A while ago, I had to redo all of the existing Fritz!Box LAN2LAN VPN connections.
It was a pain for many reasons, reminding me of the pain
This is why it was so painful:
Posted by jpluimers on 2024/02/12
A while ago, I had to redo all of the existing Fritz!Box LAN2LAN VPN connections.
It was a pain for many reasons, reminding me of the pain
This is why it was so painful:
Posted in Fritz!, Fritz!Box, Hardware, Network-and-equipment, Power User | Leave a Comment »
Posted by jpluimers on 2024/02/09
Posted in Development, Hardware Development | Leave a Comment »
Posted by jpluimers on 2024/02/08
Some links around a question that Jilles posted in 2022: [Wayback/Archive] jilles.com on Twitter: “Question for Dutch HAM radio amateurs, what frequencies are interesting to monitor for digital data? EG IoT/SSTV/Pocsag”
Posted in ADS-B receivers, Development, Hardware, Power User, Software Development, USB | Leave a Comment »
Posted by jpluimers on 2024/02/07
For my URL list:
Posted in .NET, C#, C# 11, Development, Software Development | Leave a Comment »
Posted by jpluimers on 2024/02/06
Posted in Uncategorized | Leave a Comment »
Posted by jpluimers on 2024/02/06
In a game of Walls and Ladders (similar to Arms Race), the Ladders usually win, see the references at the end of the post.
The actual “game” in this case is more and more sites trying to build walls prevent pasting credential related information like user IDs (often e-mail addresses) or passwords often citing “more safety” or “less security risks”, and users get taller ladders wanting to do just that because of their own security concerns:
[Wayback/Archive] Stef 🎈 on Twitter: “Dear mobile/web-apps, please never never disable copy and paste “due to security reasons”. -everybody with a password manager.”
The walls will always loose so it is better to invest the money for the walls into other security measures.
Given that most of the risks are web-sites getting that information exfiltrated, I wish they put more energy into bolting down that side of the security risk side than the hampering legitimate users entering that information in the first place.
Since so many of these sites have leaked my information in the past, any email address I use for activating an account is like 50 characters long. Something I am not going to type once (because of typing mistakes) and definitely not twice (to confirm I did not make typing mistakes).
Posted in Authentication, Chrome, Clipboard, Development, Google, HTML, JavaScript/ECMAScript, Power User, Scripting, Security, Software Development, Web Development | Leave a Comment »
Posted by jpluimers on 2024/02/05
Repairing the cabling is a long job but doable if one is careful:
The panorama roof looks a lot harder to me:
--jeroen
Posted in cars, E61 530xd touring, LifeHacker, Power User | Leave a Comment »
Posted by jpluimers on 2024/02/04
[Wayback/Archive] Finance worker pays out $25 million after video call with deepfake ‘chief financial officer’ | CNN
Via:
edition.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk” – Mastodonedition.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk” – Macaw-Social--jeroen
Posted in Power User, Security | Leave a Comment »
Posted by jpluimers on 2024/02/02
This 2020 project is still so cool!
[Wayback/Wayback] Can you IoT an Airwick air freshener? – James Callaghan:
Posted in Development, ESP32, Hardware Development, Hardware Interfacing | Leave a Comment »
Posted by jpluimers on 2024/02/01
Not long after Figuring out which processes are preventing to eject/unmount my MacOS Time Machine backup USB drive, I wanted to do the opposite: prevent /Volumes/Sandisk1TB from being ejected, as this is the “built-in” MicroSD card I use to store large or infrequently used files on (ISO and other disk images, drivers, hardware and software documentation, stuff to be installed on a fresh machine).
The opposite is straightforward: have a process keep at least one handle open on the Volume as per [Wayback] macos – How do I not accidentally eject external drives? – Ask Different (thanks [Wayback] kLy, [Wayback] dan and [Wayback] gerlos):
If your important external drive is mounted on the following mount point:
/Volumes/important_diskThen you can protect it against an accidental removal by locking this mount point as opened. For this one very simple method consists in opening
Terminaland doing this basic command:$ cd /Volumes/important_diskTo get rid of this locking, you might type within the same
Terminalwindow:$ cd /or you might as well just close this
Terminalwindow ($ exit, or ⌃+D, or ⌘+W).…
An even more elegant way to do it is open a
screensession (just typescreeninTerminal) and open the mount point from that session. This way you can even closeTerminal, since the session will keep running in the background, until you reattach it and stop it (so there’s no need to keep a window open if you don’t need it). I guess you can even create anAutomatoraction for it. For tips onscreensee: [Wayback] kinnetica.com/2011/05/29/using-screen-on-mac-os-x
–jeroen
Posted in *nix, *nix-tools, Apple, Mac OS X / OS X / MacOS, Power User, screen, Terminal | Leave a Comment »