Save the date for the virtual Purple Team Summit on Friday, November 13, 2020.
This is a community driven event for the entire Purple Team from all levels including Executives to Students. We want to get Cyber Threat Intelligence, Red Team, Blue Team, SOC, Hunt Teams, Digital Forensics and Incident Response, and everything in between together for this free conference and workshops. More details coming soon.
The Call for Presentations is now open til October 18, 2020.
RaspAP lets you quickly get a WiFi access point up and running to share the connectivity of many popular Debian-based devices, including the Raspberry Pi. Our popular Quick installer creates a known-good default configuration that “just works” on all current Raspberry Pis with onboard wireless. A responsive interface gives you control over the relevant services and networking options...and lots more.
How to properly manage ssh keys for server access :: Päpper's Coding Blog — Have fun coding.
Every developer needs access to some servers for example to check the application logs. Usually, this is done using public-private key encryption where each developer generates their own public-private key pair. The public keys of each developer are added to the authorized_keys file on each server they should have access to.
https://www.paepper.com/blog/posts/how-to-properly-manage-ssh-keys-for-server-access/
Get ready for TikTok scams.
https://www.pcmag.com/opinions/ban-on-tiktok-and-wechat-is-an-open-invitation-for-scammers
Hey. Short #introduction
My name is Michael, and I like to talk about all sorts of technologies, especially security-related ones. I had been active here for a while, but a fresh start never hurts, I guess.
I am currently getting used to i3wm on Debian, work on my blog and wiki, and plan to complete some certs soon.
Some things I want to do soonish: hosting an IRC server and start coding web apps and bots in Python (Flask)
Happy to be here again.
😳
New Windows exploit lets you instantly become admin. Have you patched?
Zerologon lets anyone with a network toehold obtain domain-controller password.
I loved Pantera and Metallica when i was in high school (ack - >30 years ago!) and had a chance to listen to Metallica and felt long dormant neural pathways firing again, but damn that is some slow and boring music.
She had an ear infection a few weeks ago (this is how we found the tumor), and a nice young vet tech comes out to the car to get Lacie. The vet tech was probably 5 foot tall and maybe 95 pounds. I told her Lacie is really strong and doesn’t want to be here. “Oh, I work with dogs all the time. All good”. Oook. I hand her the leash. And off they go, away from the building, vet tech trying to stay upright.
In other news, she looks tiny in that picture. She is actually a 100 pound/45kg fur beast. I do believe, if she wanted to, she could pull my Expedition EL down the road.
Anyhow, we pulled into the parking lot and she knew what was up. She hadn’t eaten since yesterday and we went for an early morning drive to the vet. She panicked. I had to perform a complex dog extraction procedure. It started out pretty graceful, and ended like a pro wrestling match gone bad.
Podcast: https://defensivesecurity.org
Blog: https://infosec.engineering
Twitter: @maliciouslink
#infosec #security #llamas
Favorite = crush
Boost = marriage proposal