The explanation that made it click for me a while ago was by someone who implemented a shader https://www.alanzucconi.com/2017/10/10/atmospheric-scatterin... — the explanations that don't end up producing an image all seemed to skip over one detail or another.
> the explanations that don't end up producing an image all seemed to skip over one detail or another.
Implementation can be wonderfully useful as both a test of, and a forcing function for, really understanding something. At least when ground-truth (ie tests) is available.
As a dev, if you use a private method, you've just taken ownership of the problem. I suggested to you in our contract not to do it, and that it would likely not be supported, and you did it anyway. Fix your shit, common software or not.
This is what an Apple engineer could write in the electron's github issue if they refused to fix it.
We're not discussing that, but that they have pushed an update without proper testing. You can see from the other comments that breakage is not limited to people using private methods.
Well, mimicking China's GFW is seemingly the objective of some governments. But they are also able to allow some light (text-based) ssh usage and still prevent proxying.
Skilled in not falling for the kind of malware, that Defender is able to catch.
It’s not a very high bar: I have not seen it find anything in a long time, neither on my machines, nor on the ones I inspected after they had been owned.
Accidentally stumbled on this and not sure what problem you're solving: not wanting to type the server name into the `mstsc.exe` window? Not having to re-type credentials across connections?
I have a few servers and workstations I tend to connect to several times a day for work, also occasionally I'll remote back to my home PC when at the office.
These connections belong to different clients and have different gateway or specific settings I like to use. Most of the issues can be resolved by simply having a dedicated folder with the `.rdp` files in them, but some of the servers I connect to have short session timeouts, which make it more difficult than it needs to be to be productive. The app launches Devolutions `mstscex.exe` which provides a 'MouseJiggler' feature which tries to keep the session active. (I've opted to pass args to the binary instead of associating Devolutions `mstscex.exe` with `.rdp` files.)
Self-managing the `.rdp` files could also mean that in the future I could implement encryption of those files to make it safer to carry around on a `USB drive` without fear of loosing it etc.
Apart from that, it's also nice to be able to launch `Meld RDP` and simply press `Ctrl+3` to connect to the 3rd connection for instance. :-)
Short version seems to be that no, your esp32-based devices aren’t remotely exploitable via radio, as some understood the original article to claim. The issue is that there are some undocumented commands that the “host” (code running on the esp chip) can send to the Bluetooth controller.
reply