https://survey.stackoverflow.co/2024/
StackOverflow Developer Survey 2024 结果发布了
StackOverflow Developer Survey 2024 结果发布了
survey.stackoverflow.co
2024 Stack Overflow Developer Survey
In May 2024, over 65,000 developers responded to our annual survey about coding, the technologies and tools they use and want to learn, AI, and developer experience at work. Check out the results and see what's new for Stack Overflow users.
SukkaW/Surge 现已支持:
- sing-box Rule Set Sukka/Surge@75f188f1
- 转换 Surge 的 DOMAIN-WILDCARD 为 Clash 的 DOMAIN-REGEX 和 sing-box 的 domain_regex Sukka/Surge@f3595820
- sing-box Rule Set Sukka/Surge@75f188f1
- 转换 Surge 的 DOMAIN-WILDCARD 为 Clash 的 DOMAIN-REGEX 和 sing-box 的 domain_regex Sukka/Surge@f3595820
GitHub
GitHub - SukkaW/Surge: Rule Snippet & Rule Set for Surge / Mihomo (Clash.Meta) / sing-box
Rule Snippet & Rule Set for Surge / Mihomo (Clash.Meta) / sing-box - SukkaW/Surge
Forwarded from MikroTik.SG (Soragan Ong)
Finally, the wait is over! Winbox 4 is here, now natively supporting Windows, MacOS, and Linux! 🎉
Windows: https://download.mikrotik.com/routeros/winbox/4.0beta1/WinBox_Windows.zip
MacOS: https://download.mikrotik.com/routeros/winbox/4.0beta1/WinBox.dmg
Linux: https://download.mikrotik.com/routeros/winbox/4.0beta1/WinBox_Linux.zip
Windows: https://download.mikrotik.com/routeros/winbox/4.0beta1/WinBox_Windows.zip
MacOS: https://download.mikrotik.com/routeros/winbox/4.0beta1/WinBox.dmg
Linux: https://download.mikrotik.com/routeros/winbox/4.0beta1/WinBox_Linux.zip
Sukka's Notebook
Finally, the wait is over! Winbox 4 is here, now natively supporting Windows, MacOS, and Linux! 🎉 Windows: https://download.mikrotik.com/routeros/winbox/4.0beta1/WinBox_Windows.zip MacOS: https://download.mikrotik.com/routeros/winbox/4.0beta1/WinBox.dmg…
MikroTik 释出了 4.x 版本的 WinBox(仍是 Beta)、原生支持 Windows、macOS 和 Linux,在 macOS 和 Linux 上无需再使用 Wine 启动 WinBox;除此以外,还原生支持暗色模式。
Location Guard Ng 正式发布!
原 Location Guard 浏览器扩展已经不再维护、并即将成为 Google Chrome 移除 Manifest V2 扩展计划的受害者。Location Guard Ng 是一个基于 Location Guard 重写的、可以对你正在访问的网站隐藏/伪装你地理位置的用户脚本(UserScript)、支持 Tampermonkey、Violentmonkey,部分支持 AdGuard。
除了保护你的隐私,Location Guard Ng 也有助于向 Google 提交正确的地理位置信息、防止 IP 送中。
https://location-guard-ng.skk.moe
https://github.com/SukkaW/location-guard-ng
原 Location Guard 浏览器扩展已经不再维护、并即将成为 Google Chrome 移除 Manifest V2 扩展计划的受害者。Location Guard Ng 是一个基于 Location Guard 重写的、可以对你正在访问的网站隐藏/伪装你地理位置的用户脚本(UserScript)、支持 Tampermonkey、Violentmonkey,部分支持 AdGuard。
除了保护你的隐私,Location Guard Ng 也有助于向 Google 提交正确的地理位置信息、防止 IP 送中。
https://location-guard-ng.skk.moe
https://github.com/SukkaW/location-guard-ng
location-guard-ng.skk.moe
Location Guard Ng | Sukka (@SukkaW)
A UserScript that hide/spoof your geographic location from websites | 一个可以对你正在访问的网站隐藏/伪装你地理位置的用户脚本 | Made by Sukka (@SukakW)
https://ruleset.skk.moe/Internal/reject-adguardhome.txt
试验性的 AdGuardHome Blocklist、基于 SukkaW/Surge Reject Base 的数据集(不包含 Reject Extra)生成
试验性的 AdGuardHome Blocklist、基于 SukkaW/Surge Reject Base 的数据集(不包含 Reject Extra)生成
GitHub
GitHub - SukkaW/Surge: Rule Snippet & Rule Set for Surge / Mihomo (Clash.Meta) / sing-box
Rule Snippet & Rule Set for Surge / Mihomo (Clash.Meta) / sing-box - SukkaW/Surge
#PSA #Cloudflare 如果你使用 Cloudflare 的自助服务(没有签订任何 Enterprise 合同),并购买了任何 Cloudflare 按量付费的服务(例如 Cache Reserve、Argo Smart Routing、Image Optimization、Video Delivery、IPFS Gateway),请立刻退订这些服务。Cloudflare 自带的 DDoS 防御(在不自己编写任何 Custom Rules 的情况下)如同厕纸一样一捅就破,并且 Cloudflare 会给你邮寄将近 3 万 5 千 USD 的账单:
https://fxtwitter.com/isukkaw/status/1846950005745340807
https://fxtwitter.com/isukkaw/status/1846950005745340807
FxTwitter / FixupX
Sukka / 毛绒绒的大尾巴🦊 (@isukkaw)
This is how @Cloudflare claims they will give you unlimited DDoS protect for free.
The truth is, if your Cloudflare-protected website gets hit by DDoS and you happen to purchase their addon, @Cloudflare will charge you for 34,489.9 USD.
Quoting 欧式fifty…
The truth is, if your Cloudflare-protected website gets hit by DDoS and you happen to purchase their addon, @Cloudflare will charge you for 34,489.9 USD.
Quoting 欧式fifty…
Go 1.23 默认为
目前已知的相关 issue 有:AWS 基于 Suricata 的防火墙会默认丢弃过长的 TLS Client Hello 导致 Go 1.23 编写的应用无法访问 AWS API( https://github.com/hashicorp/terraform-provider-aws/issues/39311 );AdGuardHome 及其其使用的 DNS 转发库
Go 1.23 更新日志: https://tip.golang.org/doc/go1.23
-----
https://acg.mn/@sukka/113572701104608722
https://fxtwitter.com/isukkaw/status/1862888987595280883
https://bsky.app/profile/skk.moe/post/3lc6hhgg6zc2y
crypto/tls
启用了实验性质的「后量子时代加密 Cipher」X25519Kyber768Draft00,导致通过 Go 1.23 内置的 TLS 实现发送的 TLS Client Hello 从典型的 252 bytes 激增到 1476 bytes。对于一些未正确配置的防火墙或 LB 来说,这会导致使用 Go 1.23 + Go 内置 TLS 实现的客户端 TLS 握手失败。目前已知的相关 issue 有:AWS 基于 Suricata 的防火墙会默认丢弃过长的 TLS Client Hello 导致 Go 1.23 编写的应用无法访问 AWS API( https://github.com/hashicorp/terraform-provider-aws/issues/39311 );AdGuardHome 及其其使用的 DNS 转发库
adguard/dnsproxy
无法和 DNSPod 公共 DNS 的 DoH 和 DoT 完成 TLS 握手(https://github.com/AdguardTeam/AdGuardHome/issues/7357 、 https://www.v2ex.com/t/1094021#reply0 )。Go 1.23 更新日志: https://tip.golang.org/doc/go1.23
-----
https://acg.mn/@sukka/113572701104608722
https://fxtwitter.com/isukkaw/status/1862888987595280883
https://bsky.app/profile/skk.moe/post/3lc6hhgg6zc2y
GitHub
Go 1.23: Additional key exchange mechanism `X25519Kyber768Draft00` causes AWS Network Firewall to drop packets · Issue #39311 ·…
v5.65.0 of the Terraform AWS Provider upgraded to Go 1.23.0, which introduced a minor change to the crypto/tls standard library package: The experimental post-quantum key exchange mechanism X25519K...
https://fxtwitter.com/isukkaw/status/1888162540896788693
https://bsky.app/profile/skk.moe/post/3lhnti7n5y22d
https://bsky.app/profile/skk.moe/post/3lhnti7n5y22d
FxTwitter / FixupX
Sukka / 毛绒绒的大尾巴🦊 (@isukkaw)
So @pnpmjs's onlyBuiltDependencies feature is flawed by default: you don't re-approve to update dependencies.
Let's say you use @rspack_dev and add "rspack/core" to the list, what happens if rspack is compromised and releases a malicious version? It is still…
Let's say you use @rspack_dev and add "rspack/core" to the list, what happens if rspack is compromised and releases a malicious version? It is still…