136 private links
Nur wenige Tage vor der Nationalratswahl am 29. September wurden die Webseiten der ÖVP und SPÖ Opfer von Hackerangriffen. Sogenannte DDoS-Attacken sollten zu einer Überlastung des Netzwerks und entsprechenden Ausfällen führen.
Auf die ÖVP ist gestern ein Cyberangriff ausgeführt worden. Entsprechende Informationen der APA wurden auf Anfrage von der Bundespartei sowie der ebenfalls betroffenen Tiroler Landespartei bestätigt. Es habe sich um eine DDoS-Attacke gehandelt, sie habe abgewehrt werden können. Auch die Website der SPÖ geriet gestern ins Visier von Hackern.
Wie die SPÖ auf der Plattform X mitteilte, sei die Website Ziel von Angriffen und „zwischenzeitlich nicht erreichbar“ gewesen. Die Homepage der Tiroler Volkspartei war ebenfalls „vorübergehend offline“. Daten seien nicht „abgeflossen“, hieß es.
Das Problem war, dass in der ersten E-Mail, die falsch war, die Nummer nicht mit der Postsendung übereinstimmte. Das heißt, die Personen, die sich dann die Sendung bei der Post abholen wollen, würden sie nicht bekommen, weil die Nummer nicht identisch ist mit dem, was dann tatsächlich auf der Wahlkarte draufsteht.
Nach ersten Angaben einer Sprecherin der Deutschen Bahn handelte es sich um eine Störung im GSM-R-Funksystem der Bahn. Wenn dieses System nicht funktioniere, dürfe nicht gefahren werden.
Ein „Ethical Hacker“ hatte beim Testen der Klimabonus-Website die mögliche Sicherheitslücke im Zusammenhang mit der automatischen Überprüfung von Ausweisen entdeckt und umgehend das Klimaschutzministerium darüber informiert.
Getting mugged? Just say no
Your robber legally cannot take any of your possessions without your consent.
This is how some people expect us to react when an armed police officer asks us for our phone in the middle of the street. Sure, I'll take out my constitution and read my rights right now.
he Signal founder stole the show with an opening chat laying out a case for reclaiming the "magic" of software development that's been lost after 20 years. That loss, he argued, was due to stuffing developers into "black box abstraction layers" that strip them of the freedom needed to be innovative.
"Anybody who is managing an engineering organization will have some kind of management philosophy that is in some way downstream of, derivative of, in the zone of, or somehow related to agile," Marlinspike said.
With so much automation available, it’s easier than ever for identity thieves to flood the employment market with their own versions of ghost jobs, in order to gather practically all the personal information a victim could ever provide.
Has anybody out there read or written anything substantial about the effect of AI taking over and basically destroying conventional hiring pipelines from both sides, to the point it feels functionally impossible for many hiring managers to hire people they don't already somehow know?
This seems important.
A data hoarder’s dream come true: bundle any web page into a single HTML file. You can finally replace that gazillion of open tabs with a gazillion of .html files stored somewhere on your precious little drive.
Unlike the conventional “Save page as”, monolith not only saves the target document, it embeds CSS, image, and JavaScript assets all at once, producing a single HTML5 document that is a joy to store and share.
If compared to saving websites with wget -mpk, this tool embeds all assets as data URLs and therefore lets browsers render the saved page exactly the way it was on the Internet, even when no network connection is available.
An interactive replacer for ripgrep.
This is an interactive command line tool to make find and replacement easy. It uses ripgrep to find, and then provides you with a simple interface to see the replacements in real-time and conditionally replace matches.
Some features:
⚡ Super fast search results
✨ Interactive interface for selecting which matches should be replaced or not
🕶️ Live preview of the replacements
🧠 Replace using capturing groups (e.g., when using /foo (\w+)/ replace with bar $1)
🦀 and more!
While some users prefer to use Git via CLI, they often rely on a GUI or feature-rich TUI to view commit logs. Others may find git log --graph sufficient.
Personally, I found the output from git log --graph difficult to read, even with additional options. Learning complex tools just to view logs seemed cumbersome.
Goals
Provide a rich git log --graph experience in the terminal.
Offer commit graph-centric browsing of Git repositories.
Share “Those Who Do Not Learn History Are Doomed To Repeat It.” Really? on LinkedIn
‘Those who do not learn history are doomed to repeat it.’
The quote is most likely due to writer and philosopher George Santayana, and in its original form it read, “Those who cannot remember the past are condemned to repeat it.”
[diff is] the seed crystal of all workable open collaboration, and people living without it don’t even have the language to recognize how bad they’ve got it.
Don Estridge broke all
of Big Blue's rules to
create the home computer.
The company would
never forgive him for it.
which turns 100 next month. From the July, 1923, Bell Systems Technical Journal: "All panels are to be of a uniform length, designed to mount on vertical supports spaced 19>< inches between centers. The height of the different panels will vary, according to the amount of apparatus in each unit, but this vertical dimension is in all cases to be a whole multiple of 1-3/4 inche
Die #SüdwestfalenIT ist nicht in der Lage, den 72 Mitgliedskommunen weiterhin 180 verschiedene Verfahren anzubieten. Die Wiederherstellung aller Datenbanken, Server und Programme wird nach dem digitalen Blackout noch bis Ende September dauern.
The Modern Port Scanner. Find ports quickly (3 seconds at its fastest). Run scripts through our scripting engine (Python, Lua, Shell supported).
✨ Features
Scans all 65k ports in 3 seconds.
Full scripting engine support. Automatically pipe results into Nmap, or use our scripts (or write your own) to do whatever you want.
Adaptive learning. RustScan improves the more you use it. No bloated machine learning here, just basic maths.
The usuals you would expect. IPv6, CIDR, file input and more.
Automatically pipes ports into Nmap.
conorh@mastodon.sdf.org - During lunch a friend mentioned that you can just supply a HTTP URL to vim on the command line and it would use curl to download that resource and allow you to edit the content. I jokingly asked whether if you enter :w it would then issue a HTTP POST back to the origin which is of course ridiculous.
It issues a PUT