Show newer
seb boosted

I am here because I love Gnu/Linux and its philosophy. I am using it since I have installed it on my first computer in 1998. I used to buy computer magazines and they used to have program CDs or Floppies. One day I saw a program called Slackware Linux and it changed my life. #introductions

seb boosted
seb boosted
seb boosted

ahhh yes, it is once again Sunday morning in Sundogistan and that means #jazz

this morning it's cold, I'm tired, and the brain is unresponsive, so nothing too tricksy this week, just some newish jazz releases to review and contemplate.

so, if a slow start with some new sounds seems an okay way to come around, feel free to follow along over on @nowplaying or

:blobpats: :cofepats: :blobpats:

seb boosted
seb boosted

NAT Slipstreaming

NAT Slipstreaming allows an attacker to remotely access any TCP/UDP service bound to a victim machine, bypassing the victim’s NAT/firewall (arbitrary firewall pinhole control), just by the victim visiting a website.

This is neat, although you have to dig in a bit to learn it requires the NAT gateway to do some fancy SIP proxying.

#browser #exploit #networking #security #turtles #web

seb boosted

"your music is great, you could make so much money! put it up to stream!"

seb boosted

OMG, am dying!!!

Someone used the bug GitHub refused to fix, that allows you to add a commit to a repo you don’t control... to upload YouTube-dl to the DMCA request repo on GitHub.

seb boosted


I’m 34 years old, dad of two, ICU-nurse and a hobbyist computer programmer and FOSS-lover.
I just learned about mastodon and I am fascinated by its concept.

Hoping to find some chill people here to talk about my interests!

Here is an employee owned company’s business model that seems to have some ethical roots:

And here are their reasons to not open source all of vivaldi:

All of this seems pragmatic and ethical to me. - Any other opinions on that?

The problem of viruses is temporary and will be solved in two years. -John McAfee, 1988

seb boosted
seb boosted

Awesome AWS S3 - Security, Tools and Intel

Collection of tools, techniques and useful links concerning security and exposed AWS S3 Buckets

seb boosted

How to properly manage ssh keys for server access :: Päpper's Coding Blog — Have fun coding.

Every developer needs access to some servers for example to check the application logs. Usually, this is done using public-private key encryption where each developer generates their own public-private key pair. The public keys of each developer are added to the authorized_keys file on each server they should have access to.

seb boosted
Another #fediboost, this time for

It's a Mastodon instance run by @amolith who also provides a bunch of other services for people to use over at He's a genuinely great guy and runs a good instance. :blobcatthumbsup:
Show older

InfoSec Community within the Fediverse. Newbies, experts, gurus - Everyone is Welcome! Instance is supposed to be fast and secure.

We have a Getting Started Guide here: