![](https://lemmy.world/pictrs/image/6075b974-9ef8-45a7-8a3b-e69e39a87042.jpeg)
![](https://lemmy.ml/pictrs/image/q98XK4sKtw.png)
Are you affiliated with the project in any official way?
If so, thank you for such a nice product.
Are you affiliated with the project in any official way?
If so, thank you for such a nice product.
Nice UI work. I’ll wait for it to be open-sourced before I use it to login to my account.
How much are they paying you?
The guy had a friend who admitted to 8 murders and he himself murdered his wife who was the translator for a Russian mail order bride catalogue… Woah. Its hard to believe a person like that could contribute to open source.
Saying you can solve the existence of bugs in any code repository reeks of bullshit. Anyone who believes this is possible is just ignorant.
The only really capable models are from OpenAI, Anthropic, and Meta. They all have guard rails of some kind and you need to use a supervisor agent to decide if the output is as you wanted if you can’t use something more basic like a JSON parser. Google Bard/Gemini output is not that high quality IMO.
Powershell has ls and other common linux commands built in, try it.
A universities desktop environments are not the same risk level of a corporate. All the uni I have seen have trash management. In corpos its a mix of trash and highly polished depending on who is in charge.
The best methods to detect and prevent attacks on your endpoints are EDR software that are linked to your corporate router like FortiEDR, which supports Windows, Mac, Linux, and even some VDI like Citrix.
Have a look at manage engine software
Having automatic updates as opt-in by default would be better to avoid supply chain attacks. Also, if the original history file is still there it would be a good feature to be able to diff between the sqlite and the history file to see if commands have been deleted. Are there options to choose what encryption algo is used?
Bypassing login is not difficult on a lot of OS.
Docker desktop is so garbage. Why build a client that doesn’t support connections to a remote host by default? It’s so 90s.
Now we all want to know if you have child porn
Don’t use Brave…
That class of storage is very expensive to get your data back. Buying a drive will be cheaper.
Wireshark is the best FOSS for packet inspection, but you’ll have to test the efficacy of your solution on enterprise hardware directly if you’d like to know which ones it works for. You can virtualize many of these FW on Azure cloud for an hour and it won’t cost much, but you’d need to know what you’re doing.
Votes mean nothing. Try to be less sensitive. If you need to touch grass and avoid online activities for a while to achieve this, then do it. You can’t control other people.
Thats a land shark