136 private links
There is this well hidden command line tool called "column" that allows you to align the data nicely in properly sized columns. Combine this with a pager like less and we have a nice prototype already
Vor rund einem Monat haben Hacker das EDV-System des Landes Kärnten komplett lahmgelegt und eine Lösegeldforderung von fünf Millionen Dollar in Bitcoins hinterlegt. Nun liegt der Forensikbericht vor, der bestätigt, dass die Eintrittspforte eine Phishing-Mail war. Das gab Landessprecher Gerd Kurath am Freitag bekannt.
DER STANDARD recherchiert die Spuren zum mutmaßlichen Täter nach. Die Staatsanwaltschaft Oberösterreich will sich die Vorwürfe nicht mehr gefallen lassen, legt dabei aber grobes technisches Unwissen offen
Die Landesregierung verweigerte, das geforderte Lösegeld zu bezahlen. Nun hat die Hackergruppe "Black Cat" die kopierten Daten offenbar weiterverkauft
Genau einen Monat nachdem Hacker die Kärntner Landesverwaltung lahmgelegt hatten, funktionieren noch immer nicht alle Programme im Landesdienst. Wie Landessprecher Gerd Kurath am Freitag sagte, laufen von den insgesamt 124 Applikationen 86 bereits wieder: „Vor allem jene, die wir für den Service direkt am Bürger benötigen.“ Der Berater des Landes in dieser Causa, Cornelius Granig, befürchtet in Zusammenhang mit Datenleaks auch Desinformation.
The planned changes are coming in two stages. Initially, the imminent Fedora 36 release will remove the old fbdev driver, leaving only DRM and KMS. Then for Fedora 37, which is due later this year, it's proposed that the driver be removed from the X.org server as well.
The kernel's fbdev device has been deprecated since 2015. It's a very old-fashioned mechanism for the kernel to display graphics on the system console, which was introduced in kernel 2.1.109 back in 1999.
A visible use was the Tux logo that some distros display with the kernel messages during startup. It did have other uses, though, such as the ability to display software-defined fonts on the console, handy for those who use characters, or entire alphabets, not covered by the PC's character set. Last century, it was also used on some computers that don't have a native text mode, such as early Macintosh models.
Out of the frame
The functionality is not disappearing. What is going is the software and drivers that enable the kernel to do this directly. They will be replaced by a new driver called simpledrm, which emulates the old framebuffer. It sets up the display using KMS, which all distros have used for many years.
Metasploitable3 is a Windows Server 2008 VM that is built from the ground up with a large amount of security vulnerabilities. It is intended to be used as a target for testing exploits with Metasploit. Not every type of vulnerability on Metasploitable3 can be exploited with a single module from Metasploit, but some can. Also, by default, the image is configured to make use of some mitigations from Windows, such as different permission settings and a firewall.
verifizierte Gesprächspartner die „derartige Mailadressen verwenden würden“ made my day :x (https://derstandard.at/story/
I figured out how to run a SQL query directly against a CSV file using the sqlite3 command-line utility:
sqlite3 :memory: -cmd '.mode csv' -cmd '.import taxi.csv taxi' \
'SELECT passenger_count, COUNT(*), AVG(total_amount) FROM taxi GROUP BY passenger_count'
Phishingmails, infizierte Memorysticks und Links – der Einfallsreichtum von Kriminellen, die Unternehmen, Institutionen, Verwaltungen, Länder und auch Privatpersonen über das Internet angreifen, ihnen Schaden zuzufügen und erpresserische Lösegeld-Forderungen stellen, ist groß. Und, er wird immer größer, die Angriffe nehmen jährlich zu.
Um Betroffenen rasch und wirksam zu helfen, mutmaßlichen Opfern schnell die wichtigsten Infos zu geben, um mögliche Schäden einzudämmen, fordert Kärntens Landeshauptmann Peter Kaiser die Einrichtung eines eigenen "Cyber"-Notrufes.
Antwort zu - Kampf gegen Cyberangriffe: Landeshauptmann Kaiser fordert eigenen Cyber-Notruf für Österreich
YubiKeys are hardware security keys that provide One Time Pads (OTP), namely U2F (Universal 2nd Factor) cryptographic tokens through a USB and/or NFC interface. This means you have to explicitly authorize a new SSH session by tapping the YubiKey. The private SSH key, which is normally on your SSD or cloud instance, should be useless to a malicious user who does not have access to the physical YubiKey on which the second private key is stored.
Configuring 2FA (Two Factor Authentication) with YubiKeys on SSH sessions is ideal for bastion hosts, also known as stepping stone servers that connect to your VPC (Virtual Private Cloud).
These: Kärnten hat IP-Adressen die sich connected haben gemonitored und es waren Leuts dabei, die halt über Tor (im Fall von Kärnten reicht da aber wohl auch vpn) drinnen waren. Und irgendwer hat panisch aufgeschrien deshalb. Weil wieso sollte ein Journo sowas können…
Everything is a file under Linux and ls* and friends can help you to dig out more information from the system than you originally thought. These Linux tips may come in handy when you need to find out information quickly without going through /proc or sysfs.
Der Virus ist so individuell, dass es von den verwendeten Firewalls nicht erkannt wurde. Um zu erforschen, wie die Täter in das System eindringen konnten, werden Daten gesammelt.
A fully-modern text-based browser, rendering to TTY and browsers
The American Standards Association (ASA), now the American National Standards Institute (ANSI), began work on ASCII on October 6, 1960. The encoding scheme had origins in the 5-bit telegraph codes invented by Émile Baudot. The committee eventually decided on a 7-bit code for ASCII.
7 bits allow for 128 characters. While only American English characters and symbols were chosen for this encoding set, 7 bits meant minimized costs associated with transmitting this data (as opposed to say, 8 bits).
The first 32 characters of ASCII were reserved control characters. These characters were used to relay special instructions to other devices, like printers. For example, a user could advance a line, delete a character, and on some devices, ring a bell (such as on the Teletype Model 33 ASR).
ASA published the first version of ASCII in 1963 and revised it in 1967. The last major update to the standard occurred in 1986. ASCII first saw commercial use in the American Telephone & Telegraph (AT&T) TeletypeWriter Exchange (TWX) network.
News announcement | 3 May 2022
Littledata surveyed 5,985 sites in May 2022 and found the average server response time was 416ms.