Still seeing some #shellshock attempts via #SMTP. I believe attacker is logging at ‘yourschool . net’ before downloading file from ‘uploadedit . com’. Hopefully, we’ve all patched (several times) since the vulnerability was announced. !security
lnxw48 (Linux Walt) on fresh.federati.net
This remote profile is registered on another site; see lnxw48's original profile page on fresh.federati.net.
-
lnxw48 (Linux Walt) (lnxw48)'s status on Saturday, 08-Nov-2014 13:35:42 EST
lnxw48 (Linux Walt)
-
lnxw48 (Linux Walt) (lnxw48)'s status on Tuesday, 04-Nov-2014 01:13:00 EST
lnxw48 (Linux Walt)
Seen on !Diaspora: auditors find that encrypted chat client #TextSecure is pretty secure http://url.federati.net/mmUux !Security (Does this use #XMPP?) !XMPP
-
lnxw48 (Linux Walt) (lnxw48)'s status on Sunday, 26-Oct-2014 16:51:20 EDT
lnxw48 (Linux Walt)
@rozzin With a domain name like that, do you really get many people willing to download? I think people should be just a little paranoid—anything seems a little bit “off” and they should avoid the site completely.
-
lnxw48 (Linux Walt) (lnxw48)'s status on Sunday, 26-Oct-2014 16:38:03 EDT
lnxw48 (Linux Walt)
RP @bobjonkman And #OpSecIsHard! Even those well-informed technically-skilled people can make a minor mistake (like posting into a wrong window because the cursor focus wasn’t where you expect it to be), completely destroying or conflating different online identities. #security #privacy #anonymity
-
lnxw48 (Linux Walt) (lnxw48)'s status on Thursday, 23-Oct-2014 02:27:58 EDT
lnxw48 (Linux Walt)
@larjona I do not know the answer to that question, but I do know that #StartSSL offers zero-price certs.
-
lnxw48 (Linux Walt) (lnxw48)'s status on Thursday, 16-Oct-2014 18:04:05 EDT
lnxw48 (Linux Walt)
Disabling #SSLv3 in #Dovecot http://url.federati.net/F0oHP !security
-
lnxw48 (Linux Walt) (lnxw48)'s status on Tuesday, 14-Oct-2014 00:55:40 EDT
lnxw48 (Linux Walt)
Seen on !Diaspora: #Dropbox passwords leaked, if you still have an account there, change passwords now http://url.federati.net/5y6aH !security
-
lnxw48 (Linux Walt) (lnxw48)'s status on Sunday, 12-Oct-2014 03:37:54 EDT
lnxw48 (Linux Walt)
Besides #Kmart, #Dairy_Queen also announced a major breach (395 stores). It looks like both were caused by #malware getting onto the point-of-sale registers. !security
-
lnxw48 (Linux Walt) (lnxw48)'s status on Friday, 10-Oct-2014 01:30:58 EDT
lnxw48 (Linux Walt)
Automated configuration analysis for #Mozilla‘s #TLS guidelines http://url.federati.net/yadA5 !crypto !security
-
lnxw48 (Linux Walt) (lnxw48)'s status on Friday, 10-Oct-2014 00:02:12 EDT
lnxw48 (Linux Walt)
Sounds like some World War II movie: I need to see your papers, please.
-
lnxw48 (Linux Walt) (lnxw48)'s status on Tuesday, 07-Oct-2014 00:26:03 EDT
lnxw48 (Linux Walt)
unpatchunpatched -
lnxw48 (Linux Walt) (lnxw48)'s status on Tuesday, 07-Oct-2014 00:25:32 EDT
lnxw48 (Linux Walt)
#zero-day !security flaw in #Bugzilla exposes unpatch holes in other projects http://url.federati.net/rCWet
-
lnxw48 (Linux Walt) (lnxw48)'s status on Thursday, 02-Oct-2014 18:10:48 EDT
lnxw48 (Linux Walt)
@sergiodj @dragnucs @laurelrusswurm There is also #Seeks, which is meant to !selfhost ... but it also by default uses the big search engines for its results.
-
lnxw48 (Linux Walt) (lnxw48)'s status on Wednesday, 01-Oct-2014 21:48:19 EDT
lnxw48 (Linux Walt)
Why is Progressive Enhancement so unpopular? Because forcing you to keep wide open to #JavaScript makes it easier to serve ads and do tracking. #JavaScrippled sites stink.
-
lnxw48 (Linux Walt) (lnxw48)'s status on Sunday, 28-Sep-2014 17:50:08 EDT
lnxw48 (Linux Walt)
@bashrc Is freedombone just your personal !BBB? Or is this a project like #arkOS to make BeagleBone suitable for !selfhost ing?
-
lnxw48 (Linux Walt) (lnxw48)'s status on Thursday, 25-Sep-2014 13:58:04 EDT
lnxw48 (Linux Walt)
RP @avadiax@identi.ca IRC bot exploiting #shellshock bash vulnerability already in the wild. http://url.federati.net/NH1VC #IRC #bash !security
-
lnxw48 (Linux Walt) (lnxw48)'s status on Thursday, 25-Sep-2014 04:57:39 EDT
lnxw48 (Linux Walt)
@vegos Patch does not completely fix the issue. New CVE number issued. http://url.federati.net/rS61B !security !crypto
-
lnxw48 (Linux Walt) (lnxw48)'s status on Wednesday, 24-Sep-2014 17:55:17 EDT
lnxw48 (Linux Walt)
Jimmy John’s locations affected by the credit card breach include Jefferson City, MO (High Street). @jpope
-
lnxw48 (Linux Walt) (lnxw48)'s status on Wednesday, 24-Sep-2014 17:46:41 EDT
lnxw48 (Linux Walt)
RP @pettter: Mega bad bug out. CVE-2014-6271 tl;dr RCE as long as you can insert data into a bash environment variable. Pretty big news. Update all your bash. Red hat/CentOS is already covered, so is Debian stable (testing and unstable still vulnerable atm). #fediverse #crypto #umehack !security !sn !snadmins
-
lnxw48 (Linux Walt) (lnxw48)'s status on Wednesday, 24-Sep-2014 17:02:40 EDT
lnxw48 (Linux Walt)
Jimmy John’s finally confirms credit card breach at 216 locations. !security http://url.federati.net/U6Coy ... Breach continued for five weeks after first reported.