@mangeurdenuage@shitposter.world
@mangeurdenuage@shitposter.world avatar

mangeurdenuage

@mangeurdenuage@shitposter.world

32yo wizard. FR/ENG (biological male).
Searching for potential wife (biological woman)& :good_girl:
Currently on keto.

"Every criticism, judgement, diagnosis, and expression of anger is the tragic expression of an unmet need."
"When you do things right, people won't be sure you've done anything at all."
"Et pourtant je veux vivre ou survivre, sans poème, sans blesser tous ceux que j'aime".

This profile is from a federated server and may be incomplete. Browse more on the original instance.

mangeurdenuage, to random
@mangeurdenuage@shitposter.world avatar
mangeurdenuage, to random
@mangeurdenuage@shitposter.world avatar
mangeurdenuage, to random
@mangeurdenuage@shitposter.world avatar
mangeurdenuage, to random
@mangeurdenuage@shitposter.world avatar
mangeurdenuage, to random
@mangeurdenuage@shitposter.world avatar
mangeurdenuage, to random
@mangeurdenuage@shitposter.world avatar
mangeurdenuage, to random
@mangeurdenuage@shitposter.world avatar
mangeurdenuage, to random
@mangeurdenuage@shitposter.world avatar
mangeurdenuage, to random
@mangeurdenuage@shitposter.world avatar

No wifi here, just ethernet cable.

mangeurdenuage, to random
@mangeurdenuage@shitposter.world avatar

@coolboymew @icedquinn @lanodan The article is terrible, if you follow the url it makes a bit more sense.
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40539
>Zoho ManageEngine ADSelfService Plus version 6113 and prior is vulnerable to REST API authentication bypass with resultant remote code execution.
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44077
>Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plus MSP before 10530, and SupportCenter Plus before 11014 are vulnerable to unauthenticated remote code execution. This is related to /RestAPI URLs in a servlet, and ImportTechnicians in the Struts configuration.

> CISA published an alert on the exploitation of CVE-2021-44077, sharing a long list of novel IoCs which could help defenders detect and mitigate the threat.
https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-336a

mangeurdenuage,
@mangeurdenuage@shitposter.world avatar

@coolboymew @icedquinn @lanodan
>which is what you want to happen, no?
If you pay for it of course you want that to happen quick.

mangeurdenuage,
@mangeurdenuage@shitposter.world avatar

@coolboymew @icedquinn @lanodan
You can't do shit anyway due to the nature of the license tho so pic related.
Adding 7 layers of antivirus/proxies is a big brain move.

mangeurdenuage,
@mangeurdenuage@shitposter.world avatar

@coolboymew @icedquinn @lanodan
>we would have used the cloud version which would have been patched ASAP
:OMEGALUL: what a bunch of cunts, these people don't deserve your money.

>and was unaffected anyways
Don't need to patch when it's already being sniffed by everyone.

mangeurdenuage, to random
@mangeurdenuage@shitposter.world avatar

Will minus8 ever come back ?

image/jpeg
image/gif

kaia, to random
@kaia@brotka.st avatar

:floofWoozy_256:

mangeurdenuage,
@mangeurdenuage@shitposter.world avatar
coolboymew, to random
@coolboymew@shitposter.world avatar

I legit cannot sleep because it's driving me insane

I've been looking at some software at work and the boss suddenly drops a links with the cves (vulnerabilities) it had and.... there was nothing abnormal. A few a year, most of them didn't even affect the edition we will go going for and they were taken care of pretty much before they even appeared on said cve site

I'm feeling like there's a massive misunderstanding about vulnerabilities, how this all works and that the sole presence of them means that it's "bad"

Is this normal for a programmer to not be aware of this?

mangeurdenuage,
@mangeurdenuage@shitposter.world avatar

@coolboymew @icedquinn @lanodan
Aside disconnecting anything from the net you can't do much if you're targeted by the gov tbh, , and if you're that much of an issue they'll act physically.
That notably why being anonymous is good.

mangeurdenuage,
@mangeurdenuage@shitposter.world avatar

@coolboymew @mitchconner @icedquinn @lanodan
>dude is a programmer
I've known programmer very competent who were completely bonkers when it came to maintenance. And the reverse is also true. But overall the best people I've known who not only understood security but also were the best debuggers were people who touched electronics/vlsi/fpgas.

mangeurdenuage,
@mangeurdenuage@shitposter.world avatar

@coolboymew @icedquinn @lanodan
>which there's 0 reasons to
That is more or less correct. You can be not targeted by the state. But you can be targeted by some random who found an abandoned spook base full of software that exploits backdoors and zero days, which has happened a few time and still happens.

>chances are that we'd fall like leaves and there's very little we could have done to prevent it
Aside backing up on physical media that isn't connected to anything, no there isn't much you can do. But that's the basics that have been taught since the beginning of computing, copy that floppy.

mangeurdenuage,
@mangeurdenuage@shitposter.world avatar

@coolboymew @icedquinn @lanodan
> by some random who found an abandoned spook base
I'll also add that more and more of these people aren't necessarily spooks but just sub-contractors who are given the said tools.

mangeurdenuage,
@mangeurdenuage@shitposter.world avatar

@coolboymew @icedquinn @lanodan It's the week end fuck it, they shouldn't have used proprietary shit :shrugz:

mangeurdenuage, to random
@mangeurdenuage@shitposter.world avatar

Man I Love Frogs

kaia, to random
@kaia@brotka.st avatar

can you write sentences only using common Linux commands?

touch more cat tail !!
touch, strip && finger man

mangeurdenuage,
@mangeurdenuage@shitposter.world avatar

@kaia dump load

18+ kaia, to random
@kaia@brotka.st avatar

I wonder who paid for that study :02smile:

mangeurdenuage,
@mangeurdenuage@shitposter.world avatar

@kaia Who can it be now ? :blobcatcooljazz:

mangeurdenuage, to random
@mangeurdenuage@shitposter.world avatar
mangeurdenuage, to random
@mangeurdenuage@shitposter.world avatar
  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • tester
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • tacticalgear
  • osvaldo12
  • normalnudes
  • cubers
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • Leos
  • provamag3
  • anitta
  • modclub
  • lostlight
  • All magazines