Ach menno, #whitelist und #blacklist bei #rspamd will nicht funktionieren. Die Anleitungen funktionieren alle nicht. Ist wieder der Moment, wo der Kapitalismus mir falsche Informationen liefert.
Ach menno, #whitelist und #blacklist bei #rspamd will nicht funktionieren. Die Anleitungen funktionieren alle nicht. Ist wieder der Moment, wo der Kapitalismus mir falsche Informationen liefert.
Christinien
Wenn auch Du auf meinem #Minecraft #Server spielen möchtest, kontaktiere mich.
Wir spielen #Vanilla #Freebuild #Survival, ohne extra Farmwelt. Man kann den eigenen Bereich mit einer Goldschaufel claimen und sichern. Ansonsten gibt es noch einen Bahnhof auf der Netherdecke. Teleports oder /home gibt es nicht. Wie gesagt, wir spielen Vanilla.
Wir spielen bereits auf der 1.21.4 (#Java Edition). Es gibt also alles, was das (Creaking-) Herz begehrt.
Wenn Du mit uns zusammen spielen möchtest, kontaktiere mich. Ich muss Dich dann freischalten. Aus Sicherheitsgründen, ist de Server nur auf #whitelist.
complaining about technology
How can one retro-fit a #USBA port to a 10 year old #thinkpad when the #minipcie internal USB port card device (see link below) is not on the #lenovo #whitelist e.g. of a #thinkpad_x230
BTW the #usb port is for then fitting a #lora #rnode or #meshtastic #note inside the #laptop case. This video shows the problem.
https://www.youtube.com/watch?v=aRrUMra7it0
#bios
This is the device in question:
https://www.reichelt.de/de/de/shop/produkt/mini_pcie_1x_intern_usb_2_0_typ-a-354619
Thanks for an help on this!
World Liberty Financial Adds 100K Investors to Whitelist, Eyes $1.5B Valuation Post-Raise - On Monday, the team behind the decentralized finance (defi) project World Liberty ... - https://news.bitcoin.com/world-liberty-financial-adds-100k-investors-to-whitelist-eyes-1-5b-valuation-post-raise/ #decentralizedfinance #regulationd #stablecoins #trumpfamily #governance #tokensale #whitelist #news #defi #wlfi #wlf
‘Thousands’ Flock to World Liberty Financial Whitelist Following Trump’s Announcement - After former President Donald Trump revealed World Liberty Financial’s (WLF) white... - https://news.bitcoin.com/thousands-flock-to-world-liberty-financial-whitelist-following-trumps-announcement/ #worldlibertyfinancial #decentralizedfinance #know-your-customer #cryptocommunity #tokenomics #whitelist #wlfitoken #trump #defi #wlf
Trump Opens KYC Whitelist for New World Liberty Financial Crypto Project - On Monday, former President Donald Trump announced that the whitelist for World Li... - https://news.bitcoin.com/trump-opens-kyc-whitelist-for-new-world-liberty-financial-crypto-project/ #worldlibertyfinancial #decentralizedfinance #web3wallet #whitelist #wlfitoken #crypto #trump #defi #kyc #wlf
Tech shitpost, memes
@nielso Mit diesen vier Domains als Ausnahmeregeln (#Whitelist) in Verbindung mit der Isolation der App in #RethinkDNS sieht man keine #Werbung auf #Kleinanzeigen.
Waarom iphoned u vraagt uw adblocker uit te schakelen https://www.trendingtech.news/trending-news/2024/04/8480/waarom-iphoned-u-vraagt-uw-adblocker-uit-te-schakelen #Adblocker iPhoned #Advertentie-inkomsten #Content gratis aanbieden #Whitelist iPhoned #Steun iPhoned #Trending #News #Nieuws
Ich habe jetzt ausgiebig dieses und jenes im Netz recherchiert, gemailt, gedruckt usw usw.
Fazit: Geht alles ohne #aws #GoogleDNS, #Cloudfront usw usw.
UFW #Whitelist zu DE Providern völlig ausreichend.
/etc/hosts regelt den Rest...
Etwas Gebastel zwischendurch: Die #UFW von #Blacklist auf #Whitelist umgestellt.
So lebt sich political correctness auch am PC: Erlauben statt verbieten
~$ sudo ufw status
Status: active
To Action From
Доступ к эндпоинтам Java Spring Reactive WebFlux со списка разрешенных IP адресов/подсетей
Пример настройки безопасности по разрешенному списку IP адресов/подсетей в Java Spring Reactive Security (WebFlux). Посмотреть полностью
Are there any ModSecurity experts here?
I've been trying to whitelist a bunch of subnets for a while now. I've found several different variants of the rule online.
This is the latest version I've placed in REQUEST-900-EXCLUSION-RULES-BEFORE-CRS.conf, but none of the other variants I've found work either.
SecRule REMOTE_ADDR "@ipMatch 192.175.111.224/27,70.38.27.240/28,184.107.184.0/26" "id:1000,phase:1,log,allow"
Historii z blokiem od YouTube ciąg dalszy. Okazało się, że uBlock jest niewykrywany przez YT i mogę normalnie oglądać filmy, gdy tylko wyłączę dodatek do uBlocka.
Żeby było zabawniej, to dodatek dzięki któremu dodawałem kanały ulubionych twórców do whitelisty pozwalającej na wyświetlanie na nich reklam xD
@kupac on the off chance you might know: how can I in #nixos set up a kid's (one particular user account, not whole system) internet connection to be limited to certain domains only e.g. school website. Problem is many of these sites need/call html code from other sites and the number of domains one needs to #whitelist is large and complex to find out completely. I want the kids to have access to essential online info on one user account but nothing else while parents are out of the house. #dns
What kind of #Moderation would you wish a #SocialMedia service like #Mastodon or #FireFish to have?
If you're familiar with #ActivityPub, can it be implemented with it?
I'm specifically looking for user moderation tools for #PeerToPeer #P2P solutions where service data can't be manually moderated by a central actor. The service data would exist until it is forgotten (no one is sharing it).
Profile and post data would be saved in browser database (#IndexedDB) and peer discovery would be handled by #HyperSwarm or similar. The whole service would be a #PWA, requiring zero server resources beyond loading the PWA, if possible.
Currently I have this:
- honor thread starter #blocklist (by hiding and not sharing those comments - individual clients could still show these and share, resulting in less effective moderation)
- allow thread starter to moderate their threads (don't know how to implement this, yet)
- allow post and comment editing (implement post version checking and automatic updates - again, a client might ignore updates or collect history, resulting in less effective moderation)
- profile reputation, automatic blocking based on reputation and shared blocklists, #whitelist and shared whitelists, blocklist and shared blocklists (see above); essentially a #WebOfTrust implementation
- visibility controls
- sharing controls (for service data; by default interactions and own data would be saved locally and shared to network; data that is offline isn't reachable)
@roboneko @MischievousuTomatosu @dcc @paulo Here if you are interested lol
#!/bin/bash
##hostblock.sh
blockip="0.0.0.0"
umask 0077 && echo "Changed umask (0077)"
if [ -d /tmp/adblock ]; then
rm -r /tmp/adblock && echo "Removed /tmp/adblock"
fi
mkdir /tmp/adblock && echo "created /tmp/adblock"
cd /tmp/adblock
list="final_iplist.txt"
templist="$list.tmp"
final="hosts.txt"
# Add lists using lists+=( "" )
lists=( "https://v.firebog.net/hosts/Easylist.txt" )
lists+=( "https://raw.githubusercontent.com/PolishFiltersTeam/KADhosts/master/KADhosts.txt" )
lists+=( "https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Spam/hosts" )
lists+=( "https://v.firebog.net/hosts/static/w3kbl.txt" )
lists+=( "https://adaway.org/hosts.txt" )
lists+=( "https://v.firebog.net/hosts/AdguardDNS.txt" )
lists+=( "https://v.firebog.net/hosts/Admiral.txt" )
lists+=( "https://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txt" )
lists+=( "https://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts&showintro=0&mimetype=plaintext" )
lists+=( "https://raw.githubusercontent.com/FadeMind/hosts.extras/master/UncheckyAds/hosts" )
lists+=( "https://v.firebog.net/hosts/Prigent-Ads.txt" )
lists+=( "https://raw.githubusercontent.com/DandelionSprout/adfilt/master/Alternate%20versions%20Anti-Malware%20List/AntiMalwareHosts.txt" )
lists+=( "https://osint.digitalside.it/Threat-Intel/lists/latestdomains.txt" )
lists+=( "https://v.firebog.net/hosts/Prigent-Crypto.txt" )
lists+=( "https://v.firebog.net/hosts/RPiList-Malware.txt" )
lists+=( "https://v.firebog.net/hosts/RPiList-Phishing.txt" )
lists+=( "https://zerodot1.gitlab.io/CoinBlockerLists/hosts_browser" )
lists+=( "https://hostfiles.frogeye.fr/firstparty-trackers-hosts.txt" )
lists+=( "https://urlhaus.abuse.ch/downloads/hostfile" )
lists+=( "https://bitbucket.org/ethanr/dns-blacklists/raw/8575c9f96e5b4a1308f2f12394abd86d0927a4a0/bad_lists/Mandiant_APT1_Report_Appendix_D.txt" )
lists+=( "https://phishing.army/download/phishing_army_blocklist_extended.txt" )
lists+=( "https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-malware.txt" )
lists+=( "https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt" )
lists+=( "https://raw.githubusercontent.com/AssoEchap/stalkerware-indicators/master/generated/hosts" )
lists+=( "https://raw.githubusercontent.com/StevenBlack/hosts/master/alternates/gambling/hosts" )
lists+=( "https://www.github.developerdan.com/hosts/lists/ads-and-tracking-extended.txt" )
lists+=( "https://www.github.developerdan.com/hosts/lists/amp-hosts-extended.txt" )
lists+=( "https://www.github.developerdan.com/hosts/lists/dating-services-extended.txt" )
lists+=( "https://blocklistproject.github.io/Lists/ads.txt" )
lists+=( "https://blocklistproject.github.io/Lists/alt-version/fraud-nl.txt" )
lists+=( "https://blocklistproject.github.io/Lists/gambling.txt" )
lists+=( "https://blocklistproject.github.io/Lists/malware.txt" )
lists+=( "https://blocklistproject.github.io/Lists/ransomware.txt" )
lists+=( "https://blocklistproject.github.io/Lists/phishing.txt" )
lists+=( "https://big.oisd.nl/" )
echo "Starting download of all lists..."
curl -O "${lists[@]}" | grep -v "#" | grep -v "! " | grep -v "*." | sed 's/0.0.0.0//' | sed 's/127.0.0.1//' | sed -e 's/^[ \t]*//' >> $templist
echo "Done downloading lists..."
# Sort the aggregated results and remove any duplicates
# Remove entries from the whitelist file if it exists at the root of the current user's home folder
echo "Removing duplicates and formatting the list of domains..."
cat $templist | sed $'s/\r$//' | sort | uniq | sed '/^$/d' | awk -v "IP=$blockip" '{sub(/\r$/,""); print IP" "$0}' > $list
echo "Creating Finalized hosts file (/tmp/hosts.txt)"
echo "by running 'cat /etc/hosts.sav $list > $final'"
cat /etc/hosts.sav $list > $final
# Count how many domains/whitelists were added so it can be displayed to the user
blocked=$(cat $list | wc -l | sed 's/^[ \t]*//')
echo "$blocked ad domains blocked."
#Whitelist specified domains with sed -i '/example.com/d' /tmp/adblock/hosts.txt or hosts.deny
sed -i '/ewr1.vultrobjects.com/d' /tmp/adblock/hosts.txt
# Apply hosts
cp -v /tmp/adblock/hosts.txt /etc/hosts
# Below is duplicating all work but for hosts.deny
hosts="ALL:"
hostsdeny="hosts.deny"
tempdeny="$hostsdeny.tmp"
cat $templist | sed $'s/\r$//' | sort | uniq | sed '/^$/d' | awk -v "IP=$hosts" '{sub(/\r$/,""); print IP" "$0}' > $tempdeny
echo "Creating Finalized hosts.deny file (/tmp/hosts.deny)"
cat $tempdeny > $hostsdeny
#Apply hosts.deny
cp -v /tmp/adblock/hosts.deny /etc/hosts.deny
What’s a good universal replacement for the terms “#blacklist” & “#whitelist”?
Consider as well the understanability to ESL speakers & translation quality.
#English #systemicRacism (#poll within a poll)
Also see 10 Better Ways To Say “#Blacklist” And “#Whitelist”:
https://grammarhow.com/better-ways-to-say-blacklist-and-whitelist/