Phil Ashby

@Phlash909

Technical Architect , hacker . [Gran]dad. Title image from:

Ipswich, England (mostly)
Vrijeme pridruživanja: ožujak 2014.

Tweetovi

Blokirali ste korisnika/cu @Phlash909

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Phlash909

  1. proslijedio/la je Tweet
    prije 22 sata

    Context for non-security folks: YouTube has started banning hacking tutorials, so hackers have started hosting them on PornHub. Life, uh, finds a way

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    1. velj

    Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets).

    Poništi
  3. proslijedio/la je Tweet

    Adding this to the list of “references for next time a commercial CA talks smack about automated cert renewal”

    Poništi
  4. proslijedio/la je Tweet

    OK Google: bypass the authentication! Fascinating blog - highlighting the risks when so many complex systems interact.

    Poništi
  5. proslijedio/la je Tweet
    prije 9 sati

    <∆KELA = 'SOCIAL MEDIA' <ENTRY NAME = NEWS So! I have been working on a ton of stuff. One of those things is an EP based On & inspired by One of my all time favourite card games! It should be the next thing I release! - - </ENTRY </∆KELA

    Poništi
  6. proslijedio/la je Tweet

    “Among those who refused the briefing and walked out included the BBC’s Laura Kuenssberg, ITV’s Robert Peston and political journalists from the Daily Mail, Telegraph, the Sun, Financial Times, and Guardian.” Well done and about time before you create a mirror image of Trumpland

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    prije 8 sati

    It's 2020. If your product or service is only profitable if you don't bake in security, then your product or service doesn't have a viable business model at all. Stop the "we can't afford to do security" mantra. It's no more an "option" than hard hats at a construction site...

    Poništi
  8. proslijedio/la je Tweet
    2. velj

    😂 99 2nd hand smartphones are transported in a handcart to generate virtual traffic jam in Google Maps. Through this activity, it is possible to turn a green street red which has an impact in the physical world by navigating cars on another route to avoid being stuck in traffic

    Poništi
  9. proslijedio/la je Tweet

    When something you own is in a museum...

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    1. velj

    Train from Leeds full of young people who've clearly had a great day out in various bars. Bit scary when you're alone and in a chair. Get to my stop, and one dashes out behind me in massive heels. "I'm checking they haven't forgotten the ramp for you." The kids are alright.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet

    The goal with this guide is to provide a foundational knowledge of REST API's. We cover: - REST Constraints - Richardson Maturity Model - REST in Practice - An example project

    Poništi
  12. proslijedio/la je Tweet

    Nigel Thornberry lookin' ass helmet.

    Poništi
  13. proslijedio/la je Tweet
    2. velj

    A lot of tweets about miss that 02 February 2020 is a palindrome in USA, UK and ISO formats; it is a palindrome day of the year (33) and there are a palindrome of days left in the year (333). This will never happen again. More details here:

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    2. velj

    Remember, Twitter uses algorithms to serve you content it thinks you will interact with. If you react a lot to negative news, Twitter will serve you more of it. Twitter is what you make it. Tired of misinformation and fake news? Stop interacting with it!

    Poništi
  15. proslijedio/la je Tweet
    31. sij

    Good news — since China stole the IP of F-35 for their J-31 it means their software is crap too. NSA can just patch diff between the current builds and the stolen builds and they’ll have hundreds of 1day exploits! China’s industrial espionage is a vulnerability!! 😋

    Tweet je nedostupan.
    Poništi
  16. proslijedio/la je Tweet
    30. sij
    Poništi
  17. 30. sij
    Poništi
  18. proslijedio/la je Tweet
    30. sij
    Poništi
  19. proslijedio/la je Tweet
    27. sij

    Good news everyone! and for Global conference is open. For more details, please check See you in Dublin. Please RT

    Poništi
  20. proslijedio/la je Tweet
    28. sij

    Over the past few years I've spent 100s (1000s?) of hours studying how companies have scaled their security. Here are my slides that distill what I've learned- the big, scalable, systematic wins that measurably improve your security posture.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·