It took 30 years to make email clients sort-of secure. So now we replace email with chat systems that have exactly the same bugs.
What a missed opportunity to title this
“ICMP packets over IPv6 only want one thing and it’s disgusting”
They missed the headline of the week.
wow: #curl is moving to a RustTLS backend – initially opt-in, but the plan is to make it the default eventually. https://www.abetterinternet.org/post/memory-safe-curl/
I did *not* see that coming. I thought we might one day get a #rust alternative to curl, but curl itself embracing Rust is quite the vote of confidence.
(imo, more meaningful that FAANG's recent/continuing rust love)
This is what the northern lights look like from inside a U-2 spy plane at 70,000ft. Incredible photos by Ross Franquemont: http://bit.ly/2D9iR33
Today is the 25th anniversary of Hackers and there is a live stream with director and cast commentary starting at 00:00 GMT. #HackThePlanet! https://www.dnalounge.com/calendar/2020/09-15.html
OpenBSD people ... I have a question as I am preparing an article for the next episode about OpenBSD in general and PF...
Just exactly/approx. how good of a firewall You can build out of OpenBSD? Should I simply think of pFsense or it can go way beyond that (more secure, more features, IDS/IPS)?
The State Office for Geoinformation and Surveying Lower Saxony has advertised some very exciting dev jobs in #Hannover (fairly paid for civil service in Germany). The job advertisement is in German and good German language skills are required, but nationality is not important.
so Im going to @bsdcan 2020 :) ...
and Ill be giving a tutorial on OpenBSD Networking
and giving a talk about how we use OpenBSD +OpenBGPD in our ISP ... :)
iwx(4) has been committed to #OpenBSD -current
Hohoho. Time to unsubscribe from the last FreeBSD mailing list after this: https://lists.freebsd.org/pipermail/freebsd-security/2020-February/010167.html
Even Windows has a firewall enabled by default these days. It's not even funny anymore.
Today in #infosec is our first buffer overflow exploit class. I really like this class, watching the newcomers actually exploit the machine to do something unintended and watching them light up in excitement
They have 2 flags to get: one by overwriting %rip to point to another function to jump to it on return, and the other by overwriting a variable value on the stack to trigger alternate code flow paths.
Yes all the mitigations are off. But it's their first exploit.
Fun fact. SNMP MIB database shipped with OpenBSD contains private enterprise numbers for all companies I've ever worked for.
Courtesy of @reyk of course!
Blockchains are like grappling hooks, in that it's extremely cool when you encounter a problem for which they're the right solution, but it happens way too rarely in real life.
An aspiring software engineer. Mastodon fan. I speak for myself.
The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!