This amazing Bash trick comes from Pascal Hirsch on Twitter. It goes like this: Enter a line of Bash starting with a # comment, then run !:q on the next line to see what that would be with proper Bash escaping applied. How does this work? James Coglan explains: The ! character begins a history expansion; !string produces the last […]
Estimated reading time: 1 minute
WINDOWS SERVER VULNERABILITY REQUIRES IMMEDIATE ATTENTION.This has been posted on /r/sysadmin on Reddit: CVE-2020-1472 Netlogon Elevation of Privilege Vulnerability from sysadmin Twitter post explaining it: https://twitter.com/RyanLNewington/status/129344415164462694… Blog post explaining it: https://www.tenable.com/blog/cve-2020-1472-zerologon-vulnera… POC: https://infinitelogins.com/2020/09/15/abusing-cve-2020-1472-…
Estimated reading time: 27 seconds
I’ve been using Docker a lot at work for development. This leads to a pile-up of images on the server. In order to clear them out I made this handy little script. This will remove all images even attached ones on your system. Be aware that running this on production […]
Estimated reading time: 39 seconds
BBC News is reporting: Dozens of Android phone owners are reporting on social media that a picture featuring a lake, a cloudy sunset and a green shoreline is crashing their handsets when used as wallpaper. How could such a serene image cause a phone to crash? Basically, its too much […]
Estimated reading time: 1 minute
This has been irking me for the past couple of days. I would come back to my laptop (Lubuntu) after a period of time away and I would find Zoom (the video meeting app) open. I use Zoom for work, so I just dismissed it as a screen that I […]
Estimated reading time: 1 minute
I had a conversation with my in-laws this past week we got into a conversation about their wifi password. Basically, they have an ATT router setup where the password is on the underside of the modem. This password is something like “7%b6c9m4k”. No one can ever remember it. The best […]
Estimated reading time: 1 minute
This is quite interesting and I’m pretty amazed it has taken so long for this to be created. (via businessinsider.com) tl;dr A big new feature for iPhones this year is Shortcuts, an app that lets you write scripts for the iPhone. One widely shared shortcut is called Police, which records […]
Estimated reading time: 1 minute
In case you haven’t heard the new there is a massive security flaw in macOS, which allows anybody to log into the root account with a blank password. The flaw was discovered by Lemi Orhan Ergin (@lemiorhan): Read the whole article
Estimated reading time: 26 seconds
Researcher Mathy Vanhoef of imec-DistriNet hax found a critical flaw in the current WPA2 protocol. We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers can use this novel attack technique to read information […]
Estimated reading time: 1 minute
of course you can “check yourself” at their site A team of lawyers, including former Georgia Gov. Roy Barnes, has filed a class-action lawsuit against Equifax over the massive data breach that has compromised the personal information of more than 140 million U.S. consumers. The lawsuit filed in U.S. District […]
Estimated reading time: 1 minute