九维我操你爹
There's a security issue from magisk. see https://github.com/topjohnwu/Magisk/issues/7636
知名 Python 爬虫库 Requests 作者因狂躁症失业:在线求资助、找工作
https://www.ithome.com/0/740/465.htm
https://www.ithome.com/0/740/465.htm
如果推特所谓的下线 circle 功能就是把它隐藏起来的话,那我现在也终于成为了 circle 用户,而且我的 circle 圈子里只有一个垃圾黄推账号🙃
由于致远服务器 (mirrors.sjtug.sjtu.edu.cn) 存储盘满,其上所有仓库于 2 天前同步中断。我们正在释放存储空间,受影响的仓库预计会在 12 小时内恢复同步。
另,由于 julia 仓库占用空间极大 (6TB),用户量较低,我们正在考虑将其同步方式转换为反向代理+缓存。在转换期间,所有指向 julia 镜像的流量将会被重定向至北京大学开源镜像站 (https://mirrors.pku.edu.cn/)。在此感谢北京大学开源镜像站的协助!
另,由于 julia 仓库占用空间极大 (6TB),用户量较低,我们正在考虑将其同步方式转换为反向代理+缓存。在转换期间,所有指向 julia 镜像的流量将会被重定向至北京大学开源镜像站 (https://mirrors.pku.edu.cn/)。在此感谢北京大学开源镜像站的协助!
https://terrapin-attack.com/
Who is vulnerable?
Almost everyone. The Terrapin attack exploits weaknesses in the SSH transport layer protocol in combination with newer cryptographic algorithms and encryption modes introduced by OpenSSH over 10 years ago. Since then, these have been adopted by a wide range of SSH implementations, therefore affecting a majority of current implementations.
In practice, our attack can be applied against any connection using either ChaCha20-Poly1305 or any CBC-mode cipher in combination with the Encrypt-then-MAC paradigm. Theoretically, CTR-mode ciphers in combination with the Encrypt-then-MAC paradigm are vulnerable as well, although this weakness cannot be exploited in a real-world scenario.
https://fedoraproject.org/wiki/Changes/KDE_Plasma_6
https://fedoraproject.org/wiki/Changes/RPMCoW
https://fedoraproject.org/wiki/Changes/F40_MariaDB_MySQL_repackaging
https://fedoraproject.org/wiki/Changes/BuildJdkOncePackEverywhere
https://fedoraproject.org/wiki/Changes/PortingToModernC
fedora 40 的改动计划真的好有吸引力(除了那个垃圾的 dnf5 以外
狠狠地期待了
https://fedoraproject.org/wiki/Changes/RPMCoW
https://fedoraproject.org/wiki/Changes/F40_MariaDB_MySQL_repackaging
https://fedoraproject.org/wiki/Changes/BuildJdkOncePackEverywhere
https://fedoraproject.org/wiki/Changes/PortingToModernC
fedora 40 的改动计划真的好有吸引力(除了那个垃圾的 dnf5 以外
狠狠地期待了