cookie

Sizning foydalanuvchi tajribangizni yaxshilash uchun cookie-lardan foydalanamiz. Barchasini qabul qiling», bosing, cookie-lardan foydalanilishiga rozilik bildirishingiz talab qilinadi.

avatar

[EN/ID] Naoko Shoto Works • #ShitpostGANG

Dump by @naokoshoto // co admin w/ lumxumboy, aanja, emilio Personal Bio: @naokoshoto_bio Discussion Group: @naokoshoto_discuss Design Commissions: https://naokoshoto.carrd.co/ Part of @shitpost_gang

Ko'proq ko'rsatish
Reklama postlari
223
Obunachilar
Ma'lumot yo'q24 soatlar
-17 kunlar
Ma'lumot yo'q30 kunlar

Ma'lumot yuklanmoqda...

Obunachilar o'sish tezligi

Ma'lumot yuklanmoqda...

OH NOE
Hammasini ko'rsatish...
Photo unavailableShow in Telegram
somebody help me unseen it pls
Hammasini ko'rsatish...
Repost from Tech & Leaks Zone
Microsoft Discovers Dirty Stream Vulnerability in Android Apps Microsoft has discovered a critical security loophole dubbed "Dirty Stream," which could allow malicious Android apps to overwrite files in another application's home directory, potentially leading to arbitrary code execution and stealing valuable user information. The flaw arises from the improper use of Android's content provider system, typically designed to facilitate secure data exchange between different applications on a device. It includes safeguards such as strict isolation of data, URIs (Uniform Resource Identifiers), and thorough validation of file paths to ward off unauthorized access. When implemented incorrectly, custom intents, which are messaging objects that facilitate communication between components across Android apps, could bypass these security measures. For example, vulnerable apps may fail to adequately check file names or paths, allowing a malicious app to sneak in harmful code camouflaged as legitimate files. Microsoft’s investigation revealed that this vulnerability is NOT an isolated issue, as the research found incorrect implementations of the content provider system prevalent across many popular Android apps. Affected apps include Xiaomi’s File Manager (1B+ downloads) and WPS Office (500M+ installs) Follow @TechLeaksZone
Hammasini ko'rsatish...
Repost from Agam's Tech Tricks
Photo unavailableShow in Telegram
New York Times source code stolen using exposed GitHub token The New York Times confirmed that its internal source code and data were leaked on 4chan after being stolen from its GitHub repositories in January 2024. The breach occurred due to an exposed GitHub token, resulting in a leak of 273GB of data, including IT documentation, infrastructure tools, and source code.
There are around 5 thousand repos (out of them less than 30 are additionally encrypted I think), 3.6 million files total, uncompressed tar.
The Times stated the breach was quickly addressed and there was no unauthorized access to internal systems or operational impact. 🔗 Bleeping Computer 🧑‍💻 @agamtechtricks
Hammasini ko'rsatish...
Repost from Genshin Impact ID
Photo unavailableShow in Telegram
🍃 Wah, Ayah jago bikin bakcang ya! Yang manis sama yang asin, dua-duanya enak banget! Aku sama Man Chai ambil beberapa buat bagi-bagi sama teman ya! Oh iya, aku tidak makan malam di rumah ya, jadi Ayah tidak perlu nunggu ... Nungguinnya di ujung jalan sana saja! Aku bakal bikin pertunjukan Tarian Wushou di sana malam ini, jadi begitu beres, mungkin kita bisa ke kedai teh bareng .... Terima kasih Siya untuk karyanya yang luar biasa! Kunjungi akun TikTok Genshin Impact!
Hammasini ko'rsatish...
Me fr
Hammasini ko'rsatish...
fucking based
Hammasini ko'rsatish...
based
Hammasini ko'rsatish...
kek
Hammasini ko'rsatish...