#vhd — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #vhd, aggregated by home.social.
-
Ihr habt Anfang des Monats die Ausgabe von VH|D|igital verpasst oder möchtet sie nochmal nachschauen?
Kein Problem, denn die Folge mit dem Titel "Hausarbeiten mit einem Klick?" mit Patricia Wohner ist jetzt auch unserem TIB AV-Protal Account abrufbar!
Jetzt Nachschauen 👉 https://doi.org/10.5446/72780
#NFDI4Memory #VHD #VHDigital #AI #KI #DigitalHistory #DigitalHumanities
-
Ihr habt Anfang des Monats die Ausgabe von VH|D|igital verpasst oder möchtet sie nochmal nachschauen?
Kein Problem, denn die Folge mit dem Titel "Hausarbeiten mit einem Klick?" mit Patricia Wohner ist jetzt auch unserem TIB AV-Protal Account abrufbar!
Jetzt Nachschauen 👉 https://doi.org/10.5446/72780
#NFDI4Memory #VHD #VHDigital #AI #KI #DigitalHistory #DigitalHumanities
-
Ihr habt Anfang des Monats die Ausgabe von VH|D|igital verpasst oder möchtet sie nochmal nachschauen?
Kein Problem, denn die Folge mit dem Titel "Hausarbeiten mit einem Klick?" mit Patricia Wohner ist jetzt auch unserem TIB AV-Protal Account abrufbar!
Jetzt Nachschauen 👉 https://doi.org/10.5446/72780
#NFDI4Memory #VHD #VHDigital #AI #KI #DigitalHistory #DigitalHumanities
-
Ihr habt Anfang des Monats die Ausgabe von VH|D|igital verpasst oder möchtet sie nochmal nachschauen?
Kein Problem, denn die Folge mit dem Titel "Hausarbeiten mit einem Klick?" mit Patricia Wohner ist jetzt auch unserem TIB AV-Protal Account abrufbar!
Jetzt Nachschauen 👉 https://doi.org/10.5446/72780
#NFDI4Memory #VHD #VHDigital #AI #KI #DigitalHistory #DigitalHumanities
-
Ihr habt Anfang des Monats die Ausgabe von VH|D|igital verpasst oder möchtet sie nochmal nachschauen?
Kein Problem, denn die Folge mit dem Titel "Hausarbeiten mit einem Klick?" mit Patricia Wohner ist jetzt auch unserem TIB AV-Protal Account abrufbar!
Jetzt Nachschauen 👉 https://doi.org/10.5446/72780
#NFDI4Memory #VHD #VHDigital #AI #KI #DigitalHistory #DigitalHumanities
-
Even though I can't play this #VHD copy of #Highlander...I assume it's the exact same transfer of this #Laserdisc which I *can* play.
-
Even though I can't play this #VHD copy of #Highlander...I assume it's the exact same transfer of this #Laserdisc which I *can* play.
-
Even though I can't play this #VHD copy of #Highlander...I assume it's the exact same transfer of this #Laserdisc which I *can* play.
-
Even though I can't play this #VHD copy of #Highlander...I assume it's the exact same transfer of this #Laserdisc which I *can* play.
-
Even though I can't play this #VHD copy of #Highlander...I assume it's the exact same transfer of this #Laserdisc which I *can* play.
-
Yep, it finally happened; I now own a copy of #Highlander on a video format I can't actually play.
This isn't a #laserdisc, it's a #VHD (Video High Density)!
-
Yep, it finally happened; I now own a copy of #Highlander on a video format I can't actually play.
This isn't a #laserdisc, it's a #VHD (Video High Density)!
-
Yep, it finally happened; I now own a copy of #Highlander on a video format I can't actually play.
This isn't a #laserdisc, it's a #VHD (Video High Density)!
-
Yep, it finally happened; I now own a copy of #Highlander on a video format I can't actually play.
This isn't a #laserdisc, it's a #VHD (Video High Density)!
-
Yep, it finally happened; I now own a copy of #Highlander on a video format I can't actually play.
This isn't a #laserdisc, it's a #VHD (Video High Density)!
-
Hausarbeiten mit einem Klick? KI und akademische Integrität in der Geschichtswissenschaft
KI hat die Prüfungssituation in vielen Fächern auf den Kopf gestellt. Die NFDI4Memory-Vortragsreihe VH|D|igital nimmt diese Problematik in der morgigen Sitzung auf.
🗓️ Mi, 4. März 2026, 16 Uhr
📍 Online: https://uni-frankfurt.zoom-x.de/j/63680502173?pwd=1I6S3QWBUf7axfdOlFd4SKeqMcaXp5.1Die Vortragsreihe richtet sich an alle Interessierten und findet kostenlos online statt. Eine Anmeldung zum Onlinevortrag ist nicht erforderlich.
-
Hausarbeiten mit einem Klick? KI und akademische Integrität in der Geschichtswissenschaft
KI hat die Prüfungssituation in vielen Fächern auf den Kopf gestellt. Die NFDI4Memory-Vortragsreihe VH|D|igital nimmt diese Problematik in der morgigen Sitzung auf.
🗓️ Mi, 4. März 2026, 16 Uhr
📍 Online: https://uni-frankfurt.zoom-x.de/j/63680502173?pwd=1I6S3QWBUf7axfdOlFd4SKeqMcaXp5.1Die Vortragsreihe richtet sich an alle Interessierten und findet kostenlos online statt. Eine Anmeldung zum Onlinevortrag ist nicht erforderlich.
-
Hausarbeiten mit einem Klick? KI und akademische Integrität in der Geschichtswissenschaft
KI hat die Prüfungssituation in vielen Fächern auf den Kopf gestellt. Die NFDI4Memory-Vortragsreihe VH|D|igital nimmt diese Problematik in der morgigen Sitzung auf.
🗓️ Mi, 4. März 2026, 16 Uhr
📍 Online: https://uni-frankfurt.zoom-x.de/j/63680502173?pwd=1I6S3QWBUf7axfdOlFd4SKeqMcaXp5.1Die Vortragsreihe richtet sich an alle Interessierten und findet kostenlos online statt. Eine Anmeldung zum Onlinevortrag ist nicht erforderlich.
-
Hausarbeiten mit einem Klick? KI und akademische Integrität in der Geschichtswissenschaft
KI hat die Prüfungssituation in vielen Fächern auf den Kopf gestellt. Die NFDI4Memory-Vortragsreihe VH|D|igital nimmt diese Problematik in der morgigen Sitzung auf.
🗓️ Mi, 4. März 2026, 16 Uhr
📍 Online: https://uni-frankfurt.zoom-x.de/j/63680502173?pwd=1I6S3QWBUf7axfdOlFd4SKeqMcaXp5.1Die Vortragsreihe richtet sich an alle Interessierten und findet kostenlos online statt. Eine Anmeldung zum Onlinevortrag ist nicht erforderlich.
-
Look y’all, it can’t be a political shitstorm ALL the time. We have to leave time for #infosec shitstorms too! Major new #malware on the loose.
Here’s the TLDR from the researchers:
#Securonix Threat Research has been tracking a stealthy malware campaign that uses an uncommon chain of #VHD abuse, script-based execution, self-parsing batch logic, fileless PowerShell injections and ultimately dropping #RAT. The attack leverages IPFS-hosted VHD files, extreme script obfuscation, runtime decryption, and in-memory shellcode injection into trusted Windows processes, never dropping a decrypted binary to disk.In English: Malware is delivered via what looks like a PDF. This pdf will open and run a virtual hard drive (vhd), able to execute code without leaving a trace. It’s beautiful, but evil as fuck.
What to do? Don’t open files from unknown senders.
#deadvaxhttps://www.securonix.com/blog/deadvax-threat-research-security-advisory/
-
Look y’all, it can’t be a political shitstorm ALL the time. We have to leave time for #infosec shitstorms too! Major new #malware on the loose.
Here’s the TLDR from the researchers:
#Securonix Threat Research has been tracking a stealthy malware campaign that uses an uncommon chain of #VHD abuse, script-based execution, self-parsing batch logic, fileless PowerShell injections and ultimately dropping #RAT. The attack leverages IPFS-hosted VHD files, extreme script obfuscation, runtime decryption, and in-memory shellcode injection into trusted Windows processes, never dropping a decrypted binary to disk.In English: Malware is delivered via what looks like a PDF. This pdf will open and run a virtual hard drive (vhd), able to execute code without leaving a trace. It’s beautiful, but evil as fuck.
What to do? Don’t open files from unknown senders.
#deadvaxhttps://www.securonix.com/blog/deadvax-threat-research-security-advisory/
-
Look y’all, it can’t be a political shitstorm ALL the time. We have to leave time for #infosec shitstorms too! Major new #malware on the loose.
Here’s the TLDR from the researchers:
#Securonix Threat Research has been tracking a stealthy malware campaign that uses an uncommon chain of #VHD abuse, script-based execution, self-parsing batch logic, fileless PowerShell injections and ultimately dropping #RAT. The attack leverages IPFS-hosted VHD files, extreme script obfuscation, runtime decryption, and in-memory shellcode injection into trusted Windows processes, never dropping a decrypted binary to disk.In English: Malware is delivered via what looks like a PDF. This pdf will open and run a virtual hard drive (vhd), able to execute code without leaving a trace. It’s beautiful, but evil as fuck.
What to do? Don’t open files from unknown senders.
#deadvaxhttps://www.securonix.com/blog/deadvax-threat-research-security-advisory/
-
Look y’all, it can’t be a political shitstorm ALL the time. We have to leave time for #infosec shitstorms too! Major new #malware on the loose.
Here’s the TLDR from the researchers:
#Securonix Threat Research has been tracking a stealthy malware campaign that uses an uncommon chain of #VHD abuse, script-based execution, self-parsing batch logic, fileless PowerShell injections and ultimately dropping #RAT. The attack leverages IPFS-hosted VHD files, extreme script obfuscation, runtime decryption, and in-memory shellcode injection into trusted Windows processes, never dropping a decrypted binary to disk.In English: Malware is delivered via what looks like a PDF. This pdf will open and run a virtual hard drive (vhd), able to execute code without leaving a trace. It’s beautiful, but evil as fuck.
What to do? Don’t open files from unknown senders.
#deadvaxhttps://www.securonix.com/blog/deadvax-threat-research-security-advisory/
-
Look y’all, it can’t be a political shitstorm ALL the time. We have to leave time for #infosec shitstorms too! Major new #malware on the loose.
Here’s the TLDR from the researchers:
#Securonix Threat Research has been tracking a stealthy malware campaign that uses an uncommon chain of #VHD abuse, script-based execution, self-parsing batch logic, fileless PowerShell injections and ultimately dropping #RAT. The attack leverages IPFS-hosted VHD files, extreme script obfuscation, runtime decryption, and in-memory shellcode injection into trusted Windows processes, never dropping a decrypted binary to disk.In English: Malware is delivered via what looks like a PDF. This pdf will open and run a virtual hard drive (vhd), able to execute code without leaving a trace. It’s beautiful, but evil as fuck.
What to do? Don’t open files from unknown senders.
#deadvaxhttps://www.securonix.com/blog/deadvax-threat-research-security-advisory/
-
Unsere Kolleg:innen der AG Digitale Geschichtswissenschaft, @VHD haben einen Call for Hosts für die Digital History Tagung 2028 veröffentlicht.
Die Tagung findet alle zwei Jahre statt. An wechselnden Standorten fungiert die Konferenz als zentrale Plattform für den wissenschaftlichen Austausch der deutschen digital arbeitenden Geschichtswissenschaft.
Vielleicht wollt Ihr 2028 mit eurer Institution Gastgeber:in sein?
Hier geht's zum Call: https://digigw.hypotheses.org/
-
Unsere Kolleg:innen der AG Digitale Geschichtswissenschaft, @VHD haben einen Call for Hosts für die Digital History Tagung 2028 veröffentlicht.
Die Tagung findet alle zwei Jahre statt. An wechselnden Standorten fungiert die Konferenz als zentrale Plattform für den wissenschaftlichen Austausch der deutschen digital arbeitenden Geschichtswissenschaft.
Vielleicht wollt Ihr 2028 mit eurer Institution Gastgeber:in sein?
Hier geht's zum Call: https://digigw.hypotheses.org/
-
Unsere Kolleg:innen der AG Digitale Geschichtswissenschaft, @VHD haben einen Call for Hosts für die Digital History Tagung 2028 veröffentlicht.
Die Tagung findet alle zwei Jahre statt. An wechselnden Standorten fungiert die Konferenz als zentrale Plattform für den wissenschaftlichen Austausch der deutschen digital arbeitenden Geschichtswissenschaft.
Vielleicht wollt Ihr 2028 mit eurer Institution Gastgeber:in sein?
Hier geht's zum Call: https://digigw.hypotheses.org/
-
Unsere Kolleg:innen der AG Digitale Geschichtswissenschaft, @VHD haben einen Call for Hosts für die Digital History Tagung 2028 veröffentlicht.
Die Tagung findet alle zwei Jahre statt. An wechselnden Standorten fungiert die Konferenz als zentrale Plattform für den wissenschaftlichen Austausch der deutschen digital arbeitenden Geschichtswissenschaft.
Vielleicht wollt Ihr 2028 mit eurer Institution Gastgeber:in sein?
Hier geht's zum Call: https://digigw.hypotheses.org/
-
Unsere Kolleg:innen der AG Digitale Geschichtswissenschaft, @VHD haben einen Call for Hosts für die Digital History Tagung 2028 veröffentlicht.
Die Tagung findet alle zwei Jahre statt. An wechselnden Standorten fungiert die Konferenz als zentrale Plattform für den wissenschaftlichen Austausch der deutschen digital arbeitenden Geschichtswissenschaft.
Vielleicht wollt Ihr 2028 mit eurer Institution Gastgeber:in sein?
Hier geht's zum Call: https://digigw.hypotheses.org/
-
When you have workflows like mine it's unreasonable to have dozens of slow usb sticks ready to dd distributions on. It's cumbersome to index / manage so many slow devices. USB sticks also live much shorter than 2.5" SSD's here. I've had some working for years (mostly reads) And some fail in weeks after many writes, for me unreliable storage devices
Ventoy has become a vital tool ISO mangagement and booting for me, since I can dump bootable ISO''s of most OS's on SATA SSD's, structure the ISO's in logical directory flows and have a librarian oversight of them
I can mount the SSD via an USB3 tray and thus move hundreds of ISO's around without a fuzz. I use 2.5" SATA SSD's because they are large enough in physical dimensions to be handled easily and I can write and ID on them with a marker. They can also live for years of R/W operations without failing.
Ventoy can easily boot a variety ISO/WIM/IMG/VHD(x)/EFI of OS's which are of various origin.
>> Ventoy is an open source tool to create bootable USB drive for ISO/WIM/IMG/VHD(x)/EFI filesWhen a ISO++ fails to boot, you need to make the coder(s) of Ventoy aware of it, and chances are that in the next update, scripts have been finetuned so Ventoy can handle that family of files also.
Ventoy is easy to use update run & maintain for the end user.
Try Ventoy
https://www.ventoy.net/en/index.html
#Ventoy #ISO #Linux #BSD #VHD #IMG #EFI #Linux #OpenSource #BOOT #POST
-
When you have workflows like mine it's unreasonable to have dozens of slow usb sticks ready to dd distributions on. It's cumbersome to index / manage so many slow devices. USB sticks also live much shorter than 2.5" SSD's here. I've had some working for years (mostly reads) And some fail in weeks after many writes, for me unreliable storage devices
Ventoy has become a vital tool ISO mangagement and booting for me, since I can dump bootable ISO''s of most OS's on SATA SSD's, structure the ISO's in logical directory flows and have a librarian oversight of them
I can mount the SSD via an USB3 tray and thus move hundreds of ISO's around without a fuzz. I use 2.5" SATA SSD's because they are large enough in physical dimensions to be handled easily and I can write and ID on them with a marker. They can also live for years of R/W operations without failing.
Ventoy can easily boot a variety ISO/WIM/IMG/VHD(x)/EFI of OS's which are of various origin.
>> Ventoy is an open source tool to create bootable USB drive for ISO/WIM/IMG/VHD(x)/EFI filesWhen a ISO++ fails to boot, you need to make the coder(s) of Ventoy aware of it, and chances are that in the next update, scripts have been finetuned so Ventoy can handle that family of files also.
Ventoy is easy to use update run & maintain for the end user.
Try Ventoy
https://www.ventoy.net/en/index.html
#Ventoy #ISO #Linux #BSD #VHD #IMG #EFI #Linux #OpenSource #BOOT #POST
-
When you have workflows like mine it's unreasonable to have dozens of slow usb sticks ready to dd distributions on. It's cumbersome to index / manage so many slow devices. USB sticks also live much shorter than 2.5" SSD's here. I've had some working for years (mostly reads) And some fail in weeks after many writes, for me unreliable storage devices
Ventoy has become a vital tool ISO mangagement and booting for me, since I can dump bootable ISO''s of most OS's on SATA SSD's, structure the ISO's in logical directory flows and have a librarian oversight of them
I can mount the SSD via an USB3 tray and thus move hundreds of ISO's around without a fuzz. I use 2.5" SATA SSD's because they are large enough in physical dimensions to be handled easily and I can write and ID on them with a marker. They can also live for years of R/W operations without failing.
Ventoy can easily boot a variety ISO/WIM/IMG/VHD(x)/EFI of OS's which are of various origin.
>> Ventoy is an open source tool to create bootable USB drive for ISO/WIM/IMG/VHD(x)/EFI filesWhen a ISO++ fails to boot, you need to make the coder(s) of Ventoy aware of it, and chances are that in the next update, scripts have been finetuned so Ventoy can handle that family of files also.
Ventoy is easy to use update run & maintain for the end user.
Try Ventoy
https://www.ventoy.net/en/index.html
#Ventoy #ISO #Linux #BSD #VHD #IMG #EFI #Linux #OpenSource #BOOT #POST
-
When you have workflows like mine it's unreasonable to have dozens of slow usb sticks ready to dd distributions on. It's cumbersome to index / manage so many slow devices. USB sticks also live much shorter than 2.5" SSD's here. I've had some working for years (mostly reads) And some fail in weeks after many writes, for me unreliable storage devices
Ventoy has become a vital tool ISO mangagement and booting for me, since I can dump bootable ISO''s of most OS's on SATA SSD's, structure the ISO's in logical directory flows and have a librarian oversight of them
I can mount the SSD via an USB3 tray and thus move hundreds of ISO's around without a fuzz. I use 2.5" SATA SSD's because they are large enough in physical dimensions to be handled easily and I can write and ID on them with a marker. They can also live for years of R/W operations without failing.
Ventoy can easily boot a variety ISO/WIM/IMG/VHD(x)/EFI of OS's which are of various origin.
>> Ventoy is an open source tool to create bootable USB drive for ISO/WIM/IMG/VHD(x)/EFI filesWhen a ISO++ fails to boot, you need to make the coder(s) of Ventoy aware of it, and chances are that in the next update, scripts have been finetuned so Ventoy can handle that family of files also.
Ventoy is easy to use update run & maintain for the end user.
Try Ventoy
https://www.ventoy.net/en/index.html
#Ventoy #ISO #Linux #BSD #VHD #IMG #EFI #Linux #OpenSource #BOOT #POST
-
When you have workflows like mine it's unreasonable to have dozens of slow usb sticks ready to dd distributions on. It's cumbersome to index / manage so many slow devices. USB sticks also live much shorter than 2.5" SSD's here. I've had some working for years (mostly reads) And some fail in weeks after many writes, for me unreliable storage devices
Ventoy has become a vital tool ISO mangagement and booting for me, since I can dump bootable ISO''s of most OS's on SATA SSD's, structure the ISO's in logical directory flows and have a librarian oversight of them
I can mount the SSD via an USB3 tray and thus move hundreds of ISO's around without a fuzz. I use 2.5" SATA SSD's because they are large enough in physical dimensions to be handled easily and I can write and ID on them with a marker. They can also live for years of R/W operations without failing.
Ventoy can easily boot a variety ISO/WIM/IMG/VHD(x)/EFI of OS's which are of various origin.
>> Ventoy is an open source tool to create bootable USB drive for ISO/WIM/IMG/VHD(x)/EFI filesWhen a ISO++ fails to boot, you need to make the coder(s) of Ventoy aware of it, and chances are that in the next update, scripts have been finetuned so Ventoy can handle that family of files also.
Ventoy is easy to use update run & maintain for the end user.
Try Ventoy
https://www.ventoy.net/en/index.html
#Ventoy #ISO #Linux #BSD #VHD #IMG #EFI #Linux #OpenSource #BOOT #POST
-
Облачное зеркало на VPS: бэкапы, снапшоты и образ диска
Как известно, все пользователи делятся на два типа: кто ещё не делает бэкапы и кто уже делает. Из первой категории опечаленные люди переходят во вторую, но и первая бесконечно пополняется новичками. В этой статье рассмотрим, в чём разница между резервными копиями, снапшотами и клонированием на примере реального VPS.
https://habr.com/ru/companies/ultravds/articles/964064/
#ultravds #vds #vps #резервные_копии #бэкапы #сценарии_восстановления #disk2vhd #снапшоты #бэкап_сервера #vhd