drspod

joined 2 years ago
[–] [email protected] 3 points 1 day ago

No, "we" don't.

[–] [email protected] 36 points 1 day ago (2 children)

This is not a federated bandcamp, it's a platform for bands to do marketing across mutliple various social networks from one web portal.

[–] [email protected] 7 points 4 days ago (1 children)

Godus was a huge disappointment, basically a "what if Populous was a mobile skinner-box clicker with time-gating and micro-transactions?"

[–] [email protected] 3 points 4 days ago

Magic Carpet (1994) was a really interesting take on the genre, also by Bullfrog. Imagine the god-sim mechanics of Populous combined with a 3D flight-sim/shooter and you get Magic Carpet.

[–] [email protected] 15 points 4 days ago

Their post is specifically about Populous: The Beginning which came out in 1998 and was the first Populous game to use 3D graphics. It has quite different mechanics than the original Populous games, and you can see the DNA of Black & White emerging, with the concept of having a leader character that has an important role in the gameplay.

[–] [email protected] 49 points 1 week ago (15 children)

I've been using Firefox since the beginning, before that Mozilla, and before that Netscape Navigator.

But I think it's finally time to switch to Librewolf.

I don't want digital advertising of any kind, even if my privacy is "preserved" through fancy data-laundering.

 

Description: "Featured is a playthrough of a blitz chess game between Rodrigo Vasquez and Vladimir Kramnik from an Early Titled Tuesday event which was held on October 17th, 2023. Kramnik recently admitted, via a YouTube comment on this topic of fair play surrounding him, that he played several tournaments under someone else’s chess.com account. This act violates chess.com’s Fair Play Policy. Kramnik played under Denis Khismatullin’s account, “Krakozia”. I share reasons why this is a violation of fair play policy, how a player can be negatively impacted because of it, and provide Kramnik’s YouTube comments where he attempts to explain it all."

 

cross-posted from: https://lemmy.ml/post/4912712

Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users.

If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google's Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware.

Don't click on search ads or, even better, use an ad-blocker so that you never see them in the first place!

 

Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users.

If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google's Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware.

Don't click on search ads or, even better, use an ad-blocker so that you never see them in the first place!

 

A reported Free Download Manager supply chain attack redirected Linux users to a malicious Debian package repository that installed information-stealing malware.

The malware used in this campaign establishes a reverse shell to a C2 server and installs a Bash stealer that collects user data and account credentials.

Kaspersky discovered the potential supply chain compromise case while investigating suspicious domains, finding that the campaign has been underway for over three years.

 

[SOLVED]: The issue was caused by having "Show read posts" unticked in Settings. This will hide your own posts from you!

I recently made a post^[1]^ to this community about a bug that I experienced and reported.

The post does not appear in the New feed for /c/lemmy_support nor does it appear in my user profile under Posts ^[2]^.

However the post does have 3 replies (from users on multiple different instances) which means that other users can see it across the fediverse, so it's not a federation issue. (Also, my account and the community are both hosted on the same instance - lemmy.ml).

I was not subscribed to /c/lemmy_support at the time I made that post, but I am subscribed now to see if that affects my visibility of this post.

Is this a bug, or am I misunderstanding how lemmy works?

Interestingly, if I view my profile while logged out, it does show the posts that I made, but when logged in it shows zero posts in my profile.

[1] https://lemmy.ml/post/1394597

[2]

 

See the images attached to the linked bug report. Where it usually says my username in the top-right, another user's name appeared. This happened twice in the last two days.

I submitted the bug to the lemmy-ui project, but I'm not certain if this is a lemmy-ui problem, or a problem with the specific infrastructure setup of lemmy.ml, or even a backend issue.

Any advice on whether I should post this bug report to somewhere else for greater visibility would be welcome. This could be indicative of a fairly serious security issue (or it could be a completely cosmetic bug).

view more: next ›