Jack Keeley

@JackKeeley_

I Like Network Theory - Cisco CCNA R/S - IS Major at The University of Oklahoma

Norman, Oklahoma, USA
Vrijeme pridruživanja: studeni 2011.
Rođen/a 07. kolovoza

Tweetovi

Blokirali ste korisnika/cu @JackKeeley_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @JackKeeley_

  1. proslijedio/la je Tweet

    If Microsoft Teams is down for you... Remember it's Office *365* and there are 366 days in 2020.

    Poništi
  2. proslijedio/la je Tweet

    Adware is just malware with a legal department.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    18. sij

    ⚠️ 𝗪𝗔𝗥𝗡𝗜𝗡𝗚 ⚠️ Mass scanning activity detected from 67.205.164.99 (🇺🇸) attempting to exploit Fortinet VPN servers vulnerable to unauthenticated arbitrary file read (CVE-2018-13379) leading to disclosure of usernames and passwords in plaintext.

    Poništi
  4. proslijedio/la je Tweet

    Amusingly if you have Windows 7 and Windows Server 2008, you may be more secure this month.

    Poništi
  5. proslijedio/la je Tweet

    Update: It's midday in where technically inclined users have been finding their way online through the this morning. National connectivity remains at just 22% but real-time network data show coverage has increased 📈 📰

    Poništi
  6. proslijedio/la je Tweet

    100 hours since our families and friends in have lost internet connection and can’t communicate with the outside world with no end in sight.

    Poništi
  7. proslijedio/la je Tweet

    Update: It has been 100 hours since introduced a near-total internet shutdown cutting off the country from the rest of the world 📉 Digital rights are human rights: access must be restored to all Iranians 📰

    Poništi
  8. proslijedio/la je Tweet

    Update: It has been 75 hours since introduced a near-total internet shutdown leaving Iranians isolated from the rest of the world 📉 The rights to free expression and free assembly are inviolable and must be protected 📰

    Poništi
  9. proslijedio/la je Tweet

    Confirmed: is now in the midst of a near-total national internet shutdown; realtime network data show connectivity at 7% of ordinary levels after twelve hours of progressive network disconnections as public protests continue 📉 📰

    Poništi
  10. proslijedio/la je Tweet

    I suspect the biggest threat to cyber threat intelligence industry (and security industry in general) isn't other cyber threat intelligence startups... it's Microsoft fixing default config in Windows and Office.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    4. stu 2019.

    Very happy to see Microsoft adding free managed certificates for custom domains to the Azure App Service! This is fantastic, it’s now easier than ever to have HTTPS across all your things:

    Poništi
  12. proslijedio/la je Tweet

    Here's a writeup of the BlueKeep exploitation activity investigated this weekend

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet

    huh, the EternalPot RDP honeypots have all started BSOD'ing recently. They only expose port 3389.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet

    Yesterday GreyNoise observed a large (over 800x) spike in indiscriminate Internet-wide port scan traffic originating exclusively from Tor exit nodes. The scan traffic was probing for exclusively 80/TCP. No three-way-handshakes were completed. This traffic is no longer continuing.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet

    There’s been a lot of noise around new DNS encryption technologies lately, including DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH). This explainer by cuts through the noise with a clear explanation of how these technologies work.

    Poništi
  16. proslijedio/la je Tweet
    25. lis 2019.

    Skip the hassle of rotating your SSH keys. Delete them instead with Access.

    Poništi
  17. proslijedio/la je Tweet

    Ridic Fortigate issue of the day - if you use FortiToken for MFA, when logging into FortiGate put a capital letter in your username = you don't get prompted for multi-factor authentication.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet

    In case you missed this earlier today: we're happy to announce that our implementation of HTTP/3 and QUIC can be integrated into your own installation of NGINX as well. This is how we did it:

    Poništi
  19. proslijedio/la je Tweet
    4. lis 2019.

    This is from 2018, but very neat to see Internet connectivity monitored from outside an affected area can measure impacts on infrastructure from a hurricane (or other storm/disaster).

    Poništi
  20. proslijedio/la je Tweet
    28. ruj 2019.

    Host: "We're going to move your VM" Me: "OK" Host: "Done" Me: "Where's /var/www?" Host: "Oh we just spun up a new server and wiped your old one" THAT ISN'T WHAT *MOVE* MEANS

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·