Kazani's avatar
Kazani
kazani@primal.net
npub1vm68...srrc
Beloved Bitcoin. Promo code: KAZANI ➡️ https://foundation.xyz/passport-prime
Kazani's avatar
Kazani 1 year ago
📶 Uptime Kuma. • Convenient open source tool for monitoring network resources. Can send alerts to you in Telegram, Discord, Gotify, Slack, Pushover, Email and a bunch of other different services. Allows you to monitor the expiration date of SSL certificates, sites via HTTP, DNS records, open TCP ports, the status of Docker containers, SQL servers and a bunch of other different things: • On the downside, there is a lack of monitoring of server parameters (disk space, load). • You can, of course, use Zabbix, but for many it will be a heavyweight and redundant solution.
Kazani's avatar
Kazani 1 year ago
Run DeGoogled phones, Linux Computers, and self-host your own Nextcloud online ecosystem.
Kazani's avatar
Kazani 1 year ago
You're unhappy as long as you seek validation from others—whether it's about how much money you've made or the lifestyle you’re living. In doing so, you transfer your mental stress onto those validating you. They now want the same life, but 99% of them won’t achieve it. Worse, they’re not willing to put in the effort because you've made it look easy. People love success stories but ignore the context. Most internet success comes from luck or obsessive focus on making money. The truly successful never show off; they don’t care about validation. They're at peace with what they have. They understand success is a spectrum—you need to find your place on it, without losing your morality.
Kazani's avatar
Kazani 1 year ago
Len Sasseman. Remember the name
Kazani's avatar
Kazani 1 year ago
DunkedIn New version of LinkedIn where everybody shares the stories of their failures. So that others can read and feel at ease that they aren’t the only loser.
Kazani's avatar
Kazani 1 year ago
"Talk is cheap. Show me the code." —Linus Torvalds (Creator of Linux)
Kazani's avatar
Kazani 1 year ago
Who is the father of computer security? August Kerckhoffs, a linguist and German professor at HEC, wrote an essay in the Journal of Military Science in February 1883. Kerckhoff had unwittingly established the foundations for contemporary encryption, earning him the title of “Father of Computer Security.”
Kazani's avatar
Kazani 1 year ago
YouTube Starts Shadowbanning Accounts for Using VPN ❌ Shadowbanning results in content being unavailable when trying to watch a video . These restrictions apply to both the web version and mobile apps , but the platform makes no official statements about this . Experts associate this measure with the fight against the manipulation of paid views . 🤷🏼‍♀️ ☝🏻The shadowban cannot be bypassed using VPN , incognito mode or repeated logins; the only way out for users is to create backup accounts . Technical problems have been observed since August , and support volunteers warn that the ban is not expected to be lifted.
Kazani's avatar
Kazani 1 year ago
Always have a comma in your password, that way if it is part of a leak it will break the CSV file.
Kazani's avatar
Kazani 1 year ago
A new HBO documentary 'Money Electric: The #Bitcoin Mystery' claims to have cracked the true identity of the pseudonymous creator of Bitcoin, Satoshi Nakamoto—Politico The big reveal is set to air next Wednesday at 2 a.m. CET (Tuesday at 9 p.m. EST). I think we make a hell of a case in the film, and I think that who we land on is unexpected and is going to result in a fair amount of controversy. I think that people are going to debate it regardless of how strong of a case we made, and that’s fine. That’s the nature of this space. We had a lot more evidence than we were able to include in the film. But it’s going to be up to the audience—how they view the case, how they view the evidence, and whether or not they’re convinced.
Kazani's avatar
Kazani 1 year ago
Kopia is an open-source backup tool with E2E encryption and deduplication. Unlike traditional tools , it allows you to back up individual files and directories rather than creating complete system images . Both GUI and command line versions are available , making it convenient for both professionals and casual users .
Kazani's avatar
Kazani 1 year ago
AI is not going to replace humans. Humans who use AI are going to replace ordinary humans. The sad part is that 33% of humans do not have internet access. #AI = 11,000-year-old human slavery will be back!
Kazani's avatar
Kazani 1 year ago
GM #Nostr 🫂💜⚡ People who are not trustworthy are the ones who are most suspicious about everything.
Kazani's avatar
Kazani 1 year ago
🌐🔐 Personal data protection during investigations for OSINT specialist. Part 1 - Traffic tunneling. Traffic tunneling in the context of data protection is necessary to hide the real IP address of your computer and many other network data about your connection + in our case it is also necessary to encrypt traffic from the Internet provider and everyone who is "sitting on the wire". 📡 We will need a VPN + VPN bundle. ❓ Why not just VPN? By means of a request to the provider/SORM - it is possible to obtain data about who was connected to this IP address (VPN) at that time and in response to this request you will be given away, and you will not even have to request data from the VPN itself or the data center where this VPN is located - deanonymization will occur bypassing this. Why not links with anonymizers like TOR? (VPN + TOR, VPN + Lokinet, VPN + i2p, etc.). 1. Such connections often provide low connection speeds , which is not suitable for online investigations. 2. Such anonymizers (TOR, i2p, Lokinet) often have a "dirty" IP address - therefore, with such an IP address, it will be impossible to register accounts for investigations, and sometimes you will not even be able to simply access a website with such IP addresses. 3. Doubtful privacy of transmitted data - often the output nodes of such anonymizers are monitored for the purpose of intercepting data/deanonymization/theft of cryptocurrency, etc. Accordingly, the fact that you are digging on someone may become known to someone else. So, we have decided on the type of protection. Let's move on. ⚙ How to set up? There are 2 options: 1. Special clients of VPN services that have a double VPN function. For example, the VPN provider iVPN has the ability to enable double VPN mode directly from the official client. 2. 1 VPN on the host - 2 VPN on the virtual machine for work. ⁉️ How to use? Each investigation has its own IP address. You can't use the same IP address for different investigations - otherwise the investigations can be linked together and it will be easy to understand that the same person is behind them all. ⛓‍💥 Killswitch is a function that if the VPN is turned off, then the entire Internet on the computer is turned off. The Internet bypassing the VPN does not work. Be sure to enable this function in your VPN client (iVPN also has this function). Before starting the investigation, visit the site - it will show how your computer looks from the site. There you can check the IP address (so that it is from the second VPN) and check some device fingerprints. This is necessary for a check before the investigation - so as not to forget to turn on something.
Kazani's avatar
Kazani 1 year ago
What’s your age and how often do you talk to your parents?
Kazani's avatar
Kazani 1 year ago
Soon™ is Now! Sidekick is officially out in the wild and ready to join you on your private crypto adventures. Go find your forgotten older phone and visit sidekick.monerujo.app for all the info. 🔐📱📲💸 #Monero