mastodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance, open to everyone, but mainly English and French speaking.

Administered by:

Server stats:

817
active users

#configuration

2 posts2 participants0 posts today

🗒️ Allouée, mémoire allouée

Augmenter la mémoire allouée à PHP, dans une config blog WordPress derrière un serveur nginx :

  1. Afficher les messages d’erreur dans WordPress :
    • dans wp-config.php
      • WP_DEBUG à true
      • WP_DEBUG_DISPLAY à true
  2. Trouver le fichier de conf nginx correspondant :
    • /etc/php/8.3/fpm/pool.d/nom_du_site.conf
    • /etc/init.d/php/8.3/fpm/pool.d/nom_du_site.conf
  3. Changer la valeur de :
    • php_admin_value[memory_limit]
  4. Redémarrer le service :
    • /etc/init.d/php8.3-fpm restart

* 8.3 numéro actuel de la version de PHP

Guide to Interpreting Security Incident #Announcements:

"extremely sophisticated attack" : The attackers put more time into the attack than we spent designing our defences.

"no evidence customer #data was accessed" : We lack audit records and the logs have been rotated out.

"due to a misconfiguration issue" : We deployed with default #insecure settings.

"possible for only a short window" : We didn't dig too deep to determine how far back the bug existed.

"crafted invalid request data" : We forgot to add input #validation.

"supplementary fix" : We didn't understand the problem as well as we thought, so our previous fix was insufficient.

"may have been exploited" : We're positive they got away with data, but they deleted our #logs.

"multiple threat actors" : Everyone was in our systems before we noticed.

"most customers are unaffected" : There are corner cases that aren't as #vulnerable.

"error in a third-party component" : We forgot to update our dependencies.

"could lead to remote code execution" : You're #p0wned.

"malicious activity has been observed" : The issue has already appeared in the press.

"review equipment inventory to verify if devices require other mitigations" : You need to buy new stuff.

"remotely exploited to allow authentication bypass" : We forgot to require #login for this function.

"not aware of any exploits in the wild" : The attackers aren't bragging on darkweb fora yet.

I may apply some of these configurations.

"In this post, I’ll go through some of the perhaps obscure Git config settings that I have personally globally enabled and go into them to explain what they do and why they should probably be the default settings.

Also, it turns out that I learned most of these from the people who actually work on the core Git codebase every day."

blog.gitbutler.com/how-git-cor

GitButler · How Core Git Developers Configure GitWhat `git config` settings should be defaults by now? Here are some settings that even the core developers change.

#Settings in #reticulum #meshchat #reticulummeshchat #rns for #lora #radio #mesh Always set your stationary / radio #rnode #rnodes to be #gateway nodes (#interfaces) for effective #routing in your #mesh. See Sect 6.14 of rns #reticumlumnetworkstack manual
reticulum.network/manual/Retic
(and of course always also as #transport node else message packets from other nodes won't spread) Set the settings in the #configuration file or #update the #meshchat program now & set to gateway in the settings menu.