![](/static/c15a0eb1/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/8286e071-7449-4413-a084-1eb5242e2cf4.png)
Find a new service you like, add it using rootless podman. That way you can test it without affecting your running system.
Find a new service you like, add it using rootless podman. That way you can test it without affecting your running system.
The buff/cache will free automatically when an application needs ram, until then it’s useful for speeding up the system.
Try sysctl -w net.ipv4.conf.all.rp_filter=2
on the PC (not vps) or =0 if that doesn’t work
Do a ping of 8.8.8.8 from your user, then open a new console and run tcpdump -i <interface> with first your uplink, then wg0. The packets should be seen on wg0 if they’re routed correctly and the problem then is on the vps side. Otherwise it’s a problem on your local config.
Did you add the vps IP to the routing table of your user? ip r add 10.0.0.2/32 dev wg0 table 1070
?
Layer 8, next question.
To shreds you say?
Our Database
// abandon all hope ye who commit here
(?:[a-z0-9!#$%&'*+/=?^_`{|}~-]+(?:\.[a-z0-9!#$%&'*+/=?^_`{|}~-]+)*|"(?:[\x01-\x08\x0b\x0c\x0e-\x1f\x21\x23-\x5b\x5d-\x7f]|\\[\x01-\x09\x0b\x0c\x0e-\x7f])*")@(?:(?:[a-z0-9](?:[a-z0-9-]*[a-z0-9])?\.)+[a-z0-9](?:[a-z0-9-]*[a-z0-9])?|\[(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?|[a-z0-9-]*[a-z0-9]:(?:[\x01-\x08\x0b\x0c\x0e-\x1f\x21-\x5a\x53-\x7f]|\\[\x01-\x09\x0b\x0c\x0e-\x7f])+)\])
Edith: damit, Not the first to post this abomination
If the gpu doesn’t burn
So, when is the first party cable going to be launched? The device only hast an adapter shipped with it, which won’t help you connect to the PSU 12VHPWR.
And it burns, burns, burns
The gpu of fire
The gpu of fire
I use BTW, BTW
Anyone wanna take bets on how long it takes before there’s a lawsuite?
Sounds like a wise guy, i trust him.
Just after it’s too late
Larme
Theoretically it is possible to exploit a hardware (or maybe even a very big software) bug inside the JavaScript engine, to execute code as root.
See also this real world example hardware exploit that gives somewhat arbitrary ram read/write access to an attacking website with zero clicks that can grant you root.
Kernel Protection hadn’t helped here though, hardware bugs aren’t an easy fix.
A bit late but: The Linux kernel can prevent unsigned code from being inserted into it, the signing key is generated by the one building the kernel image and automatically signs all modules that are build with the kernel.
This only happens if lockdown is enabled, which happens automatically if you use secure boot. The distros I use also support secure boot so I have it for example.
See https://www.man7.org/linux/man-pages/man7/kernel_lockdown.7.html for more info
On a different note, selinux enabled desktop systems (like Fedora linux for example) do limit the root user depending on context (services and so on)
Or use the ublocklist extension, this puts a button besides all search results to perma ban that domain and allows URL lists like this for automatic garbage removal.