home.social

#module — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #module, aggregated by home.social.

  1. Anyone have suggestions for good Folk Hero adventures? I’m running Nimble but I can adapt from just about any fantasy rpg, from 1e to 5e, from OSR to Pathfinder.

    #TTRPG #OSR #NSR #DnD #ADnD #Pathfinder #Adventure #Module #OutlawsOfTheNorth #OutlawsOfTheMarsh #AllMenAreBrothers #RobinHood #FolkHeroes

  2. Anyone have suggestions for good Folk Hero adventures? I’m running Nimble but I can adapt from just about any fantasy rpg, from 1e to 5e, from OSR to Pathfinder.

    #TTRPG #OSR #NSR #DnD #ADnD #Pathfinder #Adventure #Module #OutlawsOfTheNorth #OutlawsOfTheMarsh #AllMenAreBrothers #RobinHood #FolkHeroes

  3. Anyone have suggestions for good Folk Hero adventures? I’m running Nimble but I can adapt from just about any fantasy rpg, from 1e to 5e, from OSR to Pathfinder.

    #TTRPG #OSR #NSR #DnD #ADnD #Pathfinder #Adventure #Module #OutlawsOfTheNorth #OutlawsOfTheMarsh #AllMenAreBrothers #RobinHood #FolkHeroes

  4. Anyone have suggestions for good Folk Hero adventures? I’m running Nimble but I can adapt from just about any fantasy rpg, from 1e to 5e, from OSR to Pathfinder.

    #TTRPG #OSR #NSR #DnD #ADnD #Pathfinder #Adventure #Module #OutlawsOfTheNorth #OutlawsOfTheMarsh #AllMenAreBrothers #RobinHood #FolkHeroes

  5. Anyone have suggestions for good Folk Hero adventures? I’m running Nimble but I can adapt from just about any fantasy rpg, from 1e to 5e, from OSR to Pathfinder.

    #TTRPG #OSR #NSR #DnD #ADnD #Pathfinder #Adventure #Module #OutlawsOfTheNorth #OutlawsOfTheMarsh #AllMenAreBrothers #RobinHood #FolkHeroes

  6. Fixed my "Dual Clock Module" this morning. Not one for the eye, but at least It's working again.

    #rc2014
    #dual
    #clock
    #module
    #repair
    #openhantek6022

  7. But now, I found a way to do it thanks to continual searching for answers. Basically, I didn’t need to touch #dkms – the dynamic #KernelModule support system but I did need to download a version of the #evdi #module that was compatible with the latest kernels. Building it and then importing the keys was the final step. I suppose at some point a new kernel family will appear, says 6.20, when I will need to update evdi again but I know how it works now. Phew!

    #Fedora #FreeSoftware

  8. #Decentralized #Module #Federation #Microfrontend #Architecture

    I'm working on a #webapp and I'm being #creative on the #approach. It might be considered #overcomplicated (because it is), but I'm just trying something out. It's entirely possible this approach won't work #longterm. I see it as there is #onewaytofindout. I don't recommend this approach. Just sharing what I'm trying/#investigating.

    How it will be #architected: [positive-intentions.com/blog/d
    Some #benefits of the #approach: [positive-intentions.com/blog/s

    I find that #modulefederation and #microfrontends to generally be #discouraged when I see posts, but I think it works for me in my #approach. I'm #optimistic about the approach and the #benefits and so I wanted to #share details.

    When I serve the #federatedmodules, I can also host the #storybook statics so I think this could be a good way to #document the modules in #isolation.

    #Cryptography modules - cryptography.positive-intentio

    #P2P framework - p2p.positive-intentions.com/?p

    This way, I can create #microfrontends that consume these #modules. I can then #share the #functionality between #apps. The following apps are using a different codebase from each other (there is a #distinction between these apps in #opensource and #closesource). Sharing those #dependencies could help make it easier to roll out #updates to #coremechanics.

    #P2P chat - [chat.positive-intentions.com/]
    #P2P file transfer - [file.positive-intentions.com/]

    The #functionality also works when I create an #Android build with #Tauri. This could also lead to it being easier to create #newapps that could use the #modules created.

    I'm sure there will be some distinct #test/#maintenance #overhead, but depending on how it's #architected I think it could work and make it easier to #improve on the current #implementation.

    Everything about the #project is far from finished. It could be seen as this is a #complicated way to do what #npm does, but I think this #approach allows for greater #flexibility by being able to #separate #opensource and #closesource code for the #web. (Of course as #javascript, it will always be "source code available". Especially in the age of #AI, I'm sure it's possible to #reverseengineer it like never before.)

    (mastodon might not be the place for something like this, so let me know if you dont like this kind of content. i typically post on reddit and would like to shift it more towards mastodon. i also use lemmy, but mastodon has a better reach.)

  9. Want to know why #CommonJS was a mistake?
    One phrase. Conditional #module #exports.

    if (condition) {
    module.exports = foo
    } else {
    module.exports = bar
    }

    #javaScript #nodejs #cjs #js #webDev #esm #modules

  10. I'm #impressed by what it accomplishes; it is quite the #feat, and not totally #obvious at first glance.

    But it means that little control module is really quite #complicated, and is a dense little #blob of high-power circuitry. It would be expensive enough just for that.

    But it's much, much worse.

    Because the #control #module is #programmable.

    15/x

  11. Microsoft Signing Key Stolen by Chinese - Schneier on Security

    A bunch of networks, including US Government networks, have been hacked by the Chinese. The hackers used #forged #authentication #tokens to access user email, using a stolen Microsoft Azure account consumer signing key. Congress wants answers.

    The phrase “negligent security practices” is being tossed about—and with good reason. Master signing keys are not supposed to be left around, waiting to be stolen.

    Actually, two things went badly wrong here. The first is that Azure accepted an #expired #signing #key, implying a vulnerability in whatever is supposed to check key validity.

    The second is that this key was supposed to remain in the the system’s #Hardware #Security #Module—and not be in software. This implies a really serious breach of good security practice.

    The fact that #Microsoft has not been forthcoming about the details of what happened tell me that the details are really bad

    schneier.com/blog/archives/202