Hacker Poesy
  • FAQ
  • Login
  • Public

    • Public
    • Groups
    • Recent tags
    • Popular
    • Directory

Notices tagged with security, page 10

  1. Roland Häder (roland)'s status on Friday, 05-Aug-2016 05:03:35 EDT Roland Häder Roland Häder
    Remote profile options...
    !security #php5 my improved #ctracker version does now also log and block (mostly) unwanted request methods such as CONNECT. This one for example can be (ab-)used for sending bulk mails out and wasting your bandwidth for their spam.
    Friday, 05-Aug-2016 05:03:35 EDT from social.mxchange.org permalink
  2. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Thursday, 04-Aug-2016 13:31:42 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    Oh boy. When a Certificate Authority acquires a MITM SSL spoofer, HTTPS becomes pretty useless http://www.theregister.co.uk/2016/06/14/symantec_blue_coat_analysis/ !security
    Thursday, 04-Aug-2016 13:31:42 EDT from sn.jonkman.ca at 43°36'0"N 80°32'58"W permalink
  3. Markus Kilås (netmackan)'s status on Thursday, 04-Aug-2016 08:02:00 EDT Markus Kilås Markus Kilås
    Remote profile options...
    Homebrew tells users to curl to bash without HTTPS. Complains on browser plugin changing to HTTPS... !security http://qttr.at/1ff7
    Thursday, 04-Aug-2016 08:02:00 EDT from quitter.se permalink
  4. Roland Häder (roland)'s status on Thursday, 04-Aug-2016 07:13:57 EDT Roland Häder Roland Häder
    Remote profile options...
    • ghostdancer
    @ghostdancer also really interesting: https://www.oreilly.com/learning/injecting-security-into-continuous-delivery cc !security
    Thursday, 04-Aug-2016 07:13:57 EDT from social.mxchange.org permalink
  5. MMN-o ✅⃠ (mmn)'s status on Wednesday, 03-Aug-2016 07:21:54 EDT MMN-o ✅⃠ MMN-o ✅⃠
    Remote profile options...
    !security should read about my easy success with the SCR331 smartcard reader: https://social.umeahackerspace.se/notice/598483
    Wednesday, 03-Aug-2016 07:21:54 EDT from social.umeahackerspace.se at 63°49'42"N 20°15'34"E permalink
  6. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 29-Jul-2016 23:23:35 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    ♻ @thegrugq !Tor hidden services are mostly deanonymised by configuration errors, not breaks in Tor or encryption. OpSec isn’t about tech ¶ via #Twitter !security
    Friday, 29-Jul-2016 23:23:35 EDT from sn.jonkman.ca at 43°36'0"N 80°32'58"W permalink
  7. Markus Kilås (netmackan)'s status on Tuesday, 26-Jul-2016 10:53:31 EDT Markus Kilås Markus Kilås
    Remote profile options...
    Qubes !Security Bulletin #24 (for a critical bug in Xen) #QubesOS https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-024-2016.txt
    Tuesday, 26-Jul-2016 10:53:31 EDT from quitter.se permalink
  8. MMN-o ✅⃠ (mmn)'s status on Monday, 25-Jul-2016 14:33:23 EDT MMN-o ✅⃠ MMN-o ✅⃠
    Remote profile options...
    ^- !security
    Monday, 25-Jul-2016 14:33:23 EDT from social.umeahackerspace.se at 63°49'42"N 20°15'34"E permalink
  9. Markus Kilås (netmackan)'s status on Thursday, 21-Jul-2016 11:44:42 EDT Markus Kilås Markus Kilås
    Remote profile options...
    Announcing updated requirements for Qubes-certified hardware: #QubesOS !security !privacy http://qttr.at/1etb
    Thursday, 21-Jul-2016 11:44:42 EDT from quitter.se permalink
  10. Roland Häder (roland)'s status on Tuesday, 19-Jul-2016 08:59:43 EDT Roland Häder Roland Häder
    Remote profile options...
    Fix your server from an old bug dated back to #2001: https://httpoxy.org/ #httpoxy out-going traffic from your server is maybe affected (API calls). cc !security
    Tuesday, 19-Jul-2016 08:59:43 EDT from social.mxchange.org permalink
  11. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 18-Jul-2016 13:35:44 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    UofW Centre for Applied Cryptographic Research is having a seminar on "Security analysis of Brazilian voting machines" with @dfaranha https://calendar.google.com/calendar/event?eid=ZWQwMm9odjRuNzB2anRwOWp2YWZiaW45MnMgbmxrYzM5anQ0cDBuYmM0cGs5cGo3cDVmaDBAZw&ctz=America/New_York !Crypto !Security !ElectoralReform
    Monday, 18-Jul-2016 13:35:44 EDT from sn.jonkman.ca at 43°36'0"N 80°32'58"W permalink
  12. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 18-Jul-2016 12:18:31 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • Kevin Macphail
    @kevie Have you tried a phone with @CopperheadOS? Designed for !security! https://copperhead.co/blog/ #TuxJam
    Monday, 18-Jul-2016 12:18:31 EDT from sn.jonkman.ca at 43°36'0"N 80°32'58"W permalink
  13. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Saturday, 16-Jul-2016 18:37:31 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • Kitchener Waterloo Linux User Group
    • lnxw48 (Linux Walt)
    @lnxw48 @lanodan_frndk +1 for password databases. I want @KWLUG to have a night of PW DB comparisons !security
    Saturday, 16-Jul-2016 18:37:31 EDT from sn.jonkman.ca at 43°36'0"N 80°32'58"W permalink
  14. lnxw48 (Linux Walt) (lnxw48)'s status on Saturday, 16-Jul-2016 17:24:48 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    • Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    • Haelwenn ['elwen'] Monnier
    @lanodan_frndk @bobjonkman Using longer passwords also serves a second purpose: I know I cannot remember them, so I must always use a password database for generation, storage, and entering passwords, which greatly improves !security. I've been trying to convince family members to likewise use the longest-possible randomly-generated passwords for exactly that reason.
    Saturday, 16-Jul-2016 17:24:48 EDT from fresh.federati.net permalink
  15. lnxw48 (Linux Walt) (lnxw48)'s status on Saturday, 16-Jul-2016 17:21:47 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    • Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    • Haelwenn ['elwen'] Monnier
    @lanodan_frndk @bobjonkman It is difficult for users to know whether a particular service uses a bad hashing algorithm. Also difficult to know whether the service uses a poor implementation of a better algorithm. !security.
    Saturday, 16-Jul-2016 17:21:47 EDT from fresh.federati.net permalink
  16. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Saturday, 16-Jul-2016 16:10:22 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • lnxw48 (Linux Walt)
    72 character passwords! I thought I was doing well at 25 characters! !security
    Saturday, 16-Jul-2016 16:10:22 EDT from sn.jonkman.ca at 43°36'0"N 80°32'58"W permalink
  17. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Thursday, 14-Jul-2016 03:13:47 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    Now that the sn.jonkman.ca instance is back, the following !Fedgroups hosted here should be back too: !crypto !database !electoralreform !fdroid !food !fs !gnewsense !gnupg !googlefree !grap !hug !kwlug !lazyweb !mint !opendata !openhardware !osm !owncloud !replicant !scifi !security !sriracha !wasabi !sfd !ubuntu !ubuntuca !selfhost !sysadmin !weather !trisquel Welcome back, everybody!
    Thursday, 14-Jul-2016 03:13:47 EDT from sn.jonkman.ca at 43°36'0"N 80°32'58"W permalink Repeated by chimo
  18. MMN-o ✅⃠ (mmn)'s status on Thursday, 14-Jul-2016 04:11:53 EDT MMN-o ✅⃠ MMN-o ✅⃠
    Remote profile options...
    • pettter ✅
    • Linus Nordberg
    I think @ln5 was on there if I'm not mistaken. !security #tor
    Thursday, 14-Jul-2016 04:11:53 EDT from social.umeahackerspace.se at 63°49'42"N 20°15'34"E permalink
  19. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Thursday, 14-Jul-2016 03:13:47 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    Now that the sn.jonkman.ca instance is back, the following !Fedgroups hosted here should be back too: !crypto !database !electoralreform !fdroid !food !fs !gnewsense !gnupg !googlefree !grap !hug !kwlug !lazyweb !mint !opendata !openhardware !osm !owncloud !replicant !scifi !security !sriracha !wasabi !sfd !ubuntu !ubuntuca !selfhost !sysadmin !weather !trisquel Welcome back, everybody!
    Thursday, 14-Jul-2016 03:13:47 EDT from sn.jonkman.ca at 43°36'0"N 80°32'58"W permalink
  20. MMN-o ✅⃠ (mmn)'s status on Thursday, 23-Jun-2016 04:49:44 EDT MMN-o ✅⃠ MMN-o ✅⃠
    Remote profile options...
    !security Hm, I thought employed e2e encryption? While I guess it might still be bad and made up on their own, I at least assumed cleartext wasn't available on the server! http://www.dailydot.com/politics/telegram-isis-encryption-cryptography/

    (not that I've been using the centralised pile of crap anyway, but I just yesterday said I believe Telegram uses e2e comms)
    Thursday, 23-Jun-2016 04:49:44 EDT from social.umeahackerspace.se permalink
  • After
  • Before
Start the article for #security on WikiHashtags

Feeds

  • Activity Streams
  • RSS 1.0
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • Privacy
  • Source
  • Version
  • Contact

Hacker Poesy is a GNU social hub. It runs version 1.1.3-beta3, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Hacker Poesy content and data are available under the Creative Commons Attribution 3.0 license.

Switch to mobile site layout.