UNIX loves files. And files love UNIX.

Here are some ways to read files from your filesystem.

Ever heard of tac? No, then have a look ^^

"Command line quick tips: Reading files different ways"


#Fedora #Linux #FedoraMagazine

Naming & Shaming Web Polluters: Xiongmai

In late 2016, the world witnessed the sheer disruptive power of Mirai, a powerful botnet strain fueled by Internet of Things (IoT) devices like DVRs and IP cameras that were put online with factory-default passwords and other poor security settings.


I wonder what kind of bump Mastodon will get now that G+ is shutting down. 🤔


However that is leaving out some key details. For one Qualys does some questionable things, like seemingly rating the "X25519" exchange lower (if enabled) than secp386, despite being better.

It also doesnt test key security elements. Mozillas Observatory ( observatory.mozilla.org/ ) will instantly fail you if your site allows you to connect via http without being redirected to https for example. And it also tests applications themselves, because X-Options are just as important.

Upcoming changes in chrome extensions:
- User controls for host permissions
- Ext. requesting powerful permissions => additional compliance review
- Ext. with obfuscated code no longer allowed
- in 2019 2SV mandatory for dev accounts

Achieving a high security score for TLS

I thought Mastodon was already secure?

Well, it depends. You see, a Mastodon instance is just a web server, like any other on the internet. It's only as secure as how the sto...


States- Rights seem to only be acceptable when they conform to certain political agendas for some in this era. Good on California for asserting protections for their citizens in this time of division.

Calif. enacts net neutrality law—US gov’t immediately sues to block it [Updated]

Justice Department sues California—Ajit Pai called state rules "illegal."


Attackers Take Over 50 Million Accounts in Facebook Breach

Attackers exploited vulnerabilities in Facebook’s code to gain access to at least 50 million Facebook user accounts. Those accounts could have been used for information gathering campaigns, as attackers had full access to the user’s profile, friends list, and usage history.

Attackers Take Over 50 Million Accounts in Facebook Breach duo.com/decipher/attackers-tak

Getting Closer to a Surveillance-Free Internet

Cloudflare has been working with the likes of Google, Mozilla, Fastly and Apple to make it harder for ISPs and other network operators from being able to see what sites users are visiting. Cloudflare has rolled out ESNI on its systems to see how well the experimental technical specification works to hide user activity online.

Tor Browser Bundle 8.0 Sends OS+kernel+TOTAL_PING_COUNT in Update Queries to Mozilla

Tor Browser Bundle 8.0 Sends OS+kernel+TOTAL_PING_COUNT in Update Queries to Mozilla soylentnews.org/article.pl?sid

French Government Open Sources Secure Operating System - Security Boulevard

The French government's national cybersecurity agency has released an operating system built using open source components internally over the course of The French government's national cybersecurity agency has released an open source operating system built internally over more than 10 years.


Cloudflare Makes InterPlanetary File System Globally Accessible

Cloudflare has released a gateway and browser extension to make the distributed IPFS network easily and securely accessible.


Disclaimer, this is an opinion piece. Exerts claims that are likely building a highly detailed of intelligence on any individual they can get their hands on. breach data, data. You name it. It's China's social media intelligence database.

Gentle reminder that Russia's cyber acts of late are an actual threat to the world. Although the attacks to date may not have been a direct focus on your country, it would nonetheless act as practice shooting.

Show more
Infosec Exchange

A Mastodon instance for info/cyber security-minded people.