Onno (VK6FLAB)
Anything and everything Amateur Radio and beyond. Heavily into Open Source and SDR, working on a multi band monitor and transmitter.
#geek #nerd #hamradio VK6FLAB #podcaster #australia #ITProfessional #voiceover #opentowork
- 27 Posts
- 790 Comments
Onno (VK6FLAB)@lemmy.radioto Showerthoughts@lemmy.world•I wonder if it would be possible to force the AI crawlers to mine crypto12·3 days agoThis seems at first glance at least potentially doable.
Create a website with content that’s only rendered with JavaScript and embed a miner.
Your challenge is to get the work product back, but you might be able to create dynamically generated URLs that show up in your logs as the work result.
You’d have to find a way to chunk the work and make it such that the work required is enough to be valuable to you, but not so costly as to stop the crawlers from using your site.
I suspect that in order for this to actually happen you’d have to have a significant infrastructure to deal with the crawler load, which you could instead be using to do the actual work.
Ultimately I suspect that this is the software equivalent of a perpetual motion machine, cute in theory, physically impossible.
Good luck!
Onno (VK6FLAB)@lemmy.radioto KDE@lemmy.kde.social•Touchpad running out of surface and Back gesture2·3 days agoPointer Acceleration Profile and Sensitivity should be able to be adjusted to suit your requirements.
Onno (VK6FLAB)@lemmy.radioto Fuck Cars@lemmy.world•Not Paying Fines? Keep Speeding, Says New York CityEnglish16·3 days agoDoesn’t whomever is writing a ticket have access to the number plates of every driver who had a ruling made against them and is issued with a radio to contact a tow truck on the spot?
Seems like an obvious solution, so I must be missing something.
Onno (VK6FLAB)@lemmy.radioto Hardware@lemmy.world•High-power microwave system downs 49 drones in one shot – weaponized electromagnetic interference erases drone swarms en masseEnglish231·5 days agoWhat’s unclear from the article is what exactly is being disrupted, since microwave radiation (from your microwave oven) is on the same frequency band as 2.4 GHz WiFi, which provides one potential failure mode for a remotely operated drone. Specifically the disruption of communication between the drone(s) and the controller.
However, if the drone is autonomous and not using WiFi at all, the same 2.4 GHz frequency is unlikely to cause damage, unless it’s inducing currents in the on-board CPU or other circuits. This is an entirely different failure mode.
A comment in the article mentions that the drone returns to a safe area, which is what tends to happen if WiFi connectivity is lost.
Furthermore, there’s no information about the actual “microwave frequency”, which goes well beyond 2.4 GHz, technically ranging between 300 MHz and 300 GHz.
Onno (VK6FLAB)@lemmy.radioto Today I Learned@lemmy.world•TIL a volcanic eruption in the Philippines 74,000 years ago reduced humanity to fewer than 10,000 worldwide.English181·5 days agoDid you actually read the article you posted?
Not in the Philippines, but what is now Indonesia.
Sewerage explosion imminent.
Onno (VK6FLAB)@lemmy.radioto Cybersecurity@sh.itjust.works•Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS SoftwareEnglish5·8 days agoThe Australian government has just emailed the following:
ASD’s ACSC is aware of targeting of multiple vulnerabilities within Australia impacting Cisco ASA 5500-X Series models, that are running Cisco ASA Software or FTD software:
CVE-2025-20333 (Critical) – A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code on an affected device.
CVE-2025-20363 (Critical) – A vulnerability in the web services of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, Cisco Secure Firewall Threat Defense (FTD) Software, Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an unauthenticated, remote attacker (Cisco ASA and FTD Software) or authenticated, remote attacker (Cisco IOS, IOS XE, and IOS XR Software) with low user privileges to execute arbitrary code on an affected device.
CVE-2025-20362 (Medium) – A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that should otherwise be inaccessible without authentication.
A number of versions of Cisco software releases are affected, including those within the following ranges:
Cisco ASA Software releases 9.12 to 9.23x and; Cisco FTD Software releases 7.0 to 7.7x.
Please see
https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks for specific version details.
Cisco reports active exploitation of these vulnerabilities has been observed globally.
Onno (VK6FLAB)@lemmy.radioOPto Privacy@lemmy.ml•Australian Under 16 media ban is censorship by stealth and data harvesting by law3·8 days agoThey’ll use machine learning to determine based on your behaviour if you’re under 16, then they’ll ask for proof of age.
Thank you for making my point.
Onno (VK6FLAB)@lemmy.radioOPto Privacy@lemmy.ml•Australian Under 16 media ban is censorship by stealth and data harvesting by law4·8 days agoIn ICT circles, sure, on the nightly news it’s crickets.
Onno (VK6FLAB)@lemmy.radioOPto Privacy@lemmy.ml•Australian Under 16 media ban is censorship by stealth and data harvesting by law11·8 days agoWe know very little beyond:
- It will go live on 10 December 2025
- There will be heavy fines.
- Government ID is not allowed to be the only method.
- A self declaration (tick box) is insufficient as a check.
There are to my knowledge no third party providers approved for this legislation. The process to assess actual implementation details started in July 2025, and the results thus far are underwhelming to put it mildly, you might call it a shitshow.
Below is the official sum total of what we know, most of it motherhood statements and “coming soon”.
https://www.esafety.gov.au/about-us/industry-regulation/social-media-age-restrictions
Media commentary wants to “protect the children”, but have no idea how you might do so, let alone consider the implications or implementation details.
Source: I’m an ICT professional with 40+ years experience.
To migrate historic email you can use Google Takeout.
Onno (VK6FLAB)@lemmy.radioto Sysadmin@lemmy.world•Contractors, Argocd, an AWS account and 2 top level domains3·11 days agoGo with your gut.
Go and see mom and have a nice home cooked meal.
Tailscale and ssh.
Onno (VK6FLAB)@lemmy.radioto Dull Men's Club@lemmy.world•What is the least interesting thing I could post that would get me banned here?9·11 days agoOr you could go the dull route and just ask @[email protected] to just ban you outright for no particular reason.
Mind you, that might be exciting for the rest of us, so make sure you give us fair warning before you go that route.
Except that in civil discussion with experts, other ideas are what helps people arrive at a solution suitable for them and their situation.
I’ll also add that I’ve been a Linux user for 25 years and the toxicity you claim in relation to the Linux community is in my experience not evident as a “major reason”, instead I’ve found it to be innovative and flexible with a wide perspective and approach to problem solving.
Are there dickheads in the Linux community? Yes, just like there are everywhere in society.
Onno (VK6FLAB)@lemmy.radiotomicromobility - Bikes, scooters, boards: Whatever floats your goat, this is micromobility@lemmy.world•This Hybrid Tricycle Lets You Pedal Your Way Onto The Highway At 75MPH While Staying Totally Dry | CarscoopsEnglish141·12 days agoI can’t wait to see their 100 mph unicycle … coming soon no doubt.
From a security perspective I’d be surprised if number of mentions as a metric has any bearing whatsoever on the impact or urgency of a CVE.
If you’re using mentions as a proxy for affected user base, I’d hazard an opinion that there are better ways of determining the impact footprint of a CVE.
Finally, a vulnerability rating or priority is determined and published with each CVE, so I’d expect that this would take into account some of those considerations.
That said, a vendor ranking seems like something that I’ve not seen before, mind you, the notion that Microsoft didn’t make it into the list is gobsmacking considering that patch Tuesday addressed 81 flaws and 2 zero-days in September.
In my opinion, he idea seems useful, but the execution needs some work.