Posts
3196
Following
706
Followers
1563
"I'm interested in all kinds of astronomy."
repeated

Valve releases full Team Fortress 2 game code to encourage new, free versions
Other Source games also get the Half-Life 2 anniversary update treatment.
https://arstechnica.com/gaming/2025/02/valve-releases-full-team-fortress-2-game-code-to-encourage-new-free-versions/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

1
3
0
TIL there is a non-stop Mythbusters channel on YT :O

https://www.youtube.com/watch?v=brUPUA0WNQ8
0
1
3
Has anyone managed to remote kernel debug Windows VMs over IP with virtio NIC drivers?
0
1
0
repeated
repeated

🚀 Master heap exploitation with Corelan in Zagreb! Hands-on, real-world skills from the best. Limited spots—sign up now! 🔥
https://deep-conference.com/training-corelan-heap-exploit-development-masterclass-for-windows/

0
2
0
repeated

After a long and restful break since leaving my last role, I'm back to actively looking for new problems to solve. If you know of anyone looking for someone with an extensive background in security leadership, application security, & penetration testing, let me know!

Resume: https://adamcaudill.com/resume/

0
2
0
#history #democracy #suffrage
Show content
I'd be interested to read up on arguments against limiting voting rights based on knowledge (e.g. literacy). I've been told that the systems can be (and were, see Wikipedia) abused, but a) flawed implementations don't necessarily invalidate the underlying concept b) the lack of restrictions can also be abused (as we can plainly see).
0
0
0
Edited 11 months ago
[RSS] Ivanti Endpoint Manager - Multiple Credential Coercion Vulnerabilities

https://www.horizon3.ai/attack-research/attack-blogs/ivanti-endpoint-manager-multiple-credential-coercion-vulnerabilities/

CVE-2024-10811: Credential Coercion Vulnerability in GetHashForFile
CVE-2024-13161: Credential Coercion Vulnerability in GetHashForSingleFile
CVE-2024-13160: Credential Coercion Vulnerability in GetHashForWildcard
CVE-2024-13159: Credential Coercion Vulnerability in GetHashForWildcardRecursive
0
1
3
[RSS] Hackaday Europe 2025: Speakers, Lightning Talks, and More!

https://hackaday.com/2025/02/18/hackaday-europe-2025-speakers-lightning-talks-and-more/
0
0
0
[RSS] Auto-Download Your Kindle Books Before February 26th Deadline

https://hackaday.com/2025/02/18/auto-download-your-kindle-books-before-february-26th-deadline/
0
0
0
repeated

Four years ago I got my first threat of violence for my Open Source work that I ended up reporting to the police. Thick skin and all that, but there are limits...

https://daniel.haxx.se/blog/2021/02/19/i-will-slaughter-you/

1
3
0
repeated

This is *the most malicious, brutal* malicious compliance I've seen in quite some time, possibly ever, and I am HERE FOR IT. Thank you, @jwz

https://www.jwz.org/xscreensaver/google.html

3
16
0
repeated

Normally you can't auth to Entra ID connected webapps with bearer tokens. But if Teams can open SharePoint/OneDrive with an access token, I guess so can we. roadtx now supports opening SharePoint with access tokens in the embedded browser 😀

0
5
0
repeated

So, coup by the evil venture capitalists. I kindly suggest the good venture capitalists should proceed to stand up and actively fight this, before everything goes full Palpatine.

2
3
0
repeated

Thrilled to share that Kagi has reached 40,000 members! 🚀

Thank you to each and every one of you for believing in a better, more private, and ad-free search experience. Your support fuels our mission every day. Here's to the next milestone! 🙌

1
2
1
repeated
repeated

Inside imessage-exporter: Reverse Engineering Apple's typedstream Format by @rxcs

https://chrissardegna.com/blog/reverse-engineering-apples-typedstream-format/

0
2
0
repeated
repeated

I should just share all of Trails of Bits new posts, right? It's the best cryptography blog I know of.

This time they're discussing key derivatives (as in, how to get a private key? How to generate more keys out of it?).

https://blog.trailofbits.com/2025/01/28/best-practices-for-key-derivation/

1
3
0
Show older