-
Hi, I have recently discovered Rethink and I was positively surprised to find that it surpasses the powerful NetGuard, that I was using previously, in many aspects. Thank you for this nice and very ef…
-
## Summary
From @fzipi:
This should be valid ctl syntax: `ctl:ruleRemoveTargetById=123456;ARGS:/^mycookie_/`
It doesn't work on ModSecurity: longstanding unfixed issues https://github.com/Spi…
-
Hi everyone ,
I'm implementing uReplicator with latest master branch ( commit 70ac3404bb4517756c6813d3962b77edc7700019 ).
As the another commit on master , after Worker restart, always have lots o…
-
My current `MotionLayout` have many child view (each child view also have some child view) and state, and this visibility of them is base on hot flow so I need to set it programmatically.
Because,…
-
For finding out which files in a directory tree are candidates to be included in the fapolicyd trust file, the `fapolicyd-cli` command with the option `-t` or `--ftype` can be used. The problem is tha…
-
### Describe the bug in detail
Each version of the application from 3.21 onwards are detected as malware by MalwareBytes and quarantined. However, the issue is not present with version 3.20 and previ…
-
A TODO List of things i want to improve and have completed in improving. 👊
### Performance Optimizations
- [x] Remove `table.insert` Here you can see the performance i made the script gain by re…
-
### Bug Description
In a Windows environment, when the OS system proxy is set, using llamaIndex to access the local Ollama environment LLM , It will results in an access error.
Httpx.HTTPStatusErro…
-
Originally filed at https://github.com/spanicker/ip-blindness/issues/14 by @spanicker
>At some point, a service may have confidence that a given request is associated with an abusive client. Perha…
-
Deserialization of data from untrusted users can represent a security flaw. While Copycat and Atomix clusters should never be exposed to untrusted users, there's nevertheless no good reason to have dy…
kuujo updated
8 years ago