Osx proxy

Strange net/http issue

2024.04.26 19:37 jaxlatwork Strange net/http issue

I'm hoping someone has seen this before... I'm at a bit of a loss how to diagnose this
I have an IIS 8.5 server I'm trying to connect to.
If I use net/http, with default transport..
I'm getting:
read tcp 192.168.x.x:57293->10.x.x.x:443: read: connection reset by peer
However, if I use httputil.DumpRequestOut and pipe the output into openssl s_connect, the request works. So it can't possibly be the body of the request causing the remote to to hangup.
So I went and tried using mitmproxy, and the request works from Golang via MITM proxy handling the tcp connection..
The same bug behavior is occurring on Linux and OSX so I don't think its just some architecture-related quirk..


submitted by jaxlatwork to golang [link] [comments]


2024.03.19 09:03 KevinSaw Importing New Proxies into an existing project for a remote editor?

I'm working on a long form documentary passion project.I started the project file with the original media and generated proxies.
I sent the proxies and .drp to our editor.They don't have access to the original media. Everything works fine.
But now, I would like to send them new proxies from a new shooting session. I generated proxies with proxy-generator on my computer.
My idea was to just give them the proxy folder, but they can't see the content of proxy folder into disk structure. The only way to import those new proxies is to drag and drop them from OSX Finder into Media Pool. But, doing that, we loose the "proxy worflow" pipeline as those new proxies are considered as original material.
How do you import new proxies into an existing project? What am I missing about this offline / proxy workflow?

Specs: - Editing on an M1 Max Macbook Pro & Mac Studio - Davinci Resolve Studio V18.6 - Source Footage: FX6 (MXF Files) - Proxies: H.264 8 bit 4:2:0 Half Res 1080p via Blackmagic Proxy Generator
submitted by KevinSaw to davinciresolve [link] [comments]


2024.03.16 05:36 Thesegoto16 Any Networking / OSX / DANTE Experts out there ?

So heres the deal -
I want to run two physical network interfaces (TB3 to ethernet) on my macbook pro 2015 mojave machine.
NIC 1 (en5) is exclusively for DANTE.
NIC 2 (en3) is for control - consoles, RF receivers, R1 amps etc. etc.
NIC 3 (WiFi) is for an internet connection, when required, but usually off. (Possible uses would be a for spotify to download a client’s playlist etc.)
Now, some software (like WWB and DVS) lets you choose which NIC you want it to use - Other software (eg. WSM, spotify) will not.
My question is : Is there a way to force apps to use a specific NIC ?
I have tried the ‘service order’ under network settings, but one or another app will just drop its connections. This also won’t work with three NIC’s. Not a reliable solution.
There is a linux way that sounds perfect- network namespaces - but this is not included in OSX. People mention Proxy servers, but i don't know about that and pretty sure DANTE will go nuts with one of those - I want to keep the DANTE side of things as simple as possible.
Anyone have any bright ideas ? at the moment my only solution is to make the service order default NIC (en3) for control and point DVS to the DANTE NIC (en5) - and never turn wifi on.
I understand all this stuff is supposed to work together, but that is not my experience !
I work in different places all the time, temporary setups, I don’t have time to go down rabbit holes. I just need a solid DHCP connection to an existing DANTE network, whilst running my own little (isolated) control network on the side, usually with static addresses.
Any thoughts most welcome..

submitted by Thesegoto16 to livesound [link] [comments]


2024.02.11 17:12 ForeignCabinet2916 How to use conatiner as VPN gateway for k8 cluster

I have a use case where I need to put processes running on my machine (osx) into kubernetes cluster. For years , I have been using teleprence to achieve this untill mac os Sonoma broke things.
Teleprence uses vpn tcp method by using sshutle library under the hood. What that essentially does is proxy all the tcp and dns traffic from all the processes on your machine to the kubernetes cluster.
More details here
Now I am able to run teleprence inside a debian container and all the traffic from within the container is able to access cluster and resolve cluster services and pod resources. I am also able to run container using --net=host and and specific ports on host are able to also recieve bidirectional traffic from my host <->container <-> cluster
But my host is not able to resolve anything from my cluster. How can I make everything from host (tcp, dns traffic) to flow through container so teleprence running in the container can proxy host traffic?
submitted by ForeignCabinet2916 to devops [link] [comments]


2024.02.11 17:01 ForeignCabinet2916 How to use docker container as VPN gateway for my host

I have a use case where I need to put processes running on my machine (osx) into kubernetes cluster. For years , I have been using teleprence to achieve this untill mac os Sonoma broke things.
Teleprence uses vpn tcp method by using sshutle library under the hood. What that essentially does is proxy all the tcp and dns traffic from all the processes on your machine to the kubernetes cluster.
More details here
Now I am able to run teleprence inside a debian container and all the traffic from within the container is able to access cluster and resolve cluster services and pod resources. I am also able to run container using --net=host and and specific ports on host are able to also recieve bidirectional traffic from my host <->container <-> cluster
But my host is not able to resolve anything from my cluster. How can I make everything from host (tcp, dns traffic) to flow through container so teleprence running in the container can proxy host traffic?
submitted by ForeignCabinet2916 to OpenVPN [link] [comments]


2024.02.11 17:00 ForeignCabinet2916 How to use docker container as VPN gateway for my host

I have a use case where I need to put processes running on my machine (osx) into kubernetes cluster. For years , I have been using teleprence to achieve this untill mac os Sonoma broke things.
Teleprence uses vpn tcp method by using sshutle library under the hood. What that essentially does is proxy all the tcp and dns traffic from all the processes on your machine to the kubernetes cluster.
More details here
Now I am able to run teleprence inside a debian container and all the traffic from within the container is able to access cluster and resolve cluster services and pod resources. I am also able to run container using --net=host and and specific ports on host are able to also recieve bidirectional traffic from my host <->container <-> cluster
But my host is not able to resolve anything from my cluster. How can I make everything from host (tcp, dns traffic) to flow through container so teleprence running in the container can proxy host traffic?
submitted by ForeignCabinet2916 to VPN [link] [comments]


2024.02.11 16:58 ForeignCabinet2916 How to use docker container as VPN gateway for my host

I have a use case where I need to put processes running on my machine (osx) into kubernetes cluster. For years , I have been using teleprence to achieve this untill mac os Sonoma broke things.
Teleprence uses vpn tcp method by using sshutle library under the hood. What that essentially does is proxy all the tcp and dns traffic from all the processes on your machine to the kubernetes cluster.
More details here
Now I am able to run teleprence inside a debian container and all the traffic from within the container is able to access cluster and resolve cluster services and pod resources. I am also able to run container using --net=host and and specific ports on host are able to also recieve bidirectional traffic from my host <->container <-> cluster
But my host is not able to resolve anything from my cluster. How can I make everything from host (tcp, dns traffic) to flow through container so teleprence running in the container can proxy host traffic?
submitted by ForeignCabinet2916 to linuxquestions [link] [comments]


2024.02.11 16:56 ForeignCabinet2916 How to use docker container as VPN gateway to access cluster from host

I have a use case where I need to put processes running on my machine (osx) into kubernetes cluster. For years , I have been using teleprence to achieve this untill mac os Sonoma broke things.
Teleprence uses vpn tcp method by using sshutle library under the hood. What that essentially does is proxy all the tcp and dns traffic from all the processes on your machine to the kubernetes cluster.
More details here
Now I am able to run teleprence inside a debian container and all the traffic from within the container is able to access cluster and resolve cluster services and pod resources. I am also able to run container using --net=host and and specific ports on host are able to also recieve bidirectional traffic from my host <->container <-> cluster
But my host is not able to resolve anything from my cluster. How can I make everything from host (tcp, dns traffic) to flow through container so teleprence running in the container can proxy host traffic?
submitted by ForeignCabinet2916 to kubernetes [link] [comments]


2024.02.11 16:55 ForeignCabinet2916 How to use docker container as a VPN proxy

I have a use case where I need to put processes running on my machine (osx) into kubernetes cluster. For years , I have been using teleprence to achieve this untill mac os Sonoma broke things.
Teleprence uses vpn tcp method by using sshutle library under the hood. What that essentially does is proxy all the tcp and dns traffic from all the processes on your machine to the kubernetes cluster.
More details here
Now I am able to run teleprence inside a debian container and all the traffic from within the container is able to access cluster and resolve cluster services and pod resources. I am also able to run container using --net=host and and specific ports on host are able to also recieve bidirectional traffic from my host <->container <-> cluster
But my host is not able to resolve anything from my cluster. How can I make everything from host (tcp, dns traffic) to flow through container so teleprence running in the container can proxy host traffic?
submitted by ForeignCabinet2916 to docker [link] [comments]


2024.02.10 00:20 Happy_Assignment5576 chkrootkit false positives in kali?

Hello all,

I have recently made an fresh VM install to make an image for the future but when i use chckrootkit i get a few things now and i am unsure how to proceed.
Can u tell me how to proceed with the messsages i get by checking: Aliens started , suspicious files and directories , and Checking `sniffer'. WARNING: Output from ifpromisc: lo: not promisc and no packet sniffer sockets eth0: PACKET SNIFFER(/ussbin/NetworkManager[663]) ?

Thank you!

------------------------------------
chkrootkit
ROOTDIR is `/'
Checking `amd'... not found
Checking `basename'... not infected
Checking `biff'... not found
Checking `chfn'... not infected
Checking `chsh'... not infected
Checking `cron'... not infected
Checking `crontab'... not infected
Checking `date'... not infected
Checking `du'... not infected
Checking `dirname'... not infected
Checking `echo'... not infected
Checking `egrep'... not infected
Checking `env'... not infected
Checking `find'... not infected
Checking `fingerd'... not found
Checking `gpm'... not found
Checking `grep'... not infected
Checking `hdparm'... not infected
Checking `su'... not infected
Checking `ifconfig'... not infected
Checking `inetd'... not infected
Checking `inetdconf'... not found
Checking `identd'... not found
Checking `init'... not infected
Checking `killall'... not infected
Checking `ldsopreload'... not infected
Checking `login'... not infected
Checking `ls'... not infected
Checking `lsof'... not infected
Checking `mail'... not infected
Checking `mingetty'... not found
Checking `netstat'... not infected
Checking `named'... not found
Checking `passwd'... not infected
Checking `pidof'... not infected
Checking `pop2'... not found
Checking `pop3'... not found
Checking `ps'... not infected
Checking `pstree'... not infected
Checking `rpcinfo'... not infected
Checking `rlogind'... not found
Checking `rshd'... not found
Checking `slogin'... not infected
Checking `sendmail'... not infected
Checking `sshd'... not infected
Checking `syslogd'... not found
Checking `tar'... not infected
Checking `tcpd'... not found
Checking `tcpdump'... not infected
Checking `top'... not infected
Checking `telnetd'... not found
Checking `timed'... not found
Checking `traceroute'... not infected
Checking `vdir'... not infected
Checking `w'... not infected
Checking `write'... not infected
Checking `aliens'... started
Searching for suspicious files in /dev... not found
Searching for known suspicious directories... not found
Searching for known suspicious files... not found
Searching for sniffer's logs... not found
Searching for HiDrootkit rootkit... not found
Searching for t0rn rootkit... not found
Searching for t0rn v8 (or variation)... not found
Searching for Lion rootkit... not found
Searching for RSHA rootkit... not found
Searching for RH-Sharpe rootkit... not found
Searching for Ambient (ark) rootkit... not found
Searching for suspicious files and dirs... WARNING

WARNING: The following suspicious files and directories were found:
/uslib/jvm/.java-1.11.0-openjdk-amd64.jinfo
/uslib/jvm/.java-1.17.0-openjdk-amd64.jinfo
/uslib/ruby/vendor_ruby/rubygems/tsort/.document
/uslib/ruby/vendor_ruby/rubygems/ssl_certs/.document
/uslib/ruby/vendor_ruby/rubygems/optparse/.document
/uslib/ruby/gems/3.1.0/gems/typeprof-0.21.2/vscode/.vscodeignore
/uslib/ruby/gems/3.1.0/gems/typeprof-0.21.2/vscode/.vscode
/uslib/ruby/gems/3.1.0/gems/typeprof-0.21.2/vscode/.gitignore
/uslib/hashcat/modules/.lock
/uslib/llvm-15/build/utils/lit/tests/.coveragerc
/uslib/llvm-15/build/utils/lit/tests/Inputs/reorde.lit_test_times.txt
/uslib/python3/dist-packages/docx/templates/default-docx-template/_rels/.rels
/uslib/python3/dist-packages/tldextract/.tld_set_snapshot
/uslib/python3/dist-packages/matplotlib/tests/tinypages/.gitignore
/uslib/python3/dist-packages/matplotlib/tests/tinypages/_static/.gitignore
/uslib/python3/dist-packages/matplotlib/tests/baseline_images/.keep
/uslib/python3/dist-packages/matplotlib/backends/web_backend/.prettierrc
/uslib/python3/dist-packages/matplotlib/backends/web_backend/.eslintrc.js
/uslib/python3/dist-packages/matplotlib/backends/web_backend/.prettierignore
/uslib/python3/dist-packages/numpy/core/include/numpy/.doxyfile
/uslib/python3/dist-packages/numpy/f2py/tests/src/f2cmap/.f2py_f2cmap
/uslib/python3/dist-packages/numpy/f2py/tests/src/assumed_shape/.f2py_f2cmap
/uslib/python3/dist-packages/fail2ban/tests/files/config/apache-auth/noentry/.htaccess
/uslib/python3/dist-packages/fail2ban/tests/files/config/apache-auth/digest_time/.htpasswd
/uslib/python3/dist-packages/fail2ban/tests/files/config/apache-auth/digest_time/.htaccess
/uslib/python3/dist-packages/fail2ban/tests/files/config/apache-auth/basic/file/.htpasswd
/uslib/python3/dist-packages/fail2ban/tests/files/config/apache-auth/basic/file/.htaccess
/uslib/python3/dist-packages/fail2ban/tests/files/config/apache-auth/basic/authz_owne.htpasswd
/uslib/python3/dist-packages/fail2ban/tests/files/config/apache-auth/basic/authz_owne.htaccess
/uslib/python3/dist-packages/fail2ban/tests/files/config/apache-auth/digest_anon/.htpasswd
/uslib/python3/dist-packages/fail2ban/tests/files/config/apache-auth/digest_anon/.htaccess
/uslib/python3/dist-packages/fail2ban/tests/files/config/apache-auth/digest/.htpasswd
/uslib/python3/dist-packages/fail2ban/tests/files/config/apache-auth/digest/.htaccess
/uslib/python3/dist-packages/fail2ban/tests/files/config/apache-auth/digest_wrongrelm/.htpasswd
/uslib/python3/dist-packages/fail2ban/tests/files/config/apache-auth/digest_wrongrelm/.htaccess
/uslib/python3/dist-packages/twisted/mail/newsfragments/.gitignore
/uslib/python3/dist-packages/twisted/names/newsfragments/.gitignore
/uslib/python3/dist-packages/twisted/conch/newsfragments/.gitignore
/uslib/python3/dist-packages/twisted/words/newsfragments/.gitignore
/uslib/python3/dist-packages/twisted/trial/newsfragments/.gitignore
/uslib/python3/dist-packages/twisted/newsfragments/.gitignore
/uslib/python3/dist-packages/twisted/web/newsfragments/.gitignore
/uslib/python3/dist-packages/lsassy/resources/.gitkeep
/uslib/python3/dist-packages/pythran/pythonic/numpy/.hpp
/uslib/python3/dist-packages/pythran/pythonic/include/numpy/.hpp
/uslib/gophish/static/endpoint/.gitignore
/uslib/llvm-16/build/utils/lit/tests/.coveragerc
/uslib/llvm-14/build/utils/lit/tests/.coveragerc
/uslib/llvm-14/build/utils/lit/tests/Inputs/reorde.lit_test_times.txt

Searching for LPD Worm... not found
Searching for Ramen Worm rootkit... not found
Searching for Maniac rootkit... not found
Searching for RK17 rootkit... not found
Searching for Ducoci rootkit... not found
Searching for Adore Worm... not found
Searching for ShitC Worm... not found
Searching for Omega Worm... not found
Searching for Sadmind/IIS Worm... not found
Searching for MonKit... not found
Searching for Showtee rootkit... not found
Searching for OpticKit... not found
Searching for T.R.K... not found
Searching for Mithra rootkit... not found
Searching for OBSD rootkit v1... not tested
Searching for LOC rootkit... not found
Searching for Romanian rootkit... not found
Searching for HKRK rootkit... not found
Searching for Suckit rootkit... not found
Searching for Volc rootkit... not found
Searching for Gold2 rootkit... not found
Searching for TC2 rootkit... not found
Searching for Anonoying rootkit... not found
Searching for ZK rootkit... not found
Searching for ShKit rootkit... not found
Searching for AjaKit rootkit... not found
Searching for zaRwT rootkit... not found
Searching for Madalin rootkit... not found
Searching for Fu rootkit... not found
Searching for Kenga3 rootkit... not found
Searching for ESRK rootkit... not found
Searching for rootedoor... not found
Searching for ENYELKM rootkit... not found
Searching for common ssh-scanners... not found
Searching for Linux/Ebury 1.4 - Operation Windigo... not tested
Searching for Linux/Ebury 1.6... not found
Searching for 64-bit Linux Rootkit... not found
Searching for 64-bit Linux Rootkit modules... not found
Searching for Mumblehard... not found
Searching for Backdoor.Linux.Mokes.a... not found
Searching for Malicious TinyDNS... not found
Searching for Linux.Xor.DDoS... not found
Searching for Linux.Proxy.1.0... not found
Searching for CrossRAT... not found
Searching for Hidden Cobra... not found
Searching for Rocke Miner rootkit... not found
Searching for PWNLNX4 lkm rootkit... not found
Searching for PWNLNX6 lkm rootkit... not found
Searching for Umbreon lrk... not found
Searching for Kinsing.a backdoor rootkit... not found
Searching for RotaJakiro backdoor rootkit... not found
Searching for Syslogk LKM rootkit... not found
Searching for Kovid LKM rootkit... not tested
Searching for Tsunami DDoS Malware rootkit... not found
Searching for Linux BPF Door... not found
Searching for suspect PHP files... not found
Searching for zero-size shell history files... not found
Searching for hardlinked shell history files... not found
Checking `aliens'... finished
Checking `asp'... not infected
Checking `bindshell'... not found
Checking `lkm'... started
Searching for Adore LKM... not tested
Searching for sebek LKM (Adore based)... not tested
Searching for knark LKM rootkit... not found
Searching for for hidden processes with chkproc... not found
Searching for for hidden directories using chkdirs... not found
Checking `lkm'... finished
Checking `rexedcs'... not found
Checking `sniffer'... WARNING

WARNING: Output from ifpromisc:
lo: not promisc and no packet sniffer sockets
eth0: PACKET SNIFFER(/ussbin/NetworkManager[663])

Checking `w55808'... not found
Checking `wted'... not found
Checking `scalper'... not found
Checking `slapper'... not found
Checking `z2'... not found
Checking `chkutmp'... not found
Checking `OSX_RSPLUG'... not tested


submitted by Happy_Assignment5576 to Kalilinux [link] [comments]


2023.12.28 06:15 ComparisonOwn3335 Puffin Secure/Cloud Browser - why no 64bit Linux desktop?????

I came across puffin on RasPi and thought it was a pretty neat concept- having in essence a proxy pre-load websites/apps, or whatever, on your behalf then forward it on to you.
It somewhat lessened the workload on my Pi which combined with the plethora of other resource saving tricks I had implemented actually resulted in the Pi being halfway usable as a daily driver.
I’ve since breathed life into an old brick of a laptop with a legacy Bodhi 7 install and recently went looking for Puffin as an option for a lightweight browser.
To my dismay I find it’s desktop client is only available for the Pi (32bit) or Windows/OSX (64bit).
It really wouldn’t be to much hassle to stand up my own proxy, a load balancer of sorts, to perform a similar function- but at a cost to myself.
I’m wondering why on earth the Puffin browser isn’t available at least as an appimage or shell script for universal cross-distro compatibility.
Also, since it isn’t, why the heck is is available for winsh1te and darwin?
Could anyone shed some light?
submitted by ComparisonOwn3335 to linuxquestions [link] [comments]


2023.12.06 12:13 kvtien Wireguard does not take precedence over Global Protect on macOS

[macOS] I'm using Wireguard and global protect at the same time, both are connected. But if I catch Wireshark on Wireguard/Global protect interface, I can see all traffic on my device are being passed via Global protect(No traffic goes through Wireguard interface). Below is my routing table: utun3 is Global protect, utun4 is WireGuard interface.
https://preview.redd.it/t6w2x8immn4c1.png?width=1022&format=png&auto=webp&s=f55448c1a23898583afc8b33809e59f412ccb291
I am prioritizing WireGuard over Global Protect in what I'm currently working on. So I want to all traffic will be passed via Wireguard instead of Global Protect. I have already tried to modify the routing table, use a trick to add 0/1 and 128.0/1 to Destination of Wireguard but this solution not work, all traffic still go through GlobalProtect. I also have tried to bring up the default route of Wireguard to the top list of routing table but have no success (I don't know if this is possible in my case). I would greatly appreciate any insights or recommendations in this matter?
P/s: I see Global Protect is a transparent proxy (a type of network filter in settings), it appears that the OS prioritizes this category when deciding traffic routes.
submitted by kvtien to paloaltonetworks [link] [comments]


2023.10.12 07:51 benicetofred Help - Premiere Freezing up constantly/randomly

Hello all. Hoping to get any insight into why my Premiere has become so unreliable.
I used to edit in Premiere 15 with no issues until July. Since Updating to 23.4 (both versions required by client) I've had nothing but problems.
late 2021 M1 Max Macbook Pro, OSX 13.6, 64GB Ram
I'm cutting a travel series, 1080p footage, everything ProRes, not using proxies. Typically when I start a new episode, even with very large stringout timelines, things go smoothly for a week or so until I'm ready to combine scenes and build the episode in 1 big timeline. Then, premiere will start to randomly freeze up and I'll have to force quit.
Sometimes I'll get a day with no problems, sometimes an hour. Sometimes I'll clear the cache, restart, and it will work again. Sometimes I try that and still have to freeze and restart 10 more times before it decides to let me cut for another couple hours.
I've tried:
-Clearing cache and resetting all preferences/plugins and leaving them off
-Creating new cache folders, marking the others as .old
-Swtiching to an SSD from an HDD
-Uninstalling and reinstalling
-Opening Premiere using Rosetta
-Sitting on support letting an Adobe tech screen share and switch around settings. That worked for about 3 hours, now back to the freezing
-Changing scaling on my external monitor to default

It's frustrating because it seems totally random and I have no idea when it will freeze, or when the freezing will stop.
Any suggestions are GREATLY appreciated
submitted by benicetofred to editors [link] [comments]


2023.09.28 18:11 houbie Arri LF files make Premiere extremely slow?

I've shot something on an Arri Alexa LF 'open gate', so the resolution is 4480 x 3096 px.
Premiere doesn't seem to be able to handle this type of material. With each cut that I make, I have to wait about 4-8 seconds for Premiere to catch up, even though I'm using the relatively small 'Prores 422 Proxy' codec, and have my canvas window set to 1/16th resolution.
(I’m actually editing the proxy files, so not even using the ‘attach proxy’ function, because otherwise the delay is even worse).
Specs: - Mac Mini 2018 with 64 GB RAM, running OSX 10.15.7 - Premiere CC 2019 (I have 2022 as well, but that one can’t even play the material realtime, let alone edit it) - The material is on an external G-Drive through Thunderbolt 3
I’ve never experienced anything like this. My system can usually edit MXF's without even making proxies. How can a project be so insanely slow, even though I’m the smallest Prores codec and the lowest viewing resolution?
submitted by houbie to PremierePro [link] [comments]


2023.08.28 20:50 charlyquestion When I sync in Premiere with the "Synchronize" option and put that clip in the Timeline. How do I get a match frame of the original audio clip back?

So that, once my synced clip is in timeline and I match frame it, it always goes to the synced file in the project window. Is thre a way to find the original sound and/or video from that particular synced file? I'm doing this becuase my sound designer is telling me my metadata is all lost when I send the AAF form my timeline to Pro Tools. Hope you guys can help me out!
EDIT: Or is there a way to synchronize for a big project (feature film) where I preserve audio metadata that I don't know of. Thanks again
Mac Pro 2013 (trashcan) /2.7 GHz Intel Xeon E5/ OSX 12.6.8 Monterey / 64GB Ram
Premiere Pro 23.6
Footage is Apple Pro Res Proxy 1920x1080 23.98fps provided by post
submitted by charlyquestion to editors [link] [comments]


2023.08.17 21:22 Xethernety GBT Technologies, Inc. & NASDAQ Corp. Bannix ----> Execution of Patent Purchase Agreement ($42,500,000)

GBT Technologies, Inc. & NASDAQ Corp. Bannix -- Execution of Patent Purchase Agreement ($42,500,000)
GTCH (ASK @ 0.0002)
BNIX NASDAQ (ASK @ 10.64)
Bannix to Acquire GBT’s Apollo IP to Enhance Autonomous Vehicle Perception and Mapping
  • Purchase Price of $42,500,000 to be paid in shares of Preferred Stock
Bannix Acquisition Corp. (NASDAQ : BNIX) and GBT Technologies Inc. (OTC : GTCH),
  • a leading developer of innovative wireless communication products and services through GBT Tokenize Corp. (“Tokenize”),
  • which GTCH holds 50% of,
  • today announced that they entered into a definitive Patent Purchase Agreement
  • pursuant to BNIX acquiring the Apollo IP system for $42,500,000
  • payable in shares of Preferred Stock of BNIX.
The Apollo IP system, which consists of four (4) granted patents and one (1) pending,
  • is a revolutionary radio frequency-based computer vision technology that, upon full development,
  • can provide autonomous vehicles with superior perception and mapping capabilities
  • in all lighting conditions and weather.
The Apollo IP system uses radio waves to transmit and receive data from objects in the environment.
This data is then processed by advanced artificial intelligence algorithms to create a 3D image of the surrounding area.
The Apollo IP system is able to detect objects at longer distances and with greater accuracy than traditional optical sensors, cameras and LiDAR.
It is also not affected by lighting conditions or weather, making it ideal for autonomous vehicles that operate in a variety of environments.
It may enable BNIX to provide its customers with the most advanced autonomous vehicle perception technology available.
“We are excited to enter this agreement with Bannix through Tokenize,” said Mansour Khatib, CEO of GBT Technologies.
Video here 1: https://www.youtube.com/watch?v=mPNB-a-yMF8
Video here 2: https://www.youtube.com/watch?v=7H4o3Nz6ndQ
“We believe this technology is a potential game-changer for the autonomous vehicle industry.
It is our goal to allow BNIX customers to develop
  • safer,
  • more reliable autonomous vehicles that can operate in any environment.”
“We are excited to announce our acquisition agreement with Tokenize.
We believe this strategic acquisition will allow us
  • to partner with multiple integrators of autonomous vehicles.
We believe it will also enhance our Business Combination partner Evie Autonomous Group’s exciting,
  • patent-pending,
  • AI enhanced radar vision system that allows vehicles to perceive their environment,
  • using 4D radar and algorithms
  • to intelligently interpret the sensor data
  • and unlock tremendous value and position us as a leader in the autonomous technology space.
Together, we will drive the future of mobility and revolutionize the way people experience transportation,” said Doug Davis, CEO of Bannix Acquisition Corp.
Added Steven Lake, founder and CEO of Evie Autonomous Group,
“The time is now to deliver world-class automation, robotics, and AI to off-highway environments.
This combination will accelerate our progress and bring our proven solutions and technology to the attention of partners around the globe.
I am excited to work with Bannix to improve productivity, profitability, and safety in multiple sectors.”
The Apollo system asset purchase is expected to close in the fourth quarter of 2023.
The purchase price for the Apollo system is $42.5 million, which will be paid in shares of BNIX Series A Preferred Stock.
Tokenize agreed with BNIX that in no event the consideration will be less than $30,000,000 which then may give Tokenize the option to cancel the agreement.
No assurances can be made that the proposed transactions will be consummated on the terms or timeframe currently contemplated, or at all. Any transaction would be subject to board and shareholder approval of both companies, regulatory approvals and other customary conditions.
Moreover, there is no guarantee that the BNIX, Evie Autonomous Group, GBT Technologies and/or Tokenize will be successful in researching, developing or implementing this system.
There is no guarantee that the parties will be successful in any or all of these critical steps.
About Bannix Acquisition Corp.
https://finance.yahoo.com/quote/BNIX
Bannix Acquisition Corp. is a blank check company, also commonly referred to as a Special Purpose Acquisition Company, or SPAC, formed for the purpose of effecting a merger, share exchange, asset acquisition, share purchase, reorganization or similar business combination with one or more businesses or entities.
About Evie Autonomous
https://evieautonomous.com/
Evie Autonomous Limited is a business incorporated in England & Wales based in Stoke-on-Trent.
It was founded by Mr. Steven Lake who is involved in motorsport and has built several successful global businesses within the Tier 1 automotive supply chain to blue chip OEMs
  • and includes supplying FIA and NASCAR.
Evie Autonomous has the mission to accelerate the transformation from low level autonomy to safer, cleaner fully autonomous movement of people and goods.
The Evie Autonomous journey began five years ago in the R&D sector,
  • producing complete systems at low-cost,
  • and now is seeking to expand and grow globally,
  • mile by self-driving mile.
About GBT Technologies
GBT Technologies, Inc. (OTC PINK: GTCH) (“GBT”) (http://gbtti.com) is a development stage company which considers itself an expert in the areas of Internet of Things (IoT), Artificial Intelligence (AI) and Enabled Mobile Technology Platforms used to increase IC performance.
GBT has assembled a team with extensive technology expertise and is building an intellectual property portfolio consisting of many patents.
GBT’s mission is to license technology and IP to synergistic partners in the areas of hardware and software.
Once commercialized, it is GBT’s goal to have a suite of products including smart microchips, AI, encryption, Blockchain, IC design, mobile security applications, database management protocols, with tracking and supporting cloud software (without the need for GPS).
GBT envisions this system as a creation of a global mesh network using advanced nodes and super performing new generation IC technology.
The core of the system will be its advanced microchip technology; technology that can be installed in any mobile or fixed device worldwide.
GBT’s vision is to produce this system as a low cost, secure, private-mesh-network between all enabled devices.
Thus, providing shared processing, advanced mobile database management and sharing while using these enhanced mobile features as an alternative to traditional carrier services.
Additional Information and Where to Find It
If a definitive agreement is entered into in connection with the proposed transaction, Bannix will prepare a proxy statement (the “Proxy Statement”) to be filed with the United States Securities and Exchange Commission (the “SEC”) and mailed to its stockholders.
Bannix urges its investors and other interested persons to read, when available, the Proxy Statement, as well as other documents filed with the SEC, because these documents will contain important information about the proposed transaction.
The Proxy Statement, once available, can be obtained, without charge, at the SEC’s website (http://www.sec.gov).
Participants in the Solicitation
Bannix and certain of its respective directors and executive officers may be deemed to be participants in the solicitation of proxies, in favor of the approval of the proposed transaction related matters.
Information regarding Bannix’s directors and executive officers is contained in the section of Bannix’s Form 10-K for the year ended December 31, 2022 filed with the SEC on April 11, 2023.
Additional information regarding the interests of those participants and other persons who may be deemed participants in the transaction may be obtained by reading the Proxy Statement and other relevant documents filed with the SEC when they become available.
Contact:
Bannix Acquisition Corp. Doug Davis, CEO (323) 682-8949 doug.davis@bannixacquisition.com
GBT Technologies, Inc. Mansour Khatib, CEO info@gbtti.com

https://preview.redd.it/q1ueqgd91qib1.png?width=1220&format=png&auto=webp&s=d15580c010ab646df96682f76af6ba5ae9bc58f5
submitted by Xethernety to Penny_Stock_USA [link] [comments]


2023.08.17 21:22 Xethernety GBT Technologies, Inc. & NASDAQ Corp. Bannix ----> Execution of Patent Purchase Agreement ($42,500,000)

GBT Technologies, Inc. & NASDAQ Corp. Bannix -- Execution of Patent Purchase Agreement ($42,500,000)
GTCH (ASK @ 0.0002)
BNIX NASDAQ (ASK @ 10.64)
Bannix to Acquire GBT’s Apollo IP to Enhance Autonomous Vehicle Perception and Mapping
  • Purchase Price of $42,500,000 to be paid in shares of Preferred Stock
Bannix Acquisition Corp. (NASDAQ : BNIX) and GBT Technologies Inc. (OTC : GTCH),
  • a leading developer of innovative wireless communication products and services through GBT Tokenize Corp. (“Tokenize”),
  • which GTCH holds 50% of,
  • today announced that they entered into a definitive Patent Purchase Agreement
  • pursuant to BNIX acquiring the Apollo IP system for $42,500,000
  • payable in shares of Preferred Stock of BNIX.
The Apollo IP system, which consists of four (4) granted patents and one (1) pending,
  • is a revolutionary radio frequency-based computer vision technology that, upon full development,
  • can provide autonomous vehicles with superior perception and mapping capabilities
  • in all lighting conditions and weather.

The Apollo IP system uses radio waves to transmit and receive data from objects in the environment.

This data is then processed by advanced artificial intelligence algorithms to create a 3D image of the surrounding area.
The Apollo IP system is able to detect objects at longer distances and with greater accuracy than traditional optical sensors, cameras and LiDAR.
It is also not affected by lighting conditions or weather, making it ideal for autonomous vehicles that operate in a variety of environments.
It may enable BNIX to provide its customers with the most advanced autonomous vehicle perception technology available.
“We are excited to enter this agreement with Bannix through Tokenize,” said Mansour Khatib, CEO of GBT Technologies.
Video here 1: https://www.youtube.com/watch?v=mPNB-a-yMF8
Video here 2: https://www.youtube.com/watch?v=7H4o3Nz6ndQ

“We believe this technology is a potential game-changer for the autonomous vehicle industry.

It is our goal to allow BNIX customers to develop
  • safer,
  • more reliable autonomous vehicles that can operate in any environment.”
“We are excited to announce our acquisition agreement with Tokenize.
We believe this strategic acquisition will allow us
  • to partner with multiple integrators of autonomous vehicles.
We believe it will also enhance our Business Combination partner Evie Autonomous Group’s exciting,
  • patent-pending,
  • AI enhanced radar vision system that allows vehicles to perceive their environment,
  • using 4D radar and algorithms
  • to intelligently interpret the sensor data
  • and unlock tremendous value and position us as a leader in the autonomous technology space.
Together, we will drive the future of mobility and revolutionize the way people experience transportation,” said Doug Davis, CEO of Bannix Acquisition Corp.
Added Steven Lake, founder and CEO of Evie Autonomous Group,
“The time is now to deliver world-class automation, robotics, and AI to off-highway environments.
This combination will accelerate our progress and bring our proven solutions and technology to the attention of partners around the globe.
I am excited to work with Bannix to improve productivity, profitability, and safety in multiple sectors.”
The Apollo system asset purchase is expected to close in the fourth quarter of 2023.
The purchase price for the Apollo system is $42.5 million, which will be paid in shares of BNIX Series A Preferred Stock.
Tokenize agreed with BNIX that in no event the consideration will be less than $30,000,000 which then may give Tokenize the option to cancel the agreement.
No assurances can be made that the proposed transactions will be consummated on the terms or timeframe currently contemplated, or at all. Any transaction would be subject to board and shareholder approval of both companies, regulatory approvals and other customary conditions.
Moreover, there is no guarantee that the BNIX, Evie Autonomous Group, GBT Technologies and/or Tokenize will be successful in researching, developing or implementing this system.
There is no guarantee that the parties will be successful in any or all of these critical steps.

About Bannix Acquisition Corp.

https://finance.yahoo.com/quote/BNIX
Bannix Acquisition Corp. is a blank check company, also commonly referred to as a Special Purpose Acquisition Company, or SPAC, formed for the purpose of effecting a merger, share exchange, asset acquisition, share purchase, reorganization or similar business combination with one or more businesses or entities.

About Evie Autonomous

https://evieautonomous.com/
Evie Autonomous Limited is a business incorporated in England & Wales based in Stoke-on-Trent.
It was founded by Mr. Steven Lake who is involved in motorsport and has built several successful global businesses within the Tier 1 automotive supply chain to blue chip OEMs
  • and includes supplying FIA and NASCAR.
Evie Autonomous has the mission to accelerate the transformation from low level autonomy to safer, cleaner fully autonomous movement of people and goods.
The Evie Autonomous journey began five years ago in the R&D sector,
  • producing complete systems at low-cost,
  • and now is seeking to expand and grow globally,
  • mile by self-driving mile.

About GBT Technologies

GBT Technologies, Inc. (OTC PINK: GTCH) (“GBT”) (http://gbtti.com) is a development stage company which considers itself an expert in the areas of Internet of Things (IoT), Artificial Intelligence (AI) and Enabled Mobile Technology Platforms used to increase IC performance.
GBT has assembled a team with extensive technology expertise and is building an intellectual property portfolio consisting of many patents.
GBT’s mission is to license technology and IP to synergistic partners in the areas of hardware and software.
Once commercialized, it is GBT’s goal to have a suite of products including smart microchips, AI, encryption, Blockchain, IC design, mobile security applications, database management protocols, with tracking and supporting cloud software (without the need for GPS).
GBT envisions this system as a creation of a global mesh network using advanced nodes and super performing new generation IC technology.
The core of the system will be its advanced microchip technology; technology that can be installed in any mobile or fixed device worldwide.
GBT’s vision is to produce this system as a low cost, secure, private-mesh-network between all enabled devices.
Thus, providing shared processing, advanced mobile database management and sharing while using these enhanced mobile features as an alternative to traditional carrier services.

Additional Information and Where to Find It

If a definitive agreement is entered into in connection with the proposed transaction, Bannix will prepare a proxy statement (the “Proxy Statement”) to be filed with the United States Securities and Exchange Commission (the “SEC”) and mailed to its stockholders.
Bannix urges its investors and other interested persons to read, when available, the Proxy Statement, as well as other documents filed with the SEC, because these documents will contain important information about the proposed transaction.
The Proxy Statement, once available, can be obtained, without charge, at the SEC’s website (http://www.sec.gov).

Participants in the Solicitation

Bannix and certain of its respective directors and executive officers may be deemed to be participants in the solicitation of proxies, in favor of the approval of the proposed transaction related matters.
Information regarding Bannix’s directors and executive officers is contained in the section of Bannix’s Form 10-K for the year ended December 31, 2022 filed with the SEC on April 11, 2023.
Additional information regarding the interests of those participants and other persons who may be deemed participants in the transaction may be obtained by reading the Proxy Statement and other relevant documents filed with the SEC when they become available.
Contact:
Bannix Acquisition Corp. Doug Davis, CEO (323) 682-8949 doug.davis@bannixacquisition.com
GBT Technologies, Inc. Mansour Khatib, CEO info@gbtti.com

https://preview.redd.it/0ikqfrt31qib1.png?width=1220&format=png&auto=webp&s=a613cf8aa60e0d6486505e4dfdb49649f136516b
submitted by Xethernety to pennystocks_No_Rules [link] [comments]


2023.07.13 13:10 Ultim8Chaos06 A collection of useful Mac Apps

Mac apps, in no particular order~! Enjoy it.
Note: This list has duplicates, like Magnet, and Rectangle, I have put in multiple options, as there hopefully is an app you would love, which has a better duplicate, in this case Reatangle. Like i said last time, please add comments, add apps, suggestions, and everything you love to do!

Productivity

Developer Tools

Design, Creativity and Media Tools

Writing and Note-taking

Utilities + Menu Bar apps

Web Browsers

submitted by Ultim8Chaos06 to macapps [link] [comments]


2023.06.24 22:34 iamiamwhoami java.nio.channels.UnsupportedAddressTypeException with GRPC only in Docker container

I'm using the PineconeDB Java client, which is built on top of GRPC. I'm using it from a Kotlin app built and run with Java 17. On my local OSX machine everything works fine. However when I copy the built fat jar to a Docker image based on openjdk:17 I get the following error. Any idea what might be causing this?
io.grpc.StatusRuntimeException: UNKNOWN at io.grpc.stub.ClientCalls.toStatusRuntimeException(ClientCalls.java:271) at io.grpc.stub.ClientCalls.getUnchecked(ClientCalls.java:252) at io.grpc.stub.ClientCalls.blockingUnaryCall(ClientCalls.java:165) at io.pinecone.proto.VectorServiceGrpc$VectorServiceBlockingStub.upsert(VectorServiceGrpc.java:505) at app.backend.clients.VectorDatabaseClient.write(VectorDatabaseClient.kt:51) at kotlin.coroutines.jvm.internal.BaseContinuationImpl.resumeWith(ContinuationImpl.kt:33) at kotlinx.coroutines.DispatchedTask.run(DispatchedTask.kt:106) at kotlinx.coroutines.EventLoopImplBase.processNextEvent(EventLoop.common.kt:284) at kotlinx.coroutines.BlockingCoroutine.joinBlocking(Builders.kt:85) at kotlinx.coroutines.BuildersKt__BuildersKt.runBlocking(Builders.kt:59) at kotlinx.coroutines.BuildersKt.runBlocking(Unknown Source) at kotlinx.coroutines.BuildersKt__BuildersKt.runBlocking$default(Builders.kt:38) at kotlinx.coroutines.BuildersKt.runBlocking$default(Unknown Source) at io.ktor.server.routing.Route$buildPipeline$1$1.invokeSuspend(Route.kt:116) at io.ktor.server.routing.Route$buildPipeline$1$1.invoke(Route.kt) at io.ktor.server.routing.Route$buildPipeline$1$1.invoke(Route.kt) at io.ktor.util.pipeline.SuspendFunctionGun.loop(SuspendFunctionGun.kt:120) at io.ktor.util.pipeline.SuspendFunctionGun.proceed(SuspendFunctionGun.kt:78) at io.ktor.util.pipeline.SuspendFunctionGun.execute$ktor_utils(SuspendFunctionGun.kt:98) at io.ktor.util.pipeline.Pipeline.execute(Pipeline.kt:77) at io.ktor.server.routing.Routing$executeResult$$inlined$execute$1.invokeSuspend(Pipeline.kt:478) at io.ktor.server.routing.Routing$executeResult$$inlined$execute$1.invoke(Pipeline.kt) at io.ktor.server.routing.Routing$executeResult$$inlined$execute$1.invoke(Pipeline.kt) at io.ktor.util.debug.ContextUtilsKt.initContextInDebugMode(ContextUtils.kt:17) at io.ktor.server.routing.Routing.executeResult(Routing.kt:190) at io.ktor.server.routing.Routing.interceptor(Routing.kt:64) at io.ktor.server.routing.Routing$Plugin$install$1.invokeSuspend(Routing.kt:140) at io.ktor.server.routing.Routing$Plugin$install$1.invoke(Routing.kt) at io.ktor.server.routing.Routing$Plugin$install$1.invoke(Routing.kt) at io.ktor.util.pipeline.SuspendFunctionGun.loop(SuspendFunctionGun.kt:120) at io.ktor.util.pipeline.SuspendFunctionGun.proceed(SuspendFunctionGun.kt:78) at io.ktor.server.engine.BaseApplicationEngineKt$installDefaultTransformationChecker$1.invokeSuspend(BaseApplicationEngine.kt:124) at io.ktor.server.engine.BaseApplicationEngineKt$installDefaultTransformationChecker$1.invoke(BaseApplicationEngine.kt) at io.ktor.server.engine.BaseApplicationEngineKt$installDefaultTransformationChecker$1.invoke(BaseApplicationEngine.kt) at io.ktor.util.pipeline.SuspendFunctionGun.loop(SuspendFunctionGun.kt:120) at io.ktor.util.pipeline.SuspendFunctionGun.proceed(SuspendFunctionGun.kt:78) at io.ktor.util.pipeline.SuspendFunctionGun.execute$ktor_utils(SuspendFunctionGun.kt:98) at io.ktor.util.pipeline.Pipeline.execute(Pipeline.kt:77) at io.ktor.server.engine.DefaultEnginePipelineKt$defaultEnginePipeline$1$invokeSuspend$$inlined$execute$1.invokeSuspend(Pipeline.kt:478) at io.ktor.server.engine.DefaultEnginePipelineKt$defaultEnginePipeline$1$invokeSuspend$$inlined$execute$1.invoke(Pipeline.kt) at io.ktor.server.engine.DefaultEnginePipelineKt$defaultEnginePipeline$1$invokeSuspend$$inlined$execute$1.invoke(Pipeline.kt) at io.ktor.util.debug.ContextUtilsKt.initContextInDebugMode(ContextUtils.kt:17) at io.ktor.server.engine.DefaultEnginePipelineKt$defaultEnginePipeline$1.invokeSuspend(DefaultEnginePipeline.kt:118) at io.ktor.server.engine.DefaultEnginePipelineKt$defaultEnginePipeline$1.invoke(DefaultEnginePipeline.kt) at io.ktor.server.engine.DefaultEnginePipelineKt$defaultEnginePipeline$1.invoke(DefaultEnginePipeline.kt) at io.ktor.util.pipeline.SuspendFunctionGun.loop(SuspendFunctionGun.kt:120) at io.ktor.util.pipeline.SuspendFunctionGun.proceed(SuspendFunctionGun.kt:78) at io.ktor.util.pipeline.SuspendFunctionGun.execute$ktor_utils(SuspendFunctionGun.kt:98) at io.ktor.util.pipeline.Pipeline.execute(Pipeline.kt:77) at io.ktor.server.netty.NettyApplicationCallHandler$handleRequest$1$invokeSuspend$$inlined$execute$1.invokeSuspend(Pipeline.kt:478) at io.ktor.server.netty.NettyApplicationCallHandler$handleRequest$1$invokeSuspend$$inlined$execute$1.invoke(Pipeline.kt) at io.ktor.server.netty.NettyApplicationCallHandler$handleRequest$1$invokeSuspend$$inlined$execute$1.invoke(Pipeline.kt) at io.ktor.util.debug.ContextUtilsKt.initContextInDebugMode(ContextUtils.kt:17) at io.ktor.server.netty.NettyApplicationCallHandler$handleRequest$1.invokeSuspend(NettyApplicationCallHandler.kt:119) at io.ktor.server.netty.NettyApplicationCallHandler$handleRequest$1.invoke(NettyApplicationCallHandler.kt) at io.ktor.server.netty.NettyApplicationCallHandler$handleRequest$1.invoke(NettyApplicationCallHandler.kt) at kotlinx.coroutines.intrinsics.UndispatchedKt.startCoroutineUndispatched(Undispatched.kt:55) at kotlinx.coroutines.CoroutineStart.invoke(CoroutineStart.kt:112) at kotlinx.coroutines.AbstractCoroutine.start(AbstractCoroutine.kt:126) at kotlinx.coroutines.BuildersKt__Builders_commonKt.launch(Builders.common.kt:56) at kotlinx.coroutines.BuildersKt.launch(Unknown Source) at io.ktor.server.netty.NettyApplicationCallHandler.handleRequest(NettyApplicationCallHandler.kt:37) at io.ktor.server.netty.NettyApplicationCallHandler.channelRead(NettyApplicationCallHandler.kt:29) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:444) at io.netty.channel.AbstractChannelHandlerContext.access$600(AbstractChannelHandlerContext.java:61) at io.netty.channel.AbstractChannelHandlerContext$7.run(AbstractChannelHandlerContext.java:425) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:174) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:167) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:470) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:997) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.ktor.server.netty.EventLoopGroupProxy$Companion.create$lambda$1$lambda$0(NettyApplicationEngine.kt:296) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) at java.base/java.lang.Thread.run(Thread.java:833) Caused by: java.nio.channels.UnsupportedAddressTypeException at java.base/sun.nio.ch.Net.checkAddress(Net.java:146) at java.base/sun.nio.ch.Net.checkAddress(Net.java:157) at java.base/sun.nio.ch.SocketChannelImpl.checkRemote(SocketChannelImpl.java:816) at java.base/sun.nio.ch.SocketChannelImpl.connect(SocketChannelImpl.java:839) at io.netty.util.internal.SocketUtils$3.run(SocketUtils.java:91) at io.netty.util.internal.SocketUtils$3.run(SocketUtils.java:88) at java.base/java.security.AccessController.doPrivileged(AccessController.java:569) at io.netty.util.internal.SocketUtils.connect(SocketUtils.java:88) at io.netty.channel.socket.nio.NioSocketChannel.doConnect(NioSocketChannel.java:322) at io.netty.channel.nio.AbstractNioChannel$AbstractNioUnsafe.connect(AbstractNioChannel.java:248) at io.netty.channel.DefaultChannelPipeline$HeadContext.connect(DefaultChannelPipeline.java:1342) at io.netty.channel.AbstractChannelHandlerContext.invokeConnect(AbstractChannelHandlerContext.java:653) at io.netty.channel.AbstractChannelHandlerContext.connect(AbstractChannelHandlerContext.java:632) at io.netty.channel.ChannelDuplexHandler.connect(ChannelDuplexHandler.java:54) at io.grpc.netty.WriteBufferingAndExceptionHandler.connect(WriteBufferingAndExceptionHandler.java:157) at io.netty.channel.AbstractChannelHandlerContext.invokeConnect(AbstractChannelHandlerContext.java:655) at io.netty.channel.AbstractChannelHandlerContext.access$1000(AbstractChannelHandlerContext.java:61) at io.netty.channel.AbstractChannelHandlerContext$9.run(AbstractChannelHandlerContext.java:637) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:174) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:167) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:470) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:997) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) ... 2 more 
submitted by iamiamwhoami to learnjava [link] [comments]


2023.06.22 17:19 PHPOnTheCloud Unable to install client from Mac App Store - Direct connect or mirror download?

We use a combination of compliance products that - for some reason - doesn't allow Mac App Store downloads but I can install apps outside of that (I have local admin). I'd like to know if any of the following are options, and if so, what the steps would be?
I can successfully connect on my phone as well as personal laptop, so I know the connection and server are setup properly.
Connect directly outside of the client: I can add a VPN connection in settings, so if I can figure out what the client uses, I can just create it manually. Manual connections is what I normally use when connecting to VPNs anyways. Is there a way to work backwards or get the connection settings the client provides to the VPN in OSX so I can create it manually?
Download the app outside of the Mac App Store: I see there is an alternative download link for Android, so is there one buried someone in the website I missed? I don't believe I can copy the downloaded app from one machine to another since it was downloaded from the Mac App Store.
Thanks in advance!
Edit: Solution (from pm-me-your-nenen) was to download Shadowsocks client, add the server, switch to Global mode, and enable/disable as needed for your connection. I'd still like to look into connecting directly without the client, but this is certainly a solution for now. Marking resolved. Thanks!
Edit 2: I was having trouble getting non-web traffic to be funneled through the proxy no matter how I set it up. I’m sure it’s possible, and the resolution to download the other client did satisfy the ask in this list so I’m going to leave it up, but I ended up eventually just setting up another type of VPN supported natively by all my devices so I could toggle “send all traffic” in iOS and OSX settings. Thanks!
submitted by PHPOnTheCloud to outlinevpn [link] [comments]


2023.05.13 10:15 r0mmashka AUTOMATIC1111 updated to 1.2.0 version

Link - https://github.com/AUTOMATIC1111/stable-diffusion-webui/releases/tag/v1.2.0

Features:

Minor:

Extensions:

Bug Fixes:

submitted by r0mmashka to StableDiffusion [link] [comments]


2023.04.26 09:51 jackchak Proxy Generator not working

Trying Blackmagic Proxy Generator for the first time. Added a watch folder with 111 video files, then clicked "start". A 4:36:00 countdown began and status said "Processing 1/111".
Five hours later, I see the countdown finished, and it still says "Processing 1/111". And the proxy folder is empty.
Specs:
Davinci (free) 18.5b Mac OSX: Ventura 13.3.1 Screenshot (restarted countdown, now it's at 2:55:00, but no improvement)
submitted by jackchak to davinciresolve [link] [comments]


http://activeproperty.pl/