Advertisement · 728 × 90

Posts by

Ein Talk auf den #ChemnitzerLinuxTage über das Virtualisierungssystem was wir auch für unsere Mitglieder VMs verwenden.

#KVM #Qemu #LXC

ffmuc.media.ccc.de/events/clt/2...

#clt2025 #clt25

Andere interessante Vorträge:
ffmuc.media.ccc.de/events/clt/2...
ffmuc.media.ccc.de/events/clt/2...

1 year ago 1 1 0 0
Preview
GitHub - freifunkMUC/homebrew-proxyguard-client: Proxyguard-client homebrew Formular with wrapper script for MacOS Proxyguard-client homebrew Formular with wrapper script for MacOS - freifunkMUC/homebrew-proxyguard-client

Here is a homebrew tap to install the proxyguard-client for #Wireguard on #MacOS.

It also provides a little wrapper to setup the correct routes etc

github.com/freifunkMUC/...

This way you can easily use Wireguard over HTTP/HTTPs.

1 year ago 3 2 0 0
Post image

Schnellster #Freifunk Deutschlands?

Vielleicht sind wir das nun :D.

Seit heute haben wir eine Gesamtkapazität von 280Gbps!

Vielen Dank an unsere Sponsoren
#Anexia #DECIX #Inter.Link #LWLCom und #WiitCloud

#Usemorebandwidth

stats.ffmuc.net/d/cee86neevz...

1 year ago 2 1 0 0

I see some unpleasant debugging situations in the future

1 year ago 1 1 0 0
Post image

This is a very sneaky change in @golang 1.24 and not a great one.

https://tip.golang.org/doc/go1.24

This is prone to cause security issues and weird behavior.

1 year ago 1 1 1 1
Post image Post image Post image Post image

#DKNOG was awesome as always! Now back to Munich

1 year ago 2 0 0 0
Post image

On my way to #CPH, see you all #DKNOG 🛫

1 year ago 4 0 1 0
Post image Post image Post image

Some pictures of the new switches for @freifunkmuc.bsky.social

1 year ago 2 1 0 0
Advertisement

Successfully swapped the switch for @freifunkmuc.bsky.social in Vienna 🚀🎉.

#UseMoreBandwidth

1 year ago 1 1 0 0

Am 12.02 um 9 Uhr werden wir Wartungsarbeiten in unserem Wiener RZ durchführen.

Damit der Impact möglichst gering ist, bitte tragt euch unser Münchner Rechenzentrum auch als DNS Server ein!

185.150.99.255
2001:678:ed0:f000::

1 year ago 1 1 0 1
Post image Post image

New Server for @media.ccc.de added

@freifunkmuc.bsky.social

1 year ago 6 1 0 0
Post image Post image

This works extremely painless #XboxGamePass streaming on #SteamDeck

And there is an official guide.
support.microsoft.com/en-us/topic/xbox-cloud-g...

1 year ago 1 0 0 0
Post image

When you need to get from 1G copper to 40G DAC. That’s the correct method right? 🤣😂

Prepping a server for @c3voc sponsored by @FreifunkMUC

1 year ago 8 2 0 0

Hallo zusammen wird sind nun auch hier aktiv 🎉

1 year ago 2 1 0 0
Reddit
My team's intern just found a critical bug by shitposting in our codebase
Join
So our summer intern (who l'm 90% sure is a professional shitposter moonlighting as a dev) just saved our entire authentication service by being, well, an absolute agent of chaos.
Background: We have this legacy auth system that's been running since before TikTok existed.
No one touches it. It's documented in ancient Sanskrit and COBOL comments. The last guy who understood it fully left to become a yoga instructor in Peru.
Enter our intern. First week, he asks why our commit messages are so boring. Starts adding memes to his. Whatever, right? Then he begins leaving comments in the codebase like:
/ This function is older than me and probably pays taxes
// TODO: Ask if this while loop has health insurance
// Here lies Sarah's hopes and dreams (2019-2022), killed by this recursive call
The senior devs were split between horrified and amused. But here's where it gets good.
He's reading through the auth code (because "the commit messages here are too normal, sus") and adds this gem:
Il yo why this token validation looking kinda thic though
I/ fr fr no cap this base64 decode bussin
// wait... hold up... this ain't bussin at all
Turns out his Gen Z spider-sense wasn't just tingling for the memes. Man actually found a validation bypass that's been lurking in our code since Obama's first term. The kind of bug that makes security auditors wake up in cold sweats.
The best part? His Jira ticket title: "Auth be acting mad sus rn no cap frfr (Critical Security Issue)"
The worst part? We now have to explain to the CEO why "no cap frfr" appears in our Q3 security audit report.
The absolute kicker? Our senior security engineer's official code review comment: "bestie... you snapped with this find ngl"
I can't tell if this is the peak or rock bottom of our engineering culture. But I do know our intern's getting a return offer, if only because I need to see what he'll do to our GraphQL documentation.

Reddit My team's intern just found a critical bug by shitposting in our codebase Join So our summer intern (who l'm 90% sure is a professional shitposter moonlighting as a dev) just saved our entire authentication service by being, well, an absolute agent of chaos. Background: We have this legacy auth system that's been running since before TikTok existed. No one touches it. It's documented in ancient Sanskrit and COBOL comments. The last guy who understood it fully left to become a yoga instructor in Peru. Enter our intern. First week, he asks why our commit messages are so boring. Starts adding memes to his. Whatever, right? Then he begins leaving comments in the codebase like: / This function is older than me and probably pays taxes // TODO: Ask if this while loop has health insurance // Here lies Sarah's hopes and dreams (2019-2022), killed by this recursive call The senior devs were split between horrified and amused. But here's where it gets good. He's reading through the auth code (because "the commit messages here are too normal, sus") and adds this gem: Il yo why this token validation looking kinda thic though I/ fr fr no cap this base64 decode bussin // wait... hold up... this ain't bussin at all Turns out his Gen Z spider-sense wasn't just tingling for the memes. Man actually found a validation bypass that's been lurking in our code since Obama's first term. The kind of bug that makes security auditors wake up in cold sweats. The best part? His Jira ticket title: "Auth be acting mad sus rn no cap frfr (Critical Security Issue)" The worst part? We now have to explain to the CEO why "no cap frfr" appears in our Q3 security audit report. The absolute kicker? Our senior security engineer's official code review comment: "bestie... you snapped with this find ngl" I can't tell if this is the peak or rock bottom of our engineering culture. But I do know our intern's getting a return offer, if only because I need to see what he'll do to our GraphQL documentation.

Gold. 😂

www.reddit.com/r/csMajors/s...

1 year ago 42 15 1 2
Post image Post image

Did you know @kentik.bsky.social's free Cloud Latency Map now includes Alibaba Cloud?

Latency from inside China to the world exhibit two distinct patterns.
#1: Shanghai to regions in North America:
clm.kentik.com?q=1949efa82d...
#2: Shanghai to regions outside NA:
clm.kentik.com?q=1949efa82d...

1 year ago 4 1 2 1

Eine kleine Geschichte aus Digitalien: Ich gehören zu einem Jahrgang, dass mein rosa Führerschein mit dem schicken Foto vom Juni 1991 nicht mehr hip genug ist. Daher muss eine Karte her. Da wir ja in München schon weit vorne sind (wink @lsdornheim.bsky.social), kann man die online beantragen. 1/

1 year ago 4 1 2 0
Advertisement
Post image Post image

Lot's of traffic at @freifunkMUC today for #38c3 content :D.

Find it here: silo.ffmuc.net/38c3/congres...

And stats here:
stats.ffmuc.net/d/kUoZ2DRWz/...

We are also supporting the official mirror of media.ccc.de

1 year ago 1 0 0 0

#38c3 mirror on a tower?

Try this: https://silo.ffmuc.net/38c3/

Stats:
stats.ffmuc.net/d/V1sioJN7k/mikrotik-mon...

Webcam:
https://silo.ffmuc.net

1 year ago 1 1 0 0

A good talk about XDP, eBPF and io_uring at #38c3

silo.ffmuc.net/38c3/38c3-33...

1 year ago 5 1 0 0

I made a little dashboard thing for BMW CarData.
It's neither complete nor perfect but if you want to play with it:
https://bmwtools.awlnx.space

If you don't have a BMW here is some demo data you can upload:
https://cloud.ffmuc.net/s/GCfDFt7A3GqyJD4

1 year ago 0 0 0 0
Post image

And a bit more fun with the BMW data in the archive, a charger history.

1 year ago 0 0 0 0
Post image

Fun with the BMW CarData Archive again :D.

HYC50 slowly creeping up and trying to compete with my AC sessions :D.

1 year ago 0 0 0 0

If you want to test #DNSCrypt #DoH #DoT the @freifunkMUC servers are happy to take your traffic :).

Ofc researchers or experiments are also welcome.

doh.ffmuc.net - IPv4: 5.1.66.255 / 185.150.99.255 IPv6: 2001:678:e68:f000:: / 2001:678:ed0:f000::

#38c3

1 year ago 2 1 0 0

Merry christmas everyone 🎉❤️

1 year ago 1 0 0 1
Post image

And here comes the first traffic 🚀

1 year ago 2 0 0 0
Post image Post image

What I do when I don‘t work? 😂Add more capacity to @FreifunkMUC

1 year ago 1 1 0 0
Advertisement
Preview
AWS Announces Super-aggregates, Massively Expands BGP Footprint Just after 15:30 UTC on December 11, 2024, AWS began announcing over 1000 new prefixes including numerous super-aggregate prefixes covering…

Just after 15:30 UTC on Dec 11, 2024, @awscloud.bsky.social began announcing 1000+ new BGP prefixes covering nearly all of the cloud provider's assigned IP space.

As a result, the total amount of IP space originated by AS16509 increased 3x for IPv4 and 25x for IPv6!

www.kentik.com/analysis/aws...

1 year ago 11 5 0 1
Post image

Postet it on X a while back

1 year ago 3 0 1 0

And they even have it on a big post next to Gas prices.

1 year ago 1 0 1 0