lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

68
active users

#rubygems

0 posts0 participants0 posts today
Rad Web Hosting<p>How to Host Your Own <a href="https://mastodon.social/tags/Mastodon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mastodon</span></a> Server on a <a href="https://mastodon.social/tags/VPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPS</span></a> (5 Minute Quick-Start Guide) </p><p>This article provides a guide for how to host your own Mastodon server on a VPS.</p><p>Running your own Mastodon server on a VPS is an excellent way to enjoy an efficient and secure Mastodon experience.<br>What is Mastodon?<br>Mastodon is a <a href="https://mastodon.social/tags/decentralized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>decentralized</span></a> social media platform that enables users to post ...<br>Continued 👉 <a href="https://blog.radwebhosting.com/how-to-host-your-own-mastodon-server-on-a-vps/?utm_source=mastodon&amp;utm_medium=social&amp;utm_campaign=mastodon.social" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.radwebhosting.com/how-to-</span><span class="invisible">host-your-own-mastodon-server-on-a-vps/?utm_source=mastodon&amp;utm_medium=social&amp;utm_campaign=mastodon.social</span></a> <a href="https://mastodon.social/tags/rubyonrails" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rubyonrails</span></a> <a href="https://mastodon.social/tags/selfhosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosting</span></a> <a href="https://mastodon.social/tags/activitypub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activitypub</span></a> <a href="https://mastodon.social/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a> <a href="https://mastodon.social/tags/rubygems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rubygems</span></a> <a href="https://mastodon.social/tags/installguide" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>installguide</span></a></p>
Rad Web Hosting<p>How to Host Your Own <a href="https://mastodon.social/tags/Mastodon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mastodon</span></a> Server on a <a href="https://mastodon.social/tags/VPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPS</span></a> (5 Minute Quick-Start Guide) </p><p>This article provides a guide for how to host your own Mastodon server on a VPS.</p><p>Running your own Mastodon server on a VPS is an excellent way to enjoy an efficient and secure Mastodon experience.<br>What is Mastodon?<br>Mastodon is a <a href="https://mastodon.social/tags/decentralized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>decentralized</span></a> social media platform that enables users to post ...<br>Continued 👉 <a href="https://blog.radwebhosting.com/how-to-host-your-own-mastodon-server-on-a-vps/?utm_source=mastodon&amp;utm_medium=social&amp;utm_campaign=ReviveOldPost" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.radwebhosting.com/how-to-</span><span class="invisible">host-your-own-mastodon-server-on-a-vps/?utm_source=mastodon&amp;utm_medium=social&amp;utm_campaign=ReviveOldPost</span></a> <a href="https://mastodon.social/tags/installguide" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>installguide</span></a> <a href="https://mastodon.social/tags/selfhosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosting</span></a> <a href="https://mastodon.social/tags/rubyonrails" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rubyonrails</span></a> <a href="https://mastodon.social/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a> <a href="https://mastodon.social/tags/rubygems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rubygems</span></a> <a href="https://mastodon.social/tags/activitypub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activitypub</span></a></p>
Denis Defreyne<p>RubyGems is down :(</p><p><a href="https://ruby.social/tags/Ruby" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ruby</span></a> <a href="https://ruby.social/tags/RubyGems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RubyGems</span></a></p>
mms :runbsd: :emacs: :c64:<p>I am SO dissapointed in <a href="https://mastodon.bsd.cafe/tags/rubygems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rubygems</span></a>. It's supposedly aimed at developers, yet</p><p>- emails lack plain/text<br>- you can link only twitter in your profile</p><p>What year is this?!</p>
Phylum<p>We have identified a nascent <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> campaign targeting <a href="https://infosec.exchange/tags/ruby" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ruby</span></a>, <a href="https://infosec.exchange/tags/python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>python</span></a> and <a href="https://infosec.exchange/tags/javascript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>javascript</span></a> <a href="https://infosec.exchange/tags/developers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>developers</span></a>.</p><p>Packages collect information about the host machine before shipping details off to a remote server at `81.70.191.194`.</p><p>Read below for additional details!</p><p><a href="https://blog.phylum.io/malware-campaign-targets-npm-pypi-and-rubygems-developers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.phylum.io/malware-campaig</span><span class="invisible">n-targets-npm-pypi-and-rubygems-developers/</span></a></p><p><a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a> <a href="https://infosec.exchange/tags/pypi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pypi</span></a> <a href="https://infosec.exchange/tags/rubygems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rubygems</span></a></p>
postmodern<p>Oh wow, I wasn't too far off! Some clown flagged the <a href="https://rubygems.org/gems/metasploit-payloads" rel="nofollow noopener" target="_blank">metasploit-payloads gem</a> (which has been available on rubygems.org for <em>ages</em> without issue) and got <em>all of</em> <a href="https://rubygems.org" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">rubygems.org</span><span class="invisible"></span></a> flagged by the Google Safe Browsing List!<br><a href="https://ruby.social/@indirect@fiasco.social/110351998871595312" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ruby.social/@indirect@fiasco.s</span><span class="invisible">ocial/110351998871595312</span></a></p><p>Granted the metasploit-payloads gem has far more exotic payloads which might trigger code scanners, but payloads are useless without an exploit. Absolutely no reason why payloads should be flagged as malicious.<br><a href="https://infosec.exchange/tags/metasploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>metasploit</span></a> <a href="https://infosec.exchange/tags/rubygems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rubygems</span></a></p>
postmodern<p>Grumble. Somehow <a href="https://rubygems.org/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">rubygems.org/</span><span class="invisible"></span></a> got flagged by the Google Safe Browsing List. Yet <a href="https://nmpjs.com" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">nmpjs.com</span><span class="invisible"></span></a> is somehow perfectly fine, despite constantly hosting typo-squated malware packages.<br><a href="https://transparencyreport.google.com/safe-browsing/search?url=https:%2F%2Frubygems.org%2F&amp;hl=en-US" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">transparencyreport.google.com/</span><span class="invisible">safe-browsing/search?url=https:%2F%2Frubygems.org%2F&amp;hl=en-US</span></a><br><a href="https://infosec.exchange/tags/googlesafebrowsing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>googlesafebrowsing</span></a> <a href="https://infosec.exchange/tags/rubygems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rubygems</span></a></p>