|
10 peperony and chease references only 90s kids will understand
|
# ? Dec 1, 2014 12:15 |
|
|
# ? Apr 24, 2024 01:18 |
|
ultramiraculous posted:
|
# ? Dec 1, 2014 12:31 |
|
alternatively: https://www.youtube.com/watch?v=44uYz6PuTj0
|
# ? Dec 1, 2014 12:43 |
|
three of those layers are terrible
|
# ? Dec 1, 2014 12:47 |
|
jony ive aces posted:yeah literally everyone who isn't an infidel from the great satan amerikkka has autism that wasn't my point at all lmfao
|
# ? Dec 1, 2014 13:53 |
|
Main Paineframe posted:For example, to start a queue you PUT to /queue/:name where :name is the unique identifier for your queue. free man() on the lan
|
# ? Dec 1, 2014 14:11 |
|
prefect posted:three of those layers are terrible but enough about the osi model
|
# ? Dec 1, 2014 14:13 |
|
also: https://twitter.com/JamesDeanTimes/status/538253074876612608/photo/1
|
# ? Dec 1, 2014 14:15 |
|
goddamnedtwisto posted:but enough about the osi model actually, agreed.
|
# ? Dec 1, 2014 14:31 |
|
owns
|
# ? Dec 1, 2014 16:02 |
|
hahahaha thank you glorious republic of north korea
|
# ? Dec 1, 2014 16:12 |
|
we have this component at work that runs powerpoint using COM and macros and other fun things and whenever it gets an outcome it doesn't expect (like a popup) it presses escape and prints PRESSING ESCAPE to its log like 100 times and sends us an email that says PRESSING ESCAPE. so that last picture is technically accurate computering
|
# ? Dec 1, 2014 17:48 |
|
computer toucher posted:I've never heard of layered bean dips either.
|
# ? Dec 1, 2014 18:15 |
|
Chris Knight posted:free man() on the lan
|
# ? Dec 1, 2014 18:33 |
|
Seth Rogen movie looks funny as heck. Totes gonna watch it.
|
# ? Dec 1, 2014 18:52 |
|
If any of y'all run OpenVPN you need to patch your stuff [Openvpn-announce] OpenVPN 2.3.6 released - fixes a critical DoS issue From: Samuli Seppänen <samuli@op...> - 2014-12-01 18:21:34 Attachments: openvpn-2.3.6-changelog openvpn-2.3.6-changelog.sig -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The OpenVPN community project team is proud to release OpenVPN 2.3.6. It can be downloaded from here: <http://openvpn.net/index.php/open-source/downloads.html>; This release fixes a critical denial of service vulnerability in OpenVPN servers (CVE-2014-8104). The vulnerability can be exploited by authenticated clients only. Also note that confidentiality and authenticity of traffic are not affected. More information about this vulnerability is available on the Trac Wiki: <https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b>; This release also includes a few other fixes and enhancements. A full list of changes is available here: <https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn23>; The changelog is also attached to this email. The 2.2 branch in Git has also been patched for the DoS vulnerability. Fixed source packages (2.2.3) are also provided, primarily for the benefit of OpenVPN package maintainers. Official Windows installers based on 2.2.3 will not be released. For generic help use these support channels: - - - Official documentation: <http://openvpn.net/index.php/open-source/documentation/howto.html>; - - - Wiki: <https://community.openvpn.net>; - - - Forums: <https://forums.openvpn.net>; - - - User mailing list: <http://sourceforge.net/mail/?group_id=48978>; - - - User IRC channel: #openvpn at irc.freenode.net Please report bugs and ask development questions here: - - - Bug tracker and Wiki: <https://community.openvpn.net>; - - - Developer mailing list: <http://sourceforge.net/mail/?group_id=48978>; - - - Developer IRC channel: #openvpn-devel at irc.freenode.net (requires Freenode registration) - - -- Samuli Seppänen Community Manager OpenVPN Technologies, Inc -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAlR8saQACgkQwp2X7RmNIqN63wCfWzr5rN60BoHuir//x0jSkvtQ 7n8An2ppL7+1QQ/3VxGMwlYbdEgBzu3q =X0lz -----END PGP SIGNATURE-----
|
# ? Dec 1, 2014 20:04 |
|
this'll be fun for routers. although you need to have a valid client cert so it's not a big deal if you trust your clients.
|
# ? Dec 1, 2014 20:05 |
|
spankmeister posted:The OpenVPN community project team is proud to release OpenVPN 2.3.6.
|
# ? Dec 1, 2014 20:21 |
|
spankmeister posted:If any of y'all run OpenVPN you need to patch your stuff fuuuuuuck quote:The vulnerability can be exploited by authenticated clients only.
|
# ? Dec 1, 2014 20:35 |
|
please post screencaps of tweets for those of us who cannot get to the twit
|
# ? Dec 1, 2014 21:36 |
|
spankmeister posted:alternatively:
|
# ? Dec 1, 2014 21:36 |
|
Bloody posted:please post screencaps of tweets for those of us who cannot get to the twit
|
# ? Dec 1, 2014 21:38 |
|
please post screencaps to popular image hosts that are unlikely to not be whitelisted
|
# ? Dec 1, 2014 21:44 |
|
project zero's internet explorer sandbox escape write-up is up
|
# ? Dec 1, 2014 21:48 |
|
Wiggly Wayne DDS posted:project zero's internet explorer sandbox escape write-up is up the safari one was cool, looking forward to this
|
# ? Dec 1, 2014 22:11 |
|
quote:Now if at this point you might be getting uncomfortable that’s understandable. As the marshaler is little different between DCOM and in-process COM this is surely a massive security hole? Fortunately not, the FTM doesn’t just send the pointer value it also tries to ensure only the same process which marshaled the pointer can unmarshal it again. It does this by generating a per-process 16 byte random value which is attached to the serialized data. When deserializing the FTM checks that the value matches the one in the current process, rejecting anything which is incorrect. The assumption here is an attacker can’t guess or brute-force such a value, therefore the FTM will never unmarshal an invalid pointer. But this threat model obviously doesn’t take into account being able to read process memory, and it just so happens we have just such a vulnerability. i love this poo poo
|
# ? Dec 1, 2014 22:38 |
|
jre posted:
yah it's only a real issue if you don't trust your clients
|
# ? Dec 1, 2014 22:45 |
|
ultramiraculous posted:i love this poo poo same
|
# ? Dec 1, 2014 23:38 |
|
anyone got a good suggestion for skimming through the nmap xml output easily? i have seen some examples but i'd like to avoid writing my own parser i will if i have to but i'd rather not
|
# ? Dec 2, 2014 00:24 |
|
OSI bean dip posted:anyone got a good suggestion for skimming through the nmap xml output easily? i have seen some examples but i'd like to avoid writing my own parser im emailing u an xml file thats just full of laughs
|
# ? Dec 2, 2014 00:54 |
|
OSI bean dip posted:anyone got a good suggestion for skimming through the nmap xml output easily? i have seen some examples but i'd like to avoid writing my own parser ive used python's libnmap for some basic stuff before and its not too bad http://libnmap.readthedocs.org/en/latest/parser.html
|
# ? Dec 2, 2014 00:55 |
|
proclick: https://dl.acm.org/citation.cfm?id=2673311 https
|
# ? Dec 2, 2014 02:04 |
|
Series DD Funding posted:proclick: https://dl.acm.org/citation.cfm?id=2673311 im the y axis
|
# ? Dec 2, 2014 02:10 |
|
Bloody posted:im the y axis tufte wept
|
# ? Dec 2, 2014 02:26 |
|
I need an audit on 127.0.0.1 done. Any takers? Please disclose your fee.
|
# ? Dec 2, 2014 02:58 |
|
Bloody posted:
dat fukken charte
|
# ? Dec 2, 2014 03:00 |
|
because i like the title: IETF takes rifle off wall, grabs RC4 cipher's collar, goes behind shed
|
# ? Dec 2, 2014 03:13 |
|
suffix posted:because i like the title: same
|
# ? Dec 2, 2014 03:28 |
|
Bloody posted:
not in it, voted 5
|
# ? Dec 2, 2014 03:40 |
|
|
# ? Apr 24, 2024 01:18 |
|
what the gently caress is with get.rvm.io and travis-ci.org being down all goddamn day? I think someone at work mentioned denial of service? goddammit i have a docker image i need to build that relies on get.rvm.io working. If they're using dnsimple, they need to find a dns provider that doesn't take going on 11 hours to deal with a denial of service attack, because this leads me to believe they're fuckin slow http://dnsimplestatus.com/
|
# ? Dec 2, 2014 04:47 |