Hacker Poesy
  • FAQ
  • Login

lnxw48 (Linux Walt) on fresh.federati.net

This remote profile is registered on another site; see lnxw48's original profile page on fresh.federati.net.

  1. lnxw48 (Linux Walt) (lnxw48)'s status on Saturday, 08-Nov-2014 13:35:42 EST lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...

    Still seeing some #shellshock attempts via #SMTP. I believe attacker is logging at ‘yourschool . net’ before downloading file from ‘uploadedit . com’. Hopefully, we’ve all patched (several times) since the vulnerability was announced. !security

    Saturday, 08-Nov-2014 13:35:42 EST from fresh.federati.net permalink
  2. lnxw48 (Linux Walt) (lnxw48)'s status on Tuesday, 04-Nov-2014 01:13:00 EST lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...

    Seen on !Diaspora: auditors find that encrypted chat client #TextSecure is pretty secure http://url.federati.net/mmUux !Security (Does this use #XMPP?) !XMPP

    Tuesday, 04-Nov-2014 01:13:00 EST from fresh.federati.net permalink
  3. lnxw48 (Linux Walt) (lnxw48)'s status on Sunday, 26-Oct-2014 16:51:20 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    • Joshua Judson Rosen

    @rozzin With a domain name like that, do you really get many people willing to download? I think people should be just a little paranoid—anything seems a little bit “off” and they should avoid the site completely.

    Sunday, 26-Oct-2014 16:51:20 EDT from fresh.federati.net permalink
  4. lnxw48 (Linux Walt) (lnxw48)'s status on Sunday, 26-Oct-2014 16:38:03 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    • Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca

    RP @bobjonkman And #OpSecIsHard! Even those well-informed technically-skilled people can make a minor mistake (like posting into a wrong window because the cursor focus wasn’t where you expect it to be), completely destroying or conflating different online identities. #security #privacy #anonymity

    Sunday, 26-Oct-2014 16:38:03 EDT from fresh.federati.net permalink
  5. lnxw48 (Linux Walt) (lnxw48)'s status on Thursday, 23-Oct-2014 02:27:58 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    • larjona

    @larjona I do not know the answer to that question, but I do know that #StartSSL offers zero-price certs.

    Thursday, 23-Oct-2014 02:27:58 EDT from fresh.federati.net permalink
  6. lnxw48 (Linux Walt) (lnxw48)'s status on Thursday, 16-Oct-2014 18:04:05 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...

    Disabling #SSLv3 in #Dovecot http://url.federati.net/F0oHP !security

    Thursday, 16-Oct-2014 18:04:05 EDT from fresh.federati.net permalink
  7. lnxw48 (Linux Walt) (lnxw48)'s status on Tuesday, 14-Oct-2014 00:55:40 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...

    Seen on !Diaspora: #Dropbox passwords leaked, if you still have an account there, change passwords now http://url.federati.net/5y6aH !security

    Tuesday, 14-Oct-2014 00:55:40 EDT from fresh.federati.net permalink
  8. lnxw48 (Linux Walt) (lnxw48)'s status on Sunday, 12-Oct-2014 03:37:54 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...

    Besides #Kmart, #Dairy_Queen also announced a major breach (395 stores). It looks like both were caused by #malware getting onto the point-of-sale registers. !security

    Sunday, 12-Oct-2014 03:37:54 EDT from fresh.federati.net permalink
  9. lnxw48 (Linux Walt) (lnxw48)'s status on Friday, 10-Oct-2014 01:30:58 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...

    Automated configuration analysis for #Mozilla‘s #TLS guidelines http://url.federati.net/yadA5 !crypto !security

    Friday, 10-Oct-2014 01:30:58 EDT from fresh.federati.net permalink
  10. lnxw48 (Linux Walt) (lnxw48)'s status on Friday, 10-Oct-2014 00:02:12 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    • Erkan Yılmaz

    Sounds like some World War II movie: I need to see your papers, please.

    Friday, 10-Oct-2014 00:02:12 EDT from fresh.federati.net permalink
  11. lnxw48 (Linux Walt) (lnxw48)'s status on Tuesday, 07-Oct-2014 00:26:03 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...

    unpatch unpatched

    Tuesday, 07-Oct-2014 00:26:03 EDT from fresh.federati.net permalink
  12. lnxw48 (Linux Walt) (lnxw48)'s status on Tuesday, 07-Oct-2014 00:25:32 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...

    #zero-day !security flaw in #Bugzilla exposes unpatch holes in other projects http://url.federati.net/rCWet

    Tuesday, 07-Oct-2014 00:25:32 EDT from fresh.federati.net permalink
  13. lnxw48 (Linux Walt) (lnxw48)'s status on Thursday, 02-Oct-2014 18:10:48 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    • laurelrusswurm
    • sergiodj
    • Dragnucs

    @sergiodj @dragnucs @laurelrusswurm There is also #Seeks, which is meant to !selfhost ... but it also by default uses the big search engines for its results.

    Thursday, 02-Oct-2014 18:10:48 EDT from fresh.federati.net permalink
  14. lnxw48 (Linux Walt) (lnxw48)'s status on Wednesday, 01-Oct-2014 21:48:19 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...

    Why is Progressive Enhancement so unpopular? Because forcing you to keep wide open to #JavaScript makes it easier to serve ads and do tracking. #JavaScrippled sites stink.

    Wednesday, 01-Oct-2014 21:48:19 EDT from fresh.federati.net permalink
  15. lnxw48 (Linux Walt) (lnxw48)'s status on Sunday, 28-Sep-2014 17:50:08 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    • Bob Mottram

    @bashrc Is freedombone just your personal !BBB? Or is this a project like #arkOS to make BeagleBone suitable for !selfhost ing?

    Sunday, 28-Sep-2014 17:50:08 EDT from fresh.federati.net permalink
  16. lnxw48 (Linux Walt) (lnxw48)'s status on Thursday, 25-Sep-2014 13:58:04 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...

    RP @avadiax@identi.ca IRC bot exploiting #shellshock bash vulnerability already in the wild. http://url.federati.net/NH1VC #IRC #bash !security

    Thursday, 25-Sep-2014 13:58:04 EDT from fresh.federati.net permalink
  17. lnxw48 (Linux Walt) (lnxw48)'s status on Thursday, 25-Sep-2014 04:57:39 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    • VegOs ✔♋

    @vegos Patch does not completely fix the issue. New CVE number issued. http://url.federati.net/rS61B !security !crypto

    Thursday, 25-Sep-2014 04:57:39 EDT from fresh.federati.net permalink
  18. lnxw48 (Linux Walt) (lnxw48)'s status on Wednesday, 24-Sep-2014 17:55:17 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    • jpope

    Jimmy John’s locations affected by the credit card breach include Jefferson City, MO (High Street). @jpope

    Wednesday, 24-Sep-2014 17:55:17 EDT from fresh.federati.net permalink
  19. lnxw48 (Linux Walt) (lnxw48)'s status on Wednesday, 24-Sep-2014 17:46:41 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...
    • pettter ✅

    RP @pettter: Mega bad bug out. CVE-2014-6271 tl;dr RCE as long as you can insert data into a bash environment variable. Pretty big news. Update all your bash. Red hat/CentOS is already covered, so is Debian stable (testing and unstable still vulnerable atm). #fediverse #crypto #umehack !security !sn !snadmins

    Wednesday, 24-Sep-2014 17:46:41 EDT from fresh.federati.net permalink
  20. lnxw48 (Linux Walt) (lnxw48)'s status on Wednesday, 24-Sep-2014 17:02:40 EDT lnxw48 (Linux Walt) lnxw48 (Linux Walt)
    Remote profile options...

    Jimmy John’s finally confirms credit card breach at 216 locations. !security http://url.federati.net/U6Coy ... Breach continued for five weeks after first reported.

    Wednesday, 24-Sep-2014 17:02:40 EDT from fresh.federati.net permalink
  • After
  • Before

User actions

    lnxw48 (Linux Walt)

    lnxw48 (Linux Walt)

    Tags
    • (None)
    • Help
    • About
    • FAQ
    • Privacy
    • Source
    • Version
    • Contact

    Hacker Poesy is a GNU social hub. It runs version 1.1.3-beta3, available under the GNU Affero General Public License.

    Creative Commons Attribution 3.0 All Hacker Poesy content and data are available under the Creative Commons Attribution 3.0 license.

    Switch to mobile site layout.