Posts
3283
Following
709
Followers
1570
"I'm interested in all kinds of astronomy."
@wolf480pl "We were in the jungle. There were too many of us. We had access to too much money, too much equipment, and little by little, we went insane."
0
0
1
Very important post by @kagihq (feel free to ignore the AI CEO-speak at the beginnig):

Waiting for dawn in search: Search index, Google rulings and impact on Kagi

https://blog.kagi.com/waiting-dawn-search
0
1
0
Feels like Sun spot activity is wild today...
0
0
0
@froge In theory maybe, in practice these updates introduce breaking changes (see my mention of QA).
0
0
0
@pancake I don't even remember when I last posted on LinkedIn but based on my e-mail notifications that last one will echo in the eternity!
0
0
0
Edited 1 hour ago
As developing a decent QA process for Linux distros seems to be impossible I don't get how enabling automatic updates by default seemed like a reasonable thing to do...
2
0
1
@floyd I used this thing for my first hacks in school <3
1
0
2
repeated

This is wild, there have been changes on the Cain&Able repository lately (yes that tool you used in your first IT security hands-on class 20 years ago) https://github.com/xchwarze/Cain

2
5
0
repeated
Cable modem died, yaay...
0
0
2
repeated

RE: https://tech.lgbt/@ShadowJonathan/115979646528496303

Give me Universal Basic Income and watch me obsessively plant fruit and nut trees in the entire city.

1
7
0
repeated
Edited 14 hours ago

Hey Hey, People.

Just updated my book-in-progress - Suricata: An Operator's guide.

This update finally closes out chapter 7, a scenarios/exercises chapter to help readers grasp the concepts of threat research and data pivoting, and how the data acquired gets turned into Suricata rules.

There are three scenario exercises in total:

Scenario 1: PolarEdge Botnet
Scenario 2: Myth Stealer
Scenario 3: Oyster backdoor

As always, the book is available for free, and I'm not expecting anyone to pay for my half-finished work. Download a copy here:

https://leanpub.com/suri_operator

the exercises chapter is made much more fun for readers, if they can follow along, so I've updated the github supplementaries repo with pcaps for both the second and third exercise. You can find that repo here:

https://github.com/da667/Suricata-An-Operators-Guide-Supplementaries

Future plans:

Chapter 8 is going to be another somewhat hands-on chapter, where readers learn how to "throw" and capture pcaps of proof-of-concept exploits, and/or forge their own pcaps based on threat research write-ups. I'm not 100% sure which CVEs/vulns I'll be picking on here, but I'll be doing three of them, just for some variety.

4
5
0
repeated

As a former K-12 technology educator, let me break this down for you. If a "toy" comes with an app, it isn't a toy; it's a data collection mechanism, and likely a brand loyalty engine.

Kids don't need these things. In fact, they're much, much better off without them.

https://www.wired.com/story/an-ai-toy-exposed-50000-logs-of-its-chats-with-kids-to-anyone-with-a-gmail-account/

0
7
0
[RSS] How to bisect Linux Kernel build and boot failures with TuxMake and TuxRun

https://www.linaro.org/blog/how-to-bisect-linux-kernel-build-and-boot-failures-with-tuxmake-and-tuxrun/
0
0
2
repeated

B'ad Samurai πŸπŸ‡ΊπŸ‡¦

Comodo has some newer MDM products they cannot, surprise-surprise, adequately protect from abuse.

*.itsm-us1.comodo[.]com (US)
*.cmdm.comodo[.]com (EU)
*.mdmsupport.comodo[.]com (legacy)

https://russianpanda.com/The-Abuse-of-ITarian-RMM-by-Dolphin-Loader

0
3
0
repeated

"A common fallacy is to assume authors of incomprehensible code will somehow be able to express themselves lucidly and clearly in comments."
– @kevlin

"... or prompts." I would like to add.

0
4
0
repeated

NoFX pops out of retirement to say 🀘:

https://www.youtube.com/watch?v=sU6s6VEJxrU

0
1
0
repeated

Today's software signatures may not survive tomorrow's quantum computers.
Over the past two years, we collaborated with the Sigstore community to build controlled cryptographic agility into the ecosystem with a centralized algorithm registry, configurable restrictions, and Go implementations of post-quantum algorithms LMS and ML-DSA to prove it's future-ready. https://blog.trailofbits.com/2026/01/29/building-cryptographic-agility-into-sigstore/

0
1
0
Show older