I've been trialling GitHub Copilot recently at work and, having been generally skeptical of the golden mountains promised by AI hype guys, I have to say that it gave me a modest efficiency gain in some scenarios. I would miss not having it, much like I would miss not having autocomplete.
I'll probably write up a blog for hgrsd.nl with a few thoughts of where it was helpful for me.
Love working with tabs? Then you’ll love this: a Memory Saver that automatically puts your inactive tabs to sleep, so you can experience faster and smoother browsing!⚡
Our built-in Feed Reader now lets you follow feeds on sites like Reddit and GitHub. You can now curate your very own news feed with your preferred content. 📰
There’s more: a new option to create Workspaces with fewer clicks, export of passwords and feeds, and a window split screen view for apps on Mac.
Read on to know more, and upgrade your browser to its latest version👇
Kennt ihr #Git? Auch wenn ihr kein(e) Programmierer:in seid, dann seid ihr bestimmt schonmal auf #GitHub, #GitLab o.Ä. gestoßen. Auch als Designer:in, Maker:in, Texter:in oder einfach nur zum Projektmanagement spielen Git und die dazugehörigen Plattformen heute eine große Rolle. Wir erklären Git/GitHub/GitLab für Nicht-Programmierer in einem dreistündigen Workshop am Sonntag, den 19. Mai. https://www.welcome-werkstatt.de/veranstaltungen/git-fuer-nicht-programmierer
Gibt's eigentlich noch aktiv entwickelte und empfehlenswerte GitHub-Clients für Android? Nutze bisher FastHub, aber da geht es offenbar nicht mehr weiter … #android#GitHub
After the #XZ attack, I have a suggestion for all #software forges (#Forgejo, #GitHub, #Gitea, #Sourceforge, etc.):
Have some way to visualize binary files better, including diffs to such files. Cuz now, we have basically nothing except byte counters.
Since they're binary files, it must be as generic as possible. But even some rendering or analysis is better than nothing.
The idea is to expose weird patterns in binary files that could be a sign of an attack.
A critical vulnerability, identified as CVE-2024-20356, has been found in Cisco's Integrated Management Controller (IMC). This flaw allows for command injection, potentially giving attackers the ability to gain root access to systems. The vulnerability is located in the web-based management interface of the IMC, which is used for remotely managing Cisco hardware. The issue arises from insufficient user input validation in the IMC interface, allowing an authenticated, remote attacker with administrative privileges to inject malicious commands.
Security researchers from Nettitude have developed a Proof of Concept (PoC) exploit, named "CISCown," to demonstrate this vulnerability. The exploit involves sending crafted commands through the web interface, enabling attackers to execute arbitrary code with root privileges on the underlying operating system of Cisco hardware. This PoC exploit is part of a toolkit developed by Nettitude and is available on GitHub. It uses parameters such as target IP, username, and password to automate the exploitation process and deploy a telnetd root shell service on compromised devices.
The release of this PoC exploit signifies a critical threat level for organizations using affected Cisco products. Gaining root access can lead to data theft, system downtime, and further network compromise. Cisco has responded by releasing software updates to address this vulnerability. It is strongly recommended that all affected organizations apply these updates immediately, as no known workaround mitigates this vulnerability.
The affected products include a range of Cisco servers and computing systems, such as the 5000 Series Enterprise Network Compute Systems (ENCS), Catalyst 8300 Series Edge uCPE, UCS C-Series M5, M6, and M7 Rack Servers in standalone mode, UCS E-Series Servers, and UCS S-Series Storage Servers. Users and administrators are advised to visit Cisco’s official security advisory page and the Nettitude GitHub repository hosting the exploitation toolkit for more detailed information and access to the updates.
This release adds support for finding barcodes in PDF files[1] and dealing with multiple barcodes. It also properly colours the status bar during usage now.
As always, it's available on #GitHub, will soon be available on #IzzyOnDroid and will slowly roll out to other app stores.
I'm thinking again about moving from #github to #sourcehut. I firmly believe in paying fair prices for services that don't invade my privacy. My private repos stay inside my home network on a #gitolite server. I don't use GitHub Actions. Issues and projects are handy but I can use other task tracking systems. I'd probably keep my GitHub account to follow other projects/discussions and for single sign-on needs.
If you've moved your personal code from GitHub to sourcehut, is there anything you regret or would warn others about?
GameCube HDMI Mod Is Now Available on github (www.timeextension.com)
"DOL-101 Digital Port kit files uploaded to GitHub"
Descent 3 source code released on github, after 25 years (github.com)
The github repo is owned by one of the original developers, Kevin Bentley. Includes the unreleased 1.5 patch....