$ touch ~/.bash_sessions_disable
Danach kann auch der ~/.bash_session Order gelöscht werden.
Bananas Development Blog: share your thoughts
$ touch ~/.bash_sessions_disable
The most underrated, underhyped vulnerability of 2015 has recently come to my attention, and I’m about to bring it to yours. No one gave it a fancy name, there were no press releases, nobody called Mandiant to come put out the fires. In fact, even though proof of concept code was released OVER 9 MONTHS AGO, none of the products mentioned in the title of this post have been patched, along with many more. In fact no patch is available for the Java library containing the vulnerability. In addition to any commercial products that are vulnerable, this also affects many custom applications.
sendmail_path = /usr/local/bin/trapmail
/opt/local/bin/formail -R cc X-original-cc -R to X-original-to -R bcc X-original-bcc -f -A"To: username" | /usr/sbin/sendmail -t -i
A component of Kaspersky Internet Security that’s enabled by default is called the “Network Attack Blocker”, described as “protects the computer against dangerous network activity”. I examined the implementation, and determined that it’s actually a simple stateless packet filter with a pattern-matching signature system.
I have asked a feminist friend from the North American culture-sphere, and she advised against bro. We have found a compromise that satisfies us, so we don't need to discuss this further.
Avast will render the commonName of X.509 certificates into an HTMLLayout frame when your MITM proxy detects a bad signature. Unbelievably, this means CN="<h1>really?!?!?</h1>" actually works, and is pretty simple to convert into remote code execution.
Data Crow is the ultimate media cataloger and media organiser. Always wanted to manage all your collections in one product? You want a product you can customize to your needs? Your search ends here! Using Data Crow allows you to catalog all your collectables, no matter how large your collection is. Using the excellent online services you can instantly retrieve the information on your books, software, games and movies. This combined with the file import, which can parse information from your e-books, software, images, music and movie files you won't be doing a lot of typing.
Researchers outline how hackers can attack your smartphone to steal your fingerprint on a "large scale" -- without anybody noticing.
Lost in this byzantine maze of decades-old architecture improvements and patches, there lies a design flaw that's gone unnoticed for 20 years. In one of the most bizarre and complex vulnerabilities we've ever seen, we'll release proof-of-concept code exploiting the vast, unexplored wasteland of forgotten x86 features, to demonstrate how to jump malicious code from the paltry ring 0 into the deepest, darkest realms of the processor. Best of all, we'll do it with an architectural 0-day built into the silicon itself, directed against a uniquely vulnerable string of code running on every single system.
In this article, we investigate the effects on source code, when using small or large indentation size. Small idention sizes seems to have a negative effect on code readability. Larger ones, the opposite.
Every major open-source project has its own style guide: a set of conventions (sometimes arbitrary) about how to write code for that project. It is much easier to understand a large codebase when all the code in it is in a consistent style.
Every now and then I find myself in the discussion of whether we should use comments in our code or not. I believe that comments are often misused as duct tape for bad code and limiting their use leads to higher quality code.
In einem offenen Brief greift Mozilla-Chef Chris Beard den Microsoft-CEO Satya Nadella an: In Windows 10 sei es schwieriger, den Standard-Browser zu wechseln. Microsoft solle die Entscheidung der Nutzer respektieren.