mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,4 Tsd.
aktive Profile

#techtuesday

0 Beiträge0 Beteiligte0 Beiträge heute

Declaring Metapendence – Threads

Last week, I wrote about alternatives to Meta’s WhatsApp. While WhatsApp offers end-to-end encryption, the many privacy issues with both Meta in general and WhatsApp in particular provide many reasons to stay away or move away from WhatsApp. I, myself, have never used WhatsApp, but I want to be as thorough as possible in providing solutions for the Meta problem.

This week, we take a look at Threads, the micro blogging service which Meta released in 2023 to take advantage of the mass exodus […]

medi-nerd.com/2025/06/24/decla

Every Tuesday at 11:00am ET, join the pgEdge team for #TechTuesday — all about mastering Distributed #PostgreSQL high availability, and edge-ready database solutions. Whether you’re scaling apps or seeking zero downtime, these sessions are packed with hands-on insights, real-world demos, and live Q&A with the experts.

Don’t miss out! Learn more here: hubs.la/Q03qbnT70

Join us on Tuesday at 11am ET here: hubs.la/Q03qbltY0

hubs.laTech TuesdaysTune in every Tuesday to join our Postgres experts and distributed Postgres solution architects

Content Owners and Publishers, Get Paid in More Ways!

By integrating Web Monetization, you can:

✅ Offer flexible payment options for your audience
✅ Receive real-time micropayments with no delays
✅ Enhance your existing revenue streams

📢 Benjamin Bellamy from Castopod believes that Web Monetization can support both creators and consumers.

🔗 Download the beta extension today: webmonetization.org/supporters

Web Monetization makes it easier than ever to offer new payment solutions, and getting started is simple:

1️⃣ Download the Web Monetization beta extension:
👉 Chrome | Firefox | Edge

2️⃣ Sign up for an Interledger Wallet to start supporting and engaging with content in a whole new way!

3️⃣ Connect your wallet and explore flexible payment options for your consumers.

Want to get started? Learn more at: webmonetization.org/

Announcement: Beta Launch of Web Monetization!

Web Monetization is here to offer more content support for owners and publishers, while consumers can access content on their own terms.

Today, we announce the beta release of the Web Monetization extension, allowing for seamless micropayments powered by Interledger Wallets.

Read all the details in our blog: interledger.org/news/announcin

#TechTuesday
This #Lemmy post programming.dev/post/22672085 links to the recording of the talk I gave earlier in the year, about how #dotNet #dotNetMAUI and other #programmers #developers can get the most out of #Mastodon and the #Fediverse in general. Show to people you want to come here, or watch yourself if you feel like you could learn more about it.

CC @andypiper @evanprodromou@evanp.me @evanprodromou@socialwebfoundation.org @Gargron @mapache @alvinashcraft @alvinashcraft.com @jamesmontemagno

programming.dev"Finding your way around the Fediverse" recording - programming.devEarlier this year I gave this talk which is about how programmers can get the most of the Fediverse, particularly for dotnet/MAUI developers - some of the killer features which are available and how to use them. The focus of the examples are with dotnet/MAUI, but these things would undoubtedly also be available for other languages/ecosystems, I was just using dotnet/MAUI to illustrate the underlying functionality available to us here. This recording would be good for anyone who isn’t familiar with these features (maybe anyone you want to convince to come here, or just if you feel you don’t know everything that is available). The first part of the recording is a different talk about MAUI, and the first link below will be where my talk starts, and then some more links for other key points, if you just want to see the parts you don’t already know about. Following these recording links will be links to resources that I talked about… 30:06 start/MAUI Lemmy community [https://youtu.be/hCzYawTqnT4?si=sDQXhygjxDBQPitL&t=1806] 31:31 overview of talk [https://youtu.be/hCzYawTqnT4?si=izcKF3v1mtdqu3FZ&t=1891] 33:20 what is the Fediverse? [https://youtu.be/hCzYawTqnT4?si=qkcwJq1LZ0IgdGbv&t=2000] 38:15 Lemmy [https://youtu.be/hCzYawTqnT4?si=cUdRxzt-zbtSZsCW&t=2295] 42:08 Mastodon [https://youtu.be/hCzYawTqnT4?si=02oTLWHQ9IsZSFAq&t=2528] 43:40 Mastodon dotnet.social [https://youtu.be/hCzYawTqnT4?si=alg3HYcUZNagjHac&t=2620] 46:33 Mastodon Local timeline [https://youtu.be/hCzYawTqnT4?si=WIpFq8h1Oh7ooYua&t=2793] 48:01 Mastodon Federated timeline [https://youtu.be/hCzYawTqnT4?si=9Gh1Dz8FYigBv3qR&t=2881] 60:11 Mastodon Lists [https://youtu.be/hCzYawTqnT4?si=zoIl6VtHiCEBZnDs&t=3011] 56:28 Mastodon hashtags [https://youtu.be/hCzYawTqnT4?si=njy2vmPxeTSm8YYC&t=3388] 56:25 Mastodon pinned posts [https://youtu.be/hCzYawTqnT4?si=3nAWOpnG95W8rQHZ&t=3566] 1:00:20 follow Twitter accounts from Mastodon [https://youtu.be/hCzYawTqnT4?si=23Dwa58JrSHNssm2&t=3620] 1:01:51 how to use Lemmy from Mastodon [https://youtu.be/hCzYawTqnT4?si=JxBjpdeoMasVhGpt&t=3711] 1:07:25 Mastodon’s killer feature for dev’s - github bots [https://youtu.be/hCzYawTqnT4?si=i3JsdK39Ffehx9ep&t=4045] 1:10:47 Guide to Mastodon for .NET and MAUI people [https://youtu.be/hCzYawTqnT4?si=VZps5Df6oljHcVBr&t=4247] 1:13:15 Pixelfed, UI comparison [https://youtu.be/hCzYawTqnT4?si=Q3_cba-A-cAdN_KM&t=4430] 1:15:41 Maho Pacheco’s repo (federate static website, etc.) [https://youtu.be/hCzYawTqnT4?si=lbmmpMTf7nESMjxo&t=4541] 1:17:52 Microsoft DevBlogs [https://youtu.be/hCzYawTqnT4?si=Y61LToQMQ_Utnas_&t=4672] Links to resources from this talk Creating MAUI UI’s in C# [https://dev.to/smartmanapps/creating-maui-uis-in-c-1adf] fediverse.party [https://fediverse.party/] .NET MAUI @ programming.dev [https://programming.dev/c/dotnetmaui] .NET MAUI Mastodon bot [https://dotnet.social/@dotnetmaui@programming.dev] .NET Mastodon bot [https://dotnet.social/@bot] @SmartmanApps@dotnet.social [https://dotnet.social/@SmartmanApps] Join dotnet.social [https://dotnet.social/invite/q8pzN9rL] Join dotnet.social and auto-follow @SmartmanApps@dotnet.social [https://dotnet.social/invite/JntHpwzG] How to follow multiple hashtags in a column [https://dotnet.social/@SmartmanApps/110858924945208556] @Microsoft@bird.makeup [https://bird.makeup/users/microsoft] Github bots by Carlos Sanchez of Microsoft [https://dotnet.social/@foo_fighter]… Dotnet github bot [https://dotnet.social/@dotnetbot] MAUI github bot [https://dotnet.social/@mauibot] MastodonGitHubBot repo [https://github.com/ChayoteJarocho/MastodonGitHubBot] Guide to Mastodon for dotNetMAUI and dotNet peeps [https://dotnet.social/@SmartmanApps/110648925352232498] Github repo [https://github.com/mahomedalid] of Maho Paheco of Microsoft [https://dotnet.social/@mapache@hachyderm.io] Maho’s guide to implement ActivityPub in a static site (or any website) [https://maho.dev/2024/02/a-guide-to-implement-activitypub-in-a-static-site-or-any-website/] Follow Maho’s blog [https://dotnet.social/@blog@maho.dev] from Mastodon (or almost any Fediverse service!) Follow Microsoft DevBlogs [https://dotnet.social/@msftdevblogs] (federated thanks to Maho)

#TechTuesday
ICYMI did you know that you can use your #mouse #ScrollWheel to #scroll horizontally? All you have to do is hold down the shift-key at the same time. I saw (and boosted) a post about this recently, and it's life-changing - so much easier than trying to grab the thin and almost invisible scroll-bar! (thanks Microsoft for making everything harder to use due to your never-ending commitment to giving us changes we didn't want)

#web#UI#accessibility

Solar energy is a clean, renewable power source. It’s harnessed using solar panels which are made up of solar cells.

Solar energy is sustainable, reduces carbon footprints, and is an important step towards a greener future. This new factory, bringing jobs and training to Albuquerque, was make possible by the Inflation Reduction Act. #DemocratsDeliver #TechTuesday #GreenTech #RenewableEnergy #Solar

New solar cell manufacturing factory will bring 900 jobs to Albuquerque:
nmpoliticalreport.com/quick-re

Antwortete im Thread

@ErikvanStraten sorry for the late reply, I've been quite busy and your post quite long.

You made a lot of valid points. For a #LutraKnows post - which usually aims to explore a single term - most of them probably go too deep, which is why we skipped over them in the original post. But I think it might be an interesting topic for #TechTuesday. I have suggested it as a topic to the college in charge.

Attackers typically use masquerading to either trick users into running a malicious file, confuse defenders, or attempt to blend into a target environment. Today, we will take a look at the MITRE TTP "Masquerading: Right-to-Left Override" (T1036.002) and will see, how an attacker can use this feature to their advantage.

First things first: What is "Right-to-Left Override" (RTLO) anyway? As we all know, there are languages that are written from left to right and others that are written from right to left. In computers, the RTLO Unicode character U+202E makes this possible. This character can be used to force a right-to-left direction for text. As an example, let's look at the string "LutraSecurity" and see what happens when we insert the RTLO character in the middle: "Lutra[U+202E]Security" (where [U+202E] is the RTLO character). This string will then be displayed as "LutraytiruceS", because the RTLO character reverts everything after it, in this case the "Security".

So what can an attacker do with this? In filenames, they can abuse RTLO to conceal the true extension of a file. For example, let's say you find the following file somewhere on a network drive:

Salaries-And-Benefits-Annexe.pdf

You know that a PDF is mostly harmless, so you double-click it to see what's inside. But your PDF viewer will not open. This is because you have actually just run an .exe file.

Why? Because the filename of the file is not really "Salaries-And-Benefits-Annexe.pdf". The attacker has added the RTLO character to reverse the last characters of the filename to make it look like a PDF ("exe.pdf" instead of "fdp.exe"). So the actual filename is "Salaries-And-Benefits-Ann[U+202E]fdp.exe".

Bad news is: There isn’t much that can be done about that. The only thing possible is to look out for files that have the inherently benign RTLO character within their filename. This can be done with a filesystem minifilter. But of course, this only works if right-to-left languages are rarely used in your organization. Otherwise there will be too many false positives.

#itsecurity#ttp#mitre

During a cyber attack, the attacker is very likely to try to gain access to more credential material to escalate privileges and move laterally through the network. One technique to acquire new credentials on Windows systems is dumping the LSASS process memory, which contains credential material for logged in users, among other things.

There are many ways for an attacker to extract those secrets from the memory of this process. One example is by the use of Mimikatz by Benjamin Delpy, one of the best known tools in the hacker space. It can access and analyze the LSASS process memory to get hashes, Kerberos tickets and in some cases even cleartext passwords. Of course, it is flagged as malicious by pretty much any antivirus solution.

Another tool that can dump the LSASS process memory, that probably almost everyone knows (and is not immediately flagged by antivirus), is the Windows Task Manager. With it, an attacker can easily create a dump file of the LSASS process, download that dump file to another machine and analyze it locally.

So it is clear that protecting LSASS is a main priority on Windows systems. To achieve this, opened/duplicated handles to the LSASS process should be closely monitored, LSA protection/PPL should be enabled and SeDebugPrivileges should be restricted. To minimize the impact of an attacker dumping LSASS you should add privileged users to the Protected Users group and enable Restricted Admin mode.

Of course, many mitigations can be bypassed when an attacker can execute code in the kernel. Therefore, make sure to use Microsoft's vulnerable driver blocklist, restrict who can load kernel drivers and closely monitor related events such as driver loads.

#itsecurity#ttp#mitre

🚀 Today's Tip is for the #Excel Enthusiasts! 📊✨

Tired of images floating on top of your Excel sheet? Say goodbye to the struggle! 🖼️ With the revolutionary IMAGE formula, you can seamlessly insert images into your worksheet cells.

👉 Learn how to use the IMAGE formula to keep your images neatly within cells, maintaining that perfect aspect ratio. 📏💡Explore sizing options, from fitting to the cell to creating custom dimensions with a breeze! 💻📐

No more copy-pasting woes! 🔄 Watch my video to discover the ultimate way to insert those images into your worksheets!
🎥 buff.ly/3GhMCll