63 private links
A while ago I saw a nice Tweet on how to create QR codes from the command shell. There using the command qrencode.
This command can be used to display a WiFi Password. With an iPhone or Android (10) you’re able to scan QR code and connect to Wifi.It is more comfortable than entering the password on a phone.
The string that will be placed within the QRcode needs to follow a specific format, here is an example for this:
qrencode -o - 'WIFI:T:WPA;S:MyNetworkName;P:ThisIsMyPassword;; ' |display
The command will generate the following QR code that can be used by a mobile device. Scanning it with the camera app will ask you to connect to the given Wifi:
rickroll script
Come up with excuses for why your company was breached
Home of the EICAR malware testfile
Saagar Jha's website.
Humourous take on why companies switch technologies
3d scans of art and architecture of the world, ready for 3d printing
At Black Hat USA 2015 this summer (2015), I spoke about the danger in having Kerberos Unconstrained Delegation configured in the environment. When Active Directory was first released with Windows 2000 Server, Microsoft had to provide a simple mechanism to support scenarios where a user authenticates to a Web Server via Kerberos and needs to ...
-A: Get lines after match
-B: Get lines before match
-C: Get lines both before and after match
-i: Case-insensitive match
-v: Only lines that don't match
-w: Whole-word matches only
-h: Prefix filename to match output
-o: Only output matching portion
-l (lowercase L): Only output file names
-r: Recurse through directories
-I (uppercase i): Search only textfiles
-e: Activate extended regex flags
Link seems to fail if coming from shaarli?
A mix of the emotional attachment to images, the difficulty of clearing exes from a Facebook account, and some access control problems. The author concludes by saying that companies should offer better ways to manage that - but I can't imagine how to implement such things.
“Basically the perfect ending to cybersecurity in 2021 is a 90s style Java vulnerability in an open source module, written by two volunteers with no funding, used by large cybersecurity vendors, undetected until Minecraft chat got pwned, where nobody knows how to respond properly.”
"To me, this is reason enough never to use smart contracts for anything important. Human-based adjudication systems are not useless pre-Internet human baggage, they’re vital."