate. Most modern systems support asynchronous dual channel. Providing dual channel operation up to the smaller RAM capacity with the remaining RAM running in single-channel. Also “computers aren’t designed or meant to be operated that way” is a fabrication - they operate just fine, just with reduced performance. In RAM starved situations it’s still better to have single-channel than nothing at all.

Edit: poor dude downvoted me for correcting him. What a sad existence.

[–] rowdy@piefed.social 0 points 3 months ago

Low severity. Good that it got attention but this requires attackers to already have access to the HV - meaning you’re already screwed.

[–] rowdy@piefed.social 0 points 4 months ago
[–] rowdy@piefed.social 17 points 4 months ago

Mate you’re the only one whining. I got around the cookie banner just fine, and reposted here for others.

[–] rowdy@piefed.social 119 points 4 months ago (6 children)

we share data with our 188 partners

That’s a no from me dawg

The updater integrated into Notepad++ has allowed itself to be infiltrated by malware, which has been installed on some PCs. The developer of the powerful open-source text editor is responding with an update to Notepad++ v8.8.9. Users currently have to perform the update manually.

In a news post on the Notepad++ website, developer Don Ho explains that "some security experts have reported incidents where internet traffic affecting Notepad++ was intercepted." According to the post, investigations have revealed that traffic from the Notepad++ updater WinGUp "was occasionally redirected to malicious servers, leading to the download of compromised executable files." IT security researcher Kevin Beaumont reports that at least three organizations "with interests in South Asia" have been targeted in this way.

As Beaumont explains, the updater uses a version check that queries the URL "https://notepad-plus-plus.org/update/getDownloadUrl.php" and evaluates an XML file delivered through it. The updater uses the download URL listed in the XML file, saves the file in the %TEMP% folder, and executes it. Anyone who can intercept and manipulate this traffic can therefore change the download URL. Until version 8.8.7 of Notepad++, the developer used a self-signed certificate, which is available in the Github source code. This made it possible to create manipulated updates and push them onto victims. Since v8.8.7, however, Notepad++ relies on a legitimate GlobalSign certificate, and installing its own Notepad++ root certificate is no longer necessary.

Remedy through updates

With Notepad++ v8.8.8, the WinGUp updater now forces github.com as the download source. Version 8.8.9, released overnight on Wednesday, further hardens Notepad++ and WinGUp so that they correctly check the signature and certificates of downloaded installers during the update process. If the check fails, the update process is aborted. Don Ho notes that investigations are ongoing to determine how the traffic hijacking occurred in the observed cases.

Kevin Beaumont also lists some indicators of compromise (IOCs). For example, connections from "gup.exe" to URLs other than "notepad-plus-plus.org", "github.com", and "release-assets.githubusercontent.com" are suspicious. Likewise, attention should be paid if "gup.exe" starts unusual processes – only "explorer.exe" and "npp*" related Notepad++ installers should run under it, which since versions 8.8.8 are also signed with a GlobalSign certificate. After the observed attacks, files named "update.exe" or "AutoUpdater.exe" (Notepad++ itself does not use these names at all) were apparently also found in the user's TEMP directory, from which "gup.exe" downloaded and executed the updaters.

Notepad++ 8.8.8 does not find the update yet

Notepad++ v8.8.8 currently does not find the update.

Beaumont recommends updating to at least Notepad++ v8.8.8. However, version 8.8.9 is even further hardened. The integrated updater from Notepad++ v8.8.8 does not yet find the update, and "winget" also does not currently find a newer software version. However, the latest version is available as a manual download on the Notepad++ website.

Notepad++ is frequently targeted by malicious actors because the software is popular and widely used. Last year, for example, Don Ho asked for help to get rid of a "parasitic website" that was creeping into the original Notepad++ site in Google search results. It had unscrupulous intentions. In general, fake sites often appear in search results offering virus-infected files.

Jetzt heise security PRO entdecken

(dmk)

This article was originally published inGerman. It was translated with technical assistance and editorially reviewed before publication.

 

Found in Southwest North Carolina. They were all over the exposed root of a fallen tree, was really impressive to see.

If anyone is familiar I’d appreciate an ID for my own curiosity.

[–] rowdy@piefed.social 4 points 4 months ago

Citation needed - but I suppose you could say the same about my claim.

I’d love to test this properly with an infrared thermometer but I don’t have one. All I have is an anecdote that I’ve been charging my OLED in it’s case since release and have never had an issue - not zipped up given the wire, just the lid flipped over on top.

I guess either way the BMS would prevent any real damage from occurring, which is why I say it’s a non-issue.

[–] rowdy@piefed.social 19 points 4 months ago (3 children)

I can understand the concern. But a SD at full load would run significantly hotter, even with fan exhaust, than a powered-off SD charging in an enclosed case. It’s a non-issue.

view more: next ›