Ponziani

joined 8 months ago
 

Are there any AI open source software / tools / projects that can do image manipulation such as removing backgrounds, or isolating/cutting out a subject or person, or similar things? Manually cutting out things in gimp is a massive PIA and i see there are online tools that seemingly accomplish this using AI but they are locked behind making accounts/credit card/other barriers to get the full size processed image. Surely there must be something out there.

[–] Ponziani@sh.itjust.works 2 points 3 months ago
[–] Ponziani@sh.itjust.works 2 points 3 months ago (2 children)

Im a little knowledgeable with this stuff but i do not know how to see the "handshake" itself, but maybe this is synonymous with what i am doing:

Right click any of the packets (TCP or SSH) > Follow > TCP stream

From there i can see some info about the ssh protocol and connection, as well as the 2 devices communicating (Operating systems used) followed by random gibberish which is the encrypted data.

When I analyze the TCP packet "frames", they contain data including the motherboard manufacturer, but packets themselves look like its just gibberish.

Thanks by the way for trying to help me :)

[–] Ponziani@sh.itjust.works 2 points 3 months ago (4 children)

It looks like everything is in 1 stream, maybe that answers your question? I am capturing traffic only on port 22 briefly while the rsync is running to look at the packets

 

I am trying to use wireshark to verify that my outgoing rsync is encrypted. I can easily see that the SSH protocol packets are reported as "Encrypted packet." The other packets being exchanged are TCP packets, I am not sure how to actually verify if these are encrypted, and if not, if they contain anything sensitive.

Should TCP be encrypted? Can they leak anything when facilitating the ssh connection? How can I tell?

[–] Ponziani@sh.itjust.works 3 points 4 months ago

The only thing missing is a random arrow

[–] Ponziani@sh.itjust.works 3 points 5 months ago

I figured its another black box hell like a google meets or something similar where itll try to grab any detail, data or info about what i am connecting with, and also how trustworthy the E2E encryption is if its proprietary

 

Hello let's say you are absolutely forced to join zoom in the future, is there any way at all to have any security, such as an alternate client that can connect? I expect the answer is no besides only connecting in a browser with add ons or in a sandbox etc etc and nothing truly groundbreaking.

[–] Ponziani@sh.itjust.works 2 points 5 months ago

Thank you both

[–] Ponziani@sh.itjust.works 2 points 5 months ago

Awesome now I understand what you and the other commenter were talking about with aliasing. Well this works perfect without the alias, many thanks

[–] Ponziani@sh.itjust.works 1 points 5 months ago (2 children)

Well my other comement saying this is exactly what i need did not get posted as a reply to your comment, my mistake. I followed rhe example for "/usr/bin/wg/" intending to be able to use

wg show

but it still requires sudo. I tried rebooting and nothing changed, any ideas? I did

type -a wg

to get the command location for the sudoer file.

[–] Ponziani@sh.itjust.works 1 points 5 months ago

This does seem to be exactly what i am looking for. I implemented this and tested it and the command still isn't working yet but i will keep troubleshooting, its probably a silly quirk on my end. Thank you very much!

 

I would like to set a specific command to not require sudo privileges, is there a way to accomplish this? I know you can add commands to the sudoer file to allow certain commands to be used by non root accounts, so maybe there is something similar for adding commands to allow regular users to use?

[–] Ponziani@sh.itjust.works 1 points 5 months ago

Thank you for the info! This is very helpful to me.

[–] Ponziani@sh.itjust.works 2 points 5 months ago (1 children)

But the router must forward the port to allow the VPN to be utilized , meaning that port being forwarded can be scanned/detected i thought?

 

Hello I am wondering if there is increased network/packet security by connecting to a server over ssh through a VPN hosted by that same server as opposed to without first tunneling by VPN. I imagine with or without tunneling through a VPN there would be latency/speed differences too?

 

Hello I am seeking a simple solution to running a list of "chown -R" " commands in script.sh

It takes a long time to sequentially execute all of these chown commands recursively because the directories have so many files. I want to be able to tackle the root level directories in parallel to speed things up. I imagine there must be a simple way to do this while keeping the list of commands in a single file. xargs and some of the other things I saw online looked like bad fits or would be over engineering this problem.

 

I speak French as a second language (not fluently) and I am trying to find somewhere on Lemmy where people who speak French as a first or second language could communicate with me and people with a similar interest. At my level, just trying to go to French Lemmy instances or communities isn't practical, the proficiency difference is way too large. Are there any communities dedicated to what I am trying to describe? If not, maybe i should create something new where people just submit posts in French and people can have discussions on them to practice and build up their vocabulary. It could be like a centralized pen pal community.

 

For black, between QGD and Slav/Semi-slav, which do you prefer and why? I am trying to understand what is appealing on both sides and why you make the tradeoff of potentially blocking in the your light square bishop. Personally, I respond with the Nimzo Indian as black, and when playing as white I hope for QGA or Catalan.

view more: next ›