Notepad++ is a free (as in “free speech” and also as in “free beer”) source code editor and Notepad replacement that supports several programming languages. Running in the MS Windows environment, its use is governed by GNU General Public License.
Based on the powerful editing component Scintilla, Notepad++ is written in C++ and uses pure Win32 API and STL which ensures a higher execution speed and smaller program size.
The result is Notepad2, a fast and light-weight Notepad-like text editor with syntax highlighting. This program can be run out of the box without installation, and does not touch your system's registry.
Aranya is an access governance and secure data exchange platform for organizations to control their critical data and services. Access governance is a mechanism to define, enforce, and maintain the set of rules and procedures to secure your system’s behaviors. Aranya gives you the ability to apply access controls over stored and shared resources all in one place.
Aranya enables you to safeguard sensitive information, maintain compliance, mitigate the risk of unauthorized data exposure, and grant appropriate access. Aranya’s decentralized platform allows you to define and enforce these sets of policies to secure and access your resources.
The platform provides a software toolkit for policy-driven access controls and secure data exchange. The software is deployed on endpoints, integrating into applications which require granular access controls over their data and services. Endpoints can entrust Aranya with their data protection and access controls so that other applications running on the endpoint need only to focus on using the data for their intended functionality. Aranya has configurable end-to-end encryption built into its core as a fundamental design principle.
A key discriminating attribute of Aranya is the decentralized, zero trust architecture. Through the integration of the software, access governance is implemented without the need for a connection back to centralized IT infrastructure. With Aranya’s decentralized architecture, if two endpoints are connected to each other, but not back to the cloud or centralized infrastructure, governance over data and applications will be synchronized between peers and further operations will continue uninterrupted.
In tcsh, you can do:
(ls $argv > filelist) >& /dev/null
Note that >& redirects both stdout and stderr, but since stdout has already been redirected elsewhere only the stderr will make it through to /dev/null
Today’s world requires us to make complex and nuanced decisions about our digital security. Evaluating when to use a secure messaging app like Signal or WhatsApp, which passwords to store on your smartphone, or what to share on social media requires us to assess risks and make judgments accordingly. Arriving at any conclusion is an exercise in threat modeling.
Are your links not malicious looking enough?
This tool is guaranteed to help with that!
What is this and what does it do?
This is a tool that takes any link and makes it look malicious. It works on the idea of a redirect. Much like https://tinyurl.com/ for example. Where tinyurl makes an url shorter, this site makes it look malicious.
Place any link in the below input, press the button and get back a fishy(phishy, heh...get, it?) looking link. The fishy link doesn't actually do anything, it will just redirect you to the original link you provided.
Notion just released version 3.0, complete with AI agents. Because the system contains Simon Willson’s lethal trifecta, it’s vulnerable to data theft though prompt injection.
First, the trifecta:
The lethal trifecta of capabilities is:
- Access to your private data—one of the most common purposes of tools in the first place!
- Exposure to untrusted content—any mechanism by which text (or images) controlled by a malicious attacker could become available to your LLM
- The ability to externally communicate in a way that could be used to steal your data (I often call this “exfiltration” but I’m not confident that term is widely understood.)
This is, of course, basically the point of AI agents. //
The fundamental problem is that the LLM can’t differentiate between authorized commands and untrusted data. So when it encounters that malicious pdf, it just executes the embedded commands. And since it has (1) access to private data, and (2) the ability to communicate externally, it can fulfill the attacker’s requests. I’ll repeat myself:
This kind of thing should make everybody stop and really think before deploying any AI agents. We simply don’t know to defend against these attacks. We have zero agentic AI systems that are secure against these attacks. Any AI that is working in an adversarial environment—and by this I mean that it may encounter untrusted training data or input—is vulnerable to prompt injection. It’s an existential problem that, near as I can tell, most people developing these technologies are just pretending isn’t there.
It’s official: AOL’s dial-up internet has taken its last bow.
AOL previously confirmed it would be pulling the plug on Tuesday (Sept. 30) — writing in a brief update on its support site last month that it “routinely evaluates” its offerings and had decided to discontinue dial-up, as well as associated software “optimized for older operating systems,” from its plans.
Dial-up is now no longer advertised on AOL’s website. As of Wednesday, former company help pages like “connect to the internet with AOL Dialer” appeared unavailable — and nostalgic social media users took to the internet to say their final goodbyes.
Shootings at houses of worship and religious schools are happening at an alarming rate. I’m not just talking about Christian churches either; assailants have hit synagogues and Mormon congregations as well. As I write this, news of a stabbing attack at a synagogue in the UK on Yom Kippur is fresh on my mind as well.
What are churches to do? I’ve never been one to call for gun control and never will be — besides, the UK’s gun-grabbing fanaticism has only made stabbings more of a threat, as the Yom Kippur attack demonstrates. //
“Reverend, if you’re going to reprimand me, at least let me indulge my habit of quoting scripture and dead philosphers, after all somebody has to keep Augustine from rolling in his grave. Our Lord said ‘But now, if you have a purse, take it, and also a bag; and if you don't have a sword, sell your cloak and buy one.’
Also, Thomas Aquinas wrote in his Summa Theologica: 'one who defends his life is not guilty of murder, even if he is forced to deal a fatal blow, for it is preferable to defend oneself than to submit to the will of evildoers."
And as Edmund Burke—famously reminded us: ‘The only thing necessary for the triumph of evil is for good men to do nothing.’
But, Reverend, I want to be clear: I’m not standing guard. I’m just sitting in the pews like everyone else—albeit with a little extra peace of mind in under my jacket in case trouble finds us.” And I patted my hip holster.
I want to change The GUI Listen Address from 127.0.0.1:8384 to 0.0.0.0:8384 from syncthong cli config gui
syncthing cli config gui raw-address set 0.0.0.0:8384Destiny is a secure file transfer application that allows people to transfer files without needing to reveal their identities to each other or the service provider. All files are end-to-end encrypted, meaning no one except the sender and the receiver can decrypt the contents. Users select a file on their device and then share the generated code with the intended recipient for safe delivery. No sign-up is needed.
Just copy the config.xml, cert.pem and key.pem. I actually have a Syncthing folder setup on remote devices to sync that back to a trusted local machine (folders are setup send-only, receive-only).
If you save the config.xml the remote Device IDs and folder IDs (as well as local paths) are already saved.
If you save the cert.pem and key.pem you have saved your own device ID. It is impossible to recreate the Device ID without these, so saving the local device fingerprint (“Device ID”) is unnecessary.
No need to make note of all those folder IDs and remote device IDs unless you want to reconstruct the config because the config.xml was not saved.
As long as the local folder paths are the same:
- For safety, set all the remote folders to “Send Only”.
- Install Syncthing on the replacement device (wait for an automatic upgrade if needed).
- Stop Syncthing.
- Copy over the config.xml, cert.pem and key.pem that you saved from the old device.
- Start Syncthing.
- It will see that the folders don’t exist and should create them and copy files back.
- Once they are in sync, set the remote folders back to “Send & Receive”.
Note that any .stignore files you had on the old device will be lost because they are not synced, and do not get stored in the config.xml.
One workaround is to use an #include file in the .stignore and maintain the Ignore patterns there. But it makes maintenance more onerous because to edit the ignore patterns you have to open that file with another app.
Where its possible, you can use identical ignore patterns on both sides; it is redundant, but it preserves the patterns. This is not always possible.
A final alternative is to run a periodic script to copy every .stignore to device-parent-folder.stignore (where device- is hard-coded in your script). This file would be synced.
Switching from the deprecated official version
Switching is easier than you may think!
Microsoft has removed the classic calculator app starting in Windows 10 and replaced it with a new UWP app that receives updates from the Store. Many people aren't happy with this change. The classic app loaded faster, and was more useful for mouse and keyboard users. Here you can get the classic calculator back in Windows 11 and Windows 10.
Welcome to Universal Paperclips|
A small and fast Windows screensaver featuring the green "Matrix" cipher-code seen in the popular films by the same name, directed by Andy and Lana Wachowski and starring Keanu Reeves, among others. Optionally, you can add messages to be decoded and displayed in real-time.
If you’re trying to debloat Windows 10 or 11, you’re probably wondering which tool to use. Try Win11Debloat, an open-source & easy-to-use one-line tool; download it now.
If you're forced to use Windows 11, here's how to steal some of your time back • The Register Forums
Win11Debloat
go to github and look up Win11Debloat.
open source, source code entirely transparent, over 20 thousand stars.
save yourself a boatload of time and effort.
thank me later.
Mongrel
Re: Win11Debloat
I've been using O & O Shutup since Win10 to cut out the intrusive crap from the OS, WinAero Tweaker allows more customisation as well.
At the heart of the issue, at least in the case itself, is that Montana's permitless carry law basically says that everyone who isn't expressly forbidden from carrying a gun is considered licensed, and the federal law says people with licenses can carry in the buffer area around a school. The Biden administration argued that no, the licensing had to be explicit--something the law doesn't seem to actually state, for the record--and so he was in violation of federal law.
Metcalf's defense is that he literally had no reason to believe any such thing, which is fair.
However, a bigger issue is the existence of this area outside of the school grounds themselves.
See, the federal law doesn't account for permitless carry as most states have it, nor does it account for things like reciprocity. You have to be licensed in that state in order to just walk past a school on the sidewalk, which is a problem.
This is something most people are going to be unaware of when traveling, for one thing, just as they're not going to be aware of where all the schools in a given city might be. Just following Google Maps could land you a felony charge, simply because Google didn't know you needed to be so many feet away from a school because you're lawfully carrying a firearm.
It's ridiculous. //
California Curmudgeon
7 hours ago
Wasn’t he also within his own yard when he was arrested? Living within 1000 feet of a school should not override your rights.
Regardless, the editorial authors signal that Coca-Cola has become a first-line treatment for bezoars, and several case reports and studies support its use. A 2024 randomized controlled trial involving 160 patients in China with phytobezoars concluded that "Timely ingestion of Coca-Cola yields significant benefits, including a complete dissolution rate of 100 percent, a low incidence of gastric ulcers, no need for fragmentation, and reduced expenses."
While it's unclear what the woman's bezoar was made of—she didn't report eating an excessive amount of persimmons—it was most likely some type of phytobezoar. As such, doctors put her on a plan to drink 3,000 milliliters (about 8.5 cans) of cola in 12 hours. Given that the woman also had Type 2 diabetes, they prescribed diet cola. //
The next day, the woman "reported a sudden tugging sensation in her abdomen, followed by a prompt decrease in her nausea and abdominal discomfort." Taking another look with an endoscope, the doctors confirmed that the bezoar was gone.
As to how it formed in the first place, the doctors tied it to her use of semaglutide. As a GLP-1 weight-loss drug, one of its effects is slowing down stomach emptying. That in turn can create conditions for a bezoar to form.