[-] techviator@infosec.pub 1 points 1 year ago

This might help you: https://www.tecmint.com/wysiwyg-html-editors/

Try different tools until you find one that suits you and learn with it until you are comfortable with the code, then you can use more advanced tools.

[-] techviator@infosec.pub 26 points 1 year ago

Xwitter by Musk - the best social media in all 4 corners of this Flat Earth! Starting at $8* per month.

*Basic plan has a limit of 50 xweets per month.

[-] techviator@infosec.pub 55 points 1 year ago

How do I block judgemental assholes?

Hi,

I don't want to see assholes with low IQ who cannot be bothered to look at the settings and documentation of the apps and websites they use and who'll judge others based on his own preconceptions and biases.

-- People choose to share nudes or go into porn for a very wide variety of reasons, and you should not be assuming anything about their self-esteem, dignity or self-worth, because you don't know them or anything about them other than they chose a different lifestyle than yours.

It's ok to not want to see it, you can turn it off in the setting or block the user/instance/domain that may be not properly tagging their adult content, but it is absolutely not ok to judge other users and insult them publicly just because you don't like their lifestyle.

[-] techviator@infosec.pub 9 points 1 year ago

My thoughts: I don't care! I am very happy with Lemmy and Kbin, so not going back there, thay can do whatever!

1

(Crosspost) Summary:

Meduza Stealer is a malware that targets Windows users and organizations. It is specifically designed to steal data from browsers, including login credentials, browsing history, and cookies. It can also steal data from password managers, 2FA apps, cryptocurrency wallets, and gaming extensions The malware is distributed through a variety of channels, including cybercrime forums and Telegram channels. It is difficult to detect because it does not use obfuscation techniques. Once it is installed, the malware will connect to a remote server and upload the stolen data. The malware is specifically designed to target Windows users, but it could be adapted to target other platforms in the future. The malware is not currently very widespread, but it has the potential to become more widespread in the future. The malware is still under development, so it is possible that it will be updated with new features or capabilities. Defensive measures suggested:

Regularly install updates for your operating system, browsers, and installed applications to patch vulnerabilities that malware can exploit. Be cautious when downloading files or opening email attachments, especially from unknown sources. Scan files using security software before opening them. Employ strong and unique passwords for all your accounts, including browsers, email, and cryptocurrency wallets. Consider using a password manager to securely store and manage your passwords. Enable 2FA wherever possible to add an extra layer of security to your accounts. This helps protect against unauthorized access, even if passwords are compromised. Only install browser extensions from trusted sources. Regularly review and remove unnecessary or suspicious extensions to minimize the risk of malware interference. Keep a close eye on your financial accounts, including cryptocurrency wallets, and regularly review transaction history for any suspicious activities. Report any unauthorized transactions or security breaches immediately. There are no details about what kind of information it can steal from the Password manager extensions.

[-] techviator@infosec.pub 4 points 1 year ago

Tailscale uses the Wireguard protocol (in userspace, not kernel) along with a user and IP management system, a STUN system and a relay so they can provide easy management and connectivity even behind NAT or CGNAT. The relay uses https headers to hide the traffic, which provides a slower connection but allows connectivity in networks that block UDP or VPN traffic.

Installing a Wireguard server would use a kernel implementation of the WG protocol, but you have to open a port on the server side for it, and manually create the peer configuration and public/private keys for them. It is slightly faster, but not as easy to deploy or as versatile when dealing with complicated networks, dual NAT or CGNAT. Also very easy to block on networks as it does not obfuscates the traffic.

I chose to deploy a Wireguard server because it works well for my needs, but if I was behind CGNAT or connected through restrictive networks I would move to Tailscale.

12

Finally #Pfsense CE 2.7 was released today! And just in time to ruin...err I mean, enjoy the weekend upgrading it. 🤣 🤣

https://www.netgate.com/blog/pfsense-2.7.0-and-23.05

#selfhosting #firewall

techviator

joined 1 year ago