-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Security Leftovers


Posted by Roy Schestowitz on Apr 14, 2023


Programming Leftovers

KDE Plasma is NOT a Desktop Environment



Microsoft mends Windows zero-day on April Patch Tuesday [Ed: The latest bug doors are ready to be installed on 'your' machine, even against your will]


↺ Microsoft mends Windows zero-day on April Patch Tuesday


> What's old is new again as multiple security updates from the past made a comeback this month to push the total number of vulnerabilities addressed to 102.



How to use the John the Ripper password cracker


↺ How to use the John the Ripper password cracker


> Red teams and blue teams use password cracking to gain access to systems and to detect weak user passwords or test defenses during red team-blue team exercises.


> Password crackers can be online or offline. Online password crackers, such as Hydra, are used when brute-forcing online network protocols and HTML forms. Situations where online brute forcing might be impractical include a remote system that limits the rate of sign-in attempts or a system that locks users out indefinitely after a predefined number of invalid login attempts.



What Is an Application Level Gateway? Guide to Proxy Firewalls


↺ What Is an Application Level Gateway? Guide to Proxy Firewalls


> Application-level gateways, also known as proxy firewalls, are a type of network security solution that takes action on behalf of the apps and programs they’re set to monitor in a network. They’re primarily responsible for filtering messages and exchanging data flow at the application layer.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Sat Jun 1 08:25:19 2024