Notices tagged with security, page 16
-
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 30-Jan-2015 00:31:08 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca @JennieBreeden says you can't have both !Security and !Privacy together http://thedevilspanties.com/archives/10448 -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 26-Jan-2015 18:09:52 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca ♻ @csoghoian I thought Chromium was Chrome without the Google crap. TIL: Chromium is missing key !security features. Sad panda. https://mobile.twitter.com/fugueish/status/559646951151370240 -
Joshua Judson Rosen (rozzin)'s status on Monday, 26-Jan-2015 01:15:45 EST Joshua Judson Rosen This #USB PortPilot thing seems like a pretty good idea, even just considering the !security angle: hakshop.com/portpilot #want -
Roland Häder (roland)'s status on Wednesday, 21-Jan-2015 10:38:27 EST Roland Häder @windigo Yes, that is true. So should we all better change our password? cc !security -
qbi (qbi)'s status on Wednesday, 21-Jan-2015 05:15:10 EST qbi Wie lassen sich #SSH Hidden Services aufdecken und was hilft dagegen? http://qttr.at/hvt
!anonymity !security -
lnxw48 (Linux Walt) (lnxw48)'s status on Tuesday, 20-Jan-2015 03:40:08 EST lnxw48 (Linux Walt) Apparently, #DNSSEC is not so secure after all. http://url.federati.net/lqoBx #DNS !Security /via #PumpIO
——- -
groupie (groupie)'s status on Monday, 19-Jan-2015 14:48:24 EST groupie cc !debian !security -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 19-Jan-2015 13:58:30 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca ♻ @wicsuw Full talk details and abstract now up for @hypatiadotca's talk this week! Open to all, 5:30PM Fri Jan. 23 in DC 1302. http://wics.uwaterloo.ca/2015/01/leigh-honeywell-security/ !security !wrawesome -
Erkan Yılmaz (erkan)'s status on Monday, 19-Jan-2015 10:07:37 EST Erkan Yılmaz cc !security -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Sunday, 18-Jan-2015 15:05:31 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca cc !privacy and !security ♻ @vega Eight steps for increased privacy and security while on your computer: https://radicalpenguin.me/blog/?p=571 -
morph (morph)'s status on Saturday, 17-Jan-2015 07:13:49 EST morph @roland Was Hänschen nicht lernt, lernt Hans nimmermehr. -
Roland Häder (roland)'s status on Saturday, 17-Jan-2015 07:06:38 EST Roland Häder Wann lernt man es endlich: Es gibt keine #Privatsphaere im Internet und echte #Anonymisierung ist … -
MMN-o ✅⃠ (mmn)'s status on Friday, 16-Jan-2015 19:46:50 EST MMN-o ✅⃠ "users_count":159, despite #CAcert issued TLS certificate on quitter.es - so there's not really a problem to host stuff with bad/unknown certs for !security ;) -
Roland Häder (roland)'s status on Thursday, 15-Jan-2015 04:46:12 EST Roland Häder Einfach ein #JavaScript schreiben, dass die Attacke auf #192.168.1.1 ausführt und schon kommt der Angriff über den Browser aus dem Internet. cc !security -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Wednesday, 14-Jan-2015 16:00:31 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca @mk A bank using custom browser extension has probably written their own !crypto instead of using well-known libraries; !not good !security -
Roland Häder (roland)'s status on Wednesday, 14-Jan-2015 13:04:36 EST Roland Häder https://bugzilla.mozilla.org/show_bug.cgi?id=994033#c5 @nds @windigo This is bad news for all #StartSSL users ... :-( cc !security -
lnxw48 (Linux Walt) (lnxw48)'s status on Wednesday, 14-Jan-2015 11:43:31 EST lnxw48 (Linux Walt) Malware that bypasses authentication on Active Directory systems that implement password only authentication. http://head4.me/2n /via Aviadax on #PumpIO. #Windows !security
-
Erkan Yılmaz (erkan)'s status on Wednesday, 14-Jan-2015 04:15:23 EST Erkan Yılmaz RT @benfell Anyone running #Drupal should check their people (user) list for 'ohqqbaby'. Apparently one of the !security #vulnerabilities along the way allowed a bot to create an #administrator account with this user name. cc @question -
marc0s (marc0s)'s status on Tuesday, 13-Jan-2015 17:18:59 EST marc0s Dear all, any hint on why I'm getting this error with a chained certificate? SSL: error:0906D066:PEM routines:PEM_read_bio:bad end line An it's NOT the issue with the END CERTIFICATE and BEGIN CERTIFICATE marks being in the same line... I'm out of ideas :( -
lnxw48 (Linux Walt) (lnxw48)'s status on Sunday, 11-Jan-2015 22:27:19 EST lnxw48 (Linux Walt) Adding this to the !security group