Hacker Poesy
  • FAQ
  • Login
  • Public

    • Public
    • Groups
    • Recent tags
    • Popular
    • Directory

Notices tagged with security, page 14

  1. rien (rien)'s status on Saturday, 04-Apr-2015 14:46:51 EDT rien rien
    Remote profile options...
    How to make sure the #Enigmail file you downloaded is the real deal: 1) Download the file and its ‘Open PGP’ signature: http://status.hackerposse.com/url/7025 2) Learn that you must download the key the packages have been signed with: http://status.hackerposse.com/url/7026 3a) Download gpg-curl and configure gpg to download keys securely, as described in http://status.hackerposse…
    Saturday, 04-Apr-2015 14:46:51 EDT from quitter.no permalink

    Attachments

    1. security-20150404-ostatus-9yh7.html
  2. Markus Kilås (netmackan)'s status on Saturday, 04-Apr-2015 05:52:27 EDT Markus Kilås Markus Kilås
    Remote profile options...
    Why you think the PKI sucks !crypto !security https://t.co/SCvYlWITA3
    Saturday, 04-Apr-2015 05:52:27 EDT from quitter.se permalink
  3. harald (harald)'s status on Friday, 03-Apr-2015 16:11:02 EDT harald harald
    Remote profile options...
    TrueCrypt security audit completed: http://qttr.at/o2t #security !privacy !crypto
    Friday, 03-Apr-2015 16:11:02 EDT from quitter.no permalink
  4. Christian F [Admin] (pagsheathenman)'s status on Monday, 30-Mar-2015 11:58:53 EDT Christian F [Admin] Christian F [Admin]
    Remote profile options...
    !listening http://r.8.je/jpq
    this #firefox addon is best flash player alternative ive seen yet: Video WithOut Flash
    !security !watching
    Monday, 30-Mar-2015 11:58:53 EDT from pags.to permalink
  5. benfell (benfell)'s status on Wednesday, 25-Mar-2015 03:55:46 EDT benfell benfell
    Remote profile options...
    *Why* on ${DEITY}'s green earth would nsd use SSL3? And how can I get it to stop bitching that 'certificate verify failed', presumably because it is stupid enough to use SSL3? Even commenting out the directives in nsd.conf doesn't stop it from complaining. !security
    Wednesday, 25-Mar-2015 03:55:46 EDT from cybernude.org permalink
  6. lnxw48 (Linux Walt) (lnxw48)'s status on Monday, 23-Mar-2015 23:07:25 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    • zoowar
    RP @zoowar: No accountability: #crypto https://indy.im/url/5765123 // #CertAuthority misconduct affects everyone's !security
    Monday, 23-Mar-2015 23:07:25 EDT from fresh.federati.net permalink
  7. Chimo (chimo)'s status on Thursday, 19-Mar-2015 10:32:12 EDT Chimo Chimo
    Remote profile options...
    As promised: https://openssl.org/news/secadv_20150319.txt #openssl #security
    Thursday, 19-Mar-2015 10:32:12 EDT from sn.chromic.org permalink
  8. lnxw48 (Linux Walt) (lnxw48)'s status on Tuesday, 17-Mar-2015 18:08:47 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    mentions #Intel's hardware entropy generator, #haveged, #audio-entropyd, #video-entropyd; does not mention #egd, #prngd
    Tuesday, 17-Mar-2015 18:08:47 EDT from fresh.federati.net permalink
  9. lnxw48 (Linux Walt) (lnxw48)'s status on Tuesday, 17-Mar-2015 18:03:37 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    #Cloudflare blog: ensuring !security with #random numbers from the #Linux kernel's #entropy pool http://url.federati.net/diJIV
    Tuesday, 17-Mar-2015 18:03:37 EDT from fresh.federati.net permalink
  10. lnxw48 (Linux Walt) (lnxw48)'s status on Tuesday, 17-Mar-2015 13:52:11 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    More #FREAK #SSL vuln info: more than 28,000 hosts in #IPv4 space use the same short #RSA key http://url.federati.net/Kk6gR !security // Unbelievably lazy and stupid
    Tuesday, 17-Mar-2015 13:52:11 EDT from fresh.federati.net permalink
  11. qbi (qbi)'s status on Monday, 16-Mar-2015 16:40:30 EDT qbi qbi
    Remote profile options...
    Bei den !clt gibt es wieder eine Keysigning-Party. Details auf http://qttr.at/n4v
    !security !crypto
    /cc @clt_news
    Monday, 16-Mar-2015 16:40:30 EDT from quitter.se permalink
  12. Joshua Judson Rosen (rozzin)'s status on Monday, 16-Mar-2015 10:34:32 EDT Joshua Judson Rosen Joshua Judson Rosen
    • Computer and Network Security
    Gibson's at it again with some squirrelly new web #authentication scheme... https://www.grc.com/sqrl/sqrl.htm !security
    Monday, 16-Mar-2015 10:34:32 EDT from AndStatus permalink
  13. pskosinski (pskosinski)'s status on Wednesday, 11-Mar-2015 19:51:13 EDT pskosinski pskosinski
    Remote profile options...
    $ cat ~/local/bin/chromium
    #!/usr/bin/env bash
    /usr/bin/chromium --ignore-certificate-errors &> /dev/null &

    Because CA system is shit anyway. !security
    Wednesday, 11-Mar-2015 19:51:13 EDT from quitter.no permalink
  14. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Sunday, 08-Mar-2015 16:10:03 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • Kitchener-Waterloo Cryptography Interest Group
    !Crypto !Security https://uwaterloo.ca/institute-for-quantum-computing/events/cybersecurity-quantum-world-will-we-be-ready 7pm, Tue 10 Mar 2015
    Sunday, 08-Mar-2015 16:10:03 EDT from sn.jonkman.ca at 43°36'0"N 80°32'58"W permalink
  15. Roland Häder (roland)'s status on Saturday, 07-Mar-2015 10:42:27 EST Roland Häder Roland Häder
    Remote profile options...
    • Chimo
    @chimo why did I never have heard of it before the #Snowden leaks? cc !security If they exist since #2009 then there must be more about them.
    Saturday, 07-Mar-2015 10:42:27 EST from social.mxchange.org permalink
  16. Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 02-Mar-2015 00:05:47 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca
    Remote profile options...
    • cbarbata
    @cbarbata DNS cache poisoning doesn't attack that site, but the DNS servers you use to look up the IP address for that site, leading you to connect to a malicious IP address. If true, your DNS server or one upstream has been compromised. Could be the DNS cache in your router, could be the DNS server at your ISP. Could be the root DNS servers, but I think the Internets would have said something by now. !security
    Monday, 02-Mar-2015 00:05:47 EST from sn.jonkman.ca at 43°36'0"N 80°32'58"W permalink
  17. lnxw48 (Linux Walt) (lnxw48)'s status on Sunday, 01-Mar-2015 14:40:11 EST lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    Seen on #Libertree: RF attack vs #GPG keys http://url.federati.net/Q67Lv !security
    Sunday, 01-Mar-2015 14:40:11 EST from fresh.federati.net permalink
  18. lnxw48 (Linux Walt) (lnxw48)'s status on Sunday, 01-Mar-2015 03:46:16 EST lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    Buffer Overflow: Overwriting Return Value http://head4.me/3d learning about !security in applications
    Sunday, 01-Mar-2015 03:46:16 EST from fresh.federati.net permalink
  19. lnxw48 (Linux Walt) (lnxw48)'s status on Friday, 27-Feb-2015 12:05:47 EST lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    KrebsOnSecurity: spammers using links to crack into routers where default passwords not changed http://head4.me/3c !security
    Friday, 27-Feb-2015 12:05:47 EST from fresh.federati.net permalink
  20. Roland Häder (roland)'s status on Monday, 23-Feb-2015 04:52:22 EST Roland Häder Roland Häder
    Remote profile options...
    • crawler
    Auch hier der Hinweis, dass keine momentan existierende !verschluesselung sicher ist, genuegend Zeit und Rechenkraft und schon kann man jede #Verschluesselung "knacken". cc !security
    Monday, 23-Feb-2015 04:52:22 EST from social.mxchange.org permalink
  • After
  • Before
Start the article for #security on WikiHashtags

Feeds

  • Activity Streams
  • RSS 1.0
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • Privacy
  • Source
  • Version
  • Contact

Hacker Poesy is a GNU social hub. It runs version 1.1.3-beta3, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Hacker Poesy content and data are available under the Creative Commons Attribution 3.0 license.

Switch to mobile site layout.