hgrsd, to github
@hgrsd@hachyderm.io avatar

I've been trialling GitHub Copilot recently at work and, having been generally skeptical of the golden mountains promised by AI hype guys, I have to say that it gave me a modest efficiency gain in some scenarios. I would miss not having it, much like I would miss not having autocomplete.

I'll probably write up a blog for hgrsd.nl with a few thoughts of where it was helpful for me.

#github #llm #ai #software

Vivaldi, to tech
@Vivaldi@vivaldi.net avatar

Love working with tabs? Then you’ll love this: a Memory Saver that automatically puts your inactive tabs to sleep, so you can experience faster and smoother browsing!⚡

Our built-in Feed Reader now lets you follow feeds on sites like Reddit and GitHub. You can now curate your very own news feed with your preferred content. 📰

There’s more: a new option to create Workspaces with fewer clicks, export of passwords and feeds, and a window split screen view for apps on Mac.

Read on to know more, and upgrade your browser to its latest version👇

https://vivaldi.com/blog/vivaldi-on-desktop-6-7

#Browser #NewRelease #Release #Tech #Technology #VivaldiBrowser #Mac #rssfeed #Reddit #Github

lawrencegripper, to github

Trying out 2x portrait monitors and one landscape in the middle.

So far really enjoying it.

Portrait is pretty cool for long #github issues with lots of comments and same for long code files.

welcomewerkstatt, to github German

Kennt ihr #Git? Auch wenn ihr kein(e) Programmierer:in seid, dann seid ihr bestimmt schonmal auf #GitHub, #GitLab o.Ä. gestoßen. Auch als Designer:in, Maker:in, Texter:in oder einfach nur zum Projektmanagement spielen Git und die dazugehörigen Plattformen heute eine große Rolle. Wir erklären Git/GitHub/GitLab für Nicht-Programmierer in einem dreistündigen Workshop am Sonntag, den 19. Mai. https://www.welcome-werkstatt.de/veranstaltungen/git-fuer-nicht-programmierer

mattsches, to android German
@mattsches@phpc.social avatar

Gibt's eigentlich noch aktiv entwickelte und empfehlenswerte GitHub-Clients für Android? Nutze bisher FastHub, aber da geht es offenbar nicht mehr weiter …
#android #GitHub

governa, to github
@governa@fosstodon.org avatar
davidism, to python
@davidism@mas.to avatar

slsa-github-generator v2 now uses upload/download-artifact v4, so I can update those in all the Pallets projects. Turns out the publish workflow for most projects didn't need any changes at all. Only MarkupSafe, with multiple build jobs, needed a little change to use different upload names and combine their downloads. https://github.com/pallets/markupsafe/commit/f4905079ef7573d5c1e8fe1f291f1e353050bc87 #Python #Flask #MarkupSafe #GitHub #SLSA

daniel, to github
@daniel@roe.dev avatar

Going to try to build an AI-powered integration with (+ + ?) to make my life as a maintainer a bit easier.

<rubs hands>

▶️ Streaming now on https://twitch.tv/danielroe

marcel, to github
@marcel@waldvogel.family avatar

Don't trust any random file, just because it lies in a trustworthy #Github project. Because essentially anyone can create files under any project space.
#SecurityWarning
https://www.schneier.com/blog/archives/2024/04/using-legitimate-github-urls-for-malware.html

phranck, to github German
@phranck@chaos.social avatar

What the heck is this repository on #GitHub? There are several of them... 🤔

https://github.com/anuragyantra/china-dictatorship

Wuzzy, to Software
@Wuzzy@cyberplace.social avatar

After the attack, I have a suggestion for all forges (, , , , etc.):
Have some way to visualize binary files better, including diffs to such files. Cuz now, we have basically nothing except byte counters.
Since they're binary files, it must be as generic as possible. But even some rendering or analysis is better than nothing.

The idea is to expose weird patterns in binary files that could be a sign of an attack.

ifiinlist, to github
@ifiinlist@mastodon.social avatar
83r71n, to Cybersecurity

A critical vulnerability, identified as CVE-2024-20356, has been found in Cisco's Integrated Management Controller (IMC). This flaw allows for command injection, potentially giving attackers the ability to gain root access to systems. The vulnerability is located in the web-based management interface of the IMC, which is used for remotely managing Cisco hardware. The issue arises from insufficient user input validation in the IMC interface, allowing an authenticated, remote attacker with administrative privileges to inject malicious commands.

Security researchers from Nettitude have developed a Proof of Concept (PoC) exploit, named "CISCown," to demonstrate this vulnerability. The exploit involves sending crafted commands through the web interface, enabling attackers to execute arbitrary code with root privileges on the underlying operating system of Cisco hardware. This PoC exploit is part of a toolkit developed by Nettitude and is available on GitHub. It uses parameters such as target IP, username, and password to automate the exploitation process and deploy a telnetd root shell service on compromised devices.

The release of this PoC exploit signifies a critical threat level for organizations using affected Cisco products. Gaining root access can lead to data theft, system downtime, and further network compromise. Cisco has responded by releasing software updates to address this vulnerability. It is strongly recommended that all affected organizations apply these updates immediately, as no known workaround mitigates this vulnerability.

The affected products include a range of Cisco servers and computing systems, such as the 5000 Series Enterprise Network Compute Systems (ENCS), Catalyst 8300 Series Edge uCPE, UCS C-Series M5, M6, and M7 Rack Servers in standalone mode, UCS E-Series Servers, and UCS S-Series Storage Servers. Users and administrators are advised to visit Cisco’s official security advisory page and the Nettitude GitHub repository hosting the exploitation toolkit for more detailed information and access to the updates.

https://labs.nettitude.com/blog/cve-2024-20356-jailbreaking-a-cisco-appliance-to-run-doom/

#cybersecurity #cisco #vulnerability #imc #cve #poc #nettitude #encs #ucpe #ucs #m5 #m6 #m7 #github

SylvieLorxu, to github
@SylvieLorxu@chaos.social avatar

Catima 2.29.0 is out!

This release adds support for finding barcodes in PDF files[1] and dealing with multiple barcodes. It also properly colours the status bar during usage now.

As always, it's available on #GitHub, will soon be available on #IzzyOnDroid and will slowly roll out to other app stores.

https://github.com/CatimaLoyalty/Android/releases/tag/v2.29.0

[1] Not sandboxed yet, help welcome in https://github.com/CatimaLoyalty/Android/issues/1804

#Catima #OpenSource #Android

Polynomial_C, to github Catalan
@Polynomial_C@mastodon.social avatar

Visualization and sonification of the commit history of the repository.

video/mp4

wervice, to github
@wervice@fosstodon.org avatar

How does your current project's language graph look?

stevensanderson, to github
@stevensanderson@mstdn.social avatar
nicomen, to github Norwegian Bokmål

So what do we use instead of #github?

claudinec, to github
@claudinec@aus.social avatar

I'm thinking again about moving from to . I firmly believe in paying fair prices for services that don't invade my privacy. My private repos stay inside my home network on a server. I don't use GitHub Actions. Issues and projects are handy but I can use other task tracking systems. I'd probably keep my GitHub account to follow other projects/discussions and for single sign-on needs.

If you've moved your personal code from GitHub to sourcehut, is there anything you regret or would warn others about?

CSB, to github
@CSB@noauthority.social avatar

random :

relistan, to github
@relistan@mstdn.social avatar

Anyone have any idea why #GitHub Actions reliably/repeatably sits on this build step for 15 minutes (see timestamps)?

Line 1103 is a tiny little tool. The repo cloned is big, but not THAT big. #DevOps #CI

Rob_Bos, to github
@Rob_Bos@mstdn.social avatar

Have you seen the first edition of the newsletter we created @xebia? You can also read along online: https://pages.xebia.com/octoinsider. Stay in the know with all the news regularly!

finestructure, to github
@finestructure@mastodon.social avatar

Anyone else using 's Dependabot noticed it stopped working around 2-3 weeks ago? It's not discovering updated dependencies anymore.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • InstantRegret
  • mdbf
  • ethstaker
  • magazineikmin
  • cubers
  • rosin
  • thenastyranch
  • Youngstown
  • osvaldo12
  • slotface
  • khanakhh
  • kavyap
  • DreamBathrooms
  • provamag3
  • Durango
  • everett
  • tacticalgear
  • modclub
  • anitta
  • cisconetworking
  • tester
  • ngwrru68w68
  • GTA5RPClips
  • normalnudes
  • megavids
  • Leos
  • lostlight
  • All magazines