Post by (@david-maas) on Tue, 03 May 22 16:46:54 +0000 View Full Post The Tor project released the criteria they use to flag bad nodes. A long time ago I used to run a somewhat crooked tor exit node that attempted to phish social ...
Post by (@david-maas) on Wed, 16 Feb 22 00:03:37 +0000 View Full Post This icon is me saving a TON of money by downgrading an Artifactory license from HA Enterprise to Support-Free Pro ($600...
Post by (@david-maas) on Fri, 11 Feb 22 18:51:04 +0000 View Full Post In other news, if you're ever setting up an EKS cluster, MAKE SURE YOU ENABLE NODE GROUPS!!!!! Otherwise Amazon doesn't ...
Post by (@david-maas) on Fri, 11 Feb 22 18:48:48 +0000 View Full Post Did you know about this one (SeriousSam/HiveNightmare)? It must have become public after I was paying attention to all the other millions of ways windows 10 got...
Post by (@david-maas) on Wed, 02 Feb 22 17:17:34 +0000 View Full Post It's long since been my opinion that Etherium is a platform with a history of security issues. Additionally, smart contracts get exploited frequently via coding...
Post by (@david-maas) on Fri, 23 Jul 21 19:49:57 +0000 View Full Post I know I'm getting older and more responsible when I read exploit-db and go "oh fucknuts more patching ARGH" instead of ...
Post by (@david-maas) on Tue, 29 Jun 21 22:18:18 +0000 View Full Post I was looking for an alternative to Rundeck's "copy file" feature so I checked out ansible's built in file copy syntax, just to find that as far as I can tell t...
Post by (@david-maas) on Wed, 28 Apr 21 22:45:08 +0000 View Full Post Lol! Found on Imgur, which means it was plagiarized from another social network.
Post by (@david-maas) on Wed, 24 Mar 21 15:13:07 +0000 View Full Post Packetstorm posted the latest iteration of my paper "Unmasking Hidden Sites" - it's basically a checklist for the interm...