Cult Of Wire
Мир проигравшего киберпанка. Для связи: @the29a
Mostrar más- Suscriptores
- Cobertura postal
- ER - ratio de compromiso
Carga de datos en curso...
Carga de datos en curso...
My name is Matt Brown and I'm an Hardware Security Researcher and Bug Bounty Hunter. This channel is a place where I share my knowledge and experience finding vulnerabilities in IoT systems. - Soli Deo Gloria
Оригинальные зонды "Вояджер" имели программное обеспечение, написанное на Fortran, что позволяло нескольким командам непосредственно изменять код на лету, фактически изменяя всё внутри зонда. В программировании существует известная команда poke, которая в различных высокоуровневых языках устанавливает значение байта в определённый адрес памяти. В старых компьютерах эта команда использовалась для взлома игр. Команда "Вояджер" использовала команду poke на FDS, чтобы перенаправить все важные функции от неисправного чипа на другие места.Тот самый случай, когда поговорка "Удаленная настройка сети – к дальней дороге" совсем не применима.
Get a Wonderful Person Tee:
https://teespring.com/stores/whatdamathMore cool designs are on Amazon:
https://amzn.to/3QFIrFXAlternatively, PayPal donations can be sent here: http://paypal.me/whatdamath Hello and welcome! My name is Anton and in this video, we will talk about Voyager 1 and how it's back, baby! Links:
https://science.nasa.gov/missions/voyager-program/voyager-1/voyager-1-returning-science-data-from-all-four-instruments/https://voyager.gsfc.nasa.gov/Library/DeepCommo_Chapter3--141029.pdf
Videos:
https://youtu.be/basgJRYb2i0https://youtu.be/PI5uwMhX38Q
https://www.youtube.com/watch?v=S4eg95rG18M
#voyager #nasa #solarsystem 0:00 Totally not the end of Voyager 1 1:50 Lucky donuts 2:30 Glitch on Nov of 2023 4:20 Computer that broke 5:00 How they fixed this 6:20 Interstellar mission 7:30 Still most iconic mission ever 7:55 Future in the next few millions of years Support this channel on Patreon to help me make this a full time job:
https://www.patreon.com/whatdamathBitcoin/Ethereum to spare? Donate them here to help this channel grow! bc1qnkl3nk0zt7w0xzrgur9pnkcduj7a3xxllcn7d4 or ETH: 0x60f088B10b03115405d313f964BeA93eF0Bd3DbF Space Engine is available for free here: http://spaceengine.org Enjoy and please subscribe. Twitter:
https://twitter.com/WhatDaMathFacebook:
https://www.facebook.com/whatdamathTwitch: http://www.twitch.tv/whatdamath The hardware used to record these videos: New Camera:
https://amzn.to/34DUUlvCPU:
https://amzn.to/2LZFQCJVideo Card:
https://amzn.to/2M1W26CMotherboard:
https://amzn.to/2JYGiQQRAM:
https://amzn.to/2Mwy2t4PSU:
https://amzn.to/2LZcrIHCase:
https://amzn.to/2MwJZz4Microphone:
https://amzn.to/2t5jTv0Mixer:
https://amzn.to/2JOL0oFRecording and Editing:
https://amzn.to/2LX6uvUSome of the above are affiliate links, meaning I would get a (very small) percentage of the price paid. Thank you to all Patreon supporters of this channel Special thanks also goes to all the wonderful supporters of the channel through YouTube Memberships Credit: NASA JPL Raimond Spekking / CC BY-SA 4.0
https://en.wikipedia.org/wiki/PEEK_and_POKE#/media/File:Monitor_Commodore_CBM_3016_with_BASIC_program-0309.jpgLicenses used:
https://creativecommons.org/licenses/by/4.0/https://creativecommons.org/licenses/by-sa/4.0/
https://creativecommons.org/licenses/by/3.0/
https://creativecommons.org/licenses/by-sa/3.0/
https://creativecommons.org/licenses/by/2.5/
https://creativecommons.org/licenses/by-sa/2.5/
https://creativecommons.org/licenses/by/2.0/
https://creativecommons.org/licenses/by-sa/2.0/
trivy plugin install scan2htmlСканируем:
trivy scan2html repo https://github.com/aquasecurity/trivy-ci-test --scanners vuln,misconfig,secret result.htmlИ на выходе получаем удобный и наглядный репорт с кучей информации. Для пользователей kubectl тоже есть плагин - trivy-plugin-kubectl, но у меня нет kubectl, так что ничего сказать не могу.
LoginGraceTime=0
" в sshd_config.
Но есть и минусы: отключение таймаута упростит DoS при установке большого числа соединений, превышающих лимиты, заданные через параметр MaxStartups
.
Qualys так же выпустили подробное описание уязвимости, PoC уже есть.The Qualys Threat Research Unit (TRU) has discovered a Remote Unauthenticated Code Execution (RCE) vulnerability in OpenSSH’s server (sshd) in glibc-based Linux systems. CVE assigned to this…
Bjorn is an educational cybersecurity project designed to run on a Raspberry Pi Zero equipped with a Waveshare screen. Once connected to a network (WiFi, Ethernet, Bluetooth, or USB), Bjorn will di...
Public disclose of CloudTrail bypass vulnerabilities we've found in AWS along with our research on using non-production API endpoints for defense evasion.
Head’s up: This is a blog post about applied cryptography, with a focus on web and cloud applications that encrypt data at rest in a database or filesystem. While the lessons can be broadly a…
Bypassing Okta’s Passwordless MFA: Technical Analysis and Detection Authentication security has always been a key area in the battle between defenders and attackers. Security vendors continuously implement new controls to safeguard authentication processes, but attackers soon discover methods to circumvent these measures, perpetuating a constant cycle of innovation and exploitation. Multi-factor authentication (MFA) emerged as
Talk to God on up to 64 cores. Final snapshot of the Third Temple. - cia-foundation/TempleOS
Tu plan actual sólo permite el análisis de 5 canales. Para obtener más, elige otro plan.