Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @dreadcode
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dreadcode
-
Prikvačeni tweet
Published my Bachelor Thesis: "Implementation and evaluation of secure and scalable anomaly-based network intrusion detection" along with my network traffic analysis framework: http://github.com/dreadl0ck/netcap …
#golang#IDS#NSM#DeepLearning#MLPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dreadl0ck proslijedio/la je Tweet
This
#PatchTuesday you are strongly encouraged to implement the recently released CVE-2020-0601 patch immediately. https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF …pic.twitter.com/log6OU93cV
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dreadl0ck proslijedio/la je Tweet
Yikes! A top iOS app in
@Apple's App Store, was a government spy tool!?


"...used by the govt. of the United Arab Emirates to try to track every conversation, movement ...of those who install it on their phones" -@nytimes Our technical analysis:https://objective-see.com/blog/blog_0x52.html …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dreadl0ck proslijedio/la je Tweet
We are so excited to announce TamaGo: bare metal Go for ARM SoCs. This project allows, with minimal adaptation to upstream Go, execution of 100% Go applications on the USB armory and hopefully more platforms in the future. Check it out! https://github.com/inversepath/tamago …pic.twitter.com/s5xxgKw3lB
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Interested in evaluating your corporate network defenses against a parasitic reverse tracerouting attack? We are currently running a case study for our research project
@UvA_Amsterdam OS3 institute. Paper and source code release are scheduled in two weeks. https://revcon.os3.nlPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dreadl0ck proslijedio/la je Tweet
The Linux Forensics workshop (labs, slides, forensic images "E01")+talk done at
#OSDFCon 2019, is now available here: http://bit.ly/osdfcon19#DFIR#Linux#ForensicsPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dreadl0ck proslijedio/la je Tweet
My analysis of a new
#ATM#malware called#XFS_DIRECT using a Raspberry Pi Zero W and P4WNP1's HID backdoor for delivery. https://github.com/fboldewin/ATM-Jackpotting-P4WNP1-style-with-malware-XFS_DIRECT …#DFIR@Bank_Security#YARA rule is here --> https://raw.githubusercontent.com/fboldewin/YARA-rules/master/ATM.Malware.XFS_DIRECT.yar …pic.twitter.com/5F8zbH8BBu
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dreadl0ck proslijedio/la je Tweet
[1/4] Ok this is really funny, check this out. I was in the process of booking a flight via
@OneTravel. Trying to make me book ASAP, they claimed: "38 people are looking at this flight". Whoa, 38 is a lot, I have to hurry up. But first I have to check how they came up with 38 >>pic.twitter.com/UaGhaiCQrR
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dreadl0ck proslijedio/la je Tweet
Introducing
#NetCAT: the first PRIME+PROBE cache attack over the network using#Intel#DDIO technology. Here is NetCAT leaking keystrokes from a victim SSH client in real-time: https://youtu.be/QXut1XBymAk@mik__@bjg Dennis@c_giuffrida@herbertbos@kavehrazaviPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dreadl0ck proslijedio/la je Tweet
The next step after encrypted DNS: anonymized DNS. I’m thrilled to announce the first generally available implementations of the Anonymized DNScrypt protocol. https://www.reddit.com/r/dnscrypt/comments/dhoxah/anonymized_dns_is_here/ … - Say no to centralization. We need DNS relays all over the world.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dreadl0ck proslijedio/la je Tweet
This is what radiation LOOKS like. Uranium emitting alpha particles through cooled vaporpic.twitter.com/qv4SNYXxFn
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dreadl0ck proslijedio/la je Tweet
Is it time for the Robotic Olympics? Credit: Boston Dynamicspic.twitter.com/sAfwcVIJDD
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dreadl0ck proslijedio/la je Tweet
How does the German (
@dreadcode) see me#italian#coffee#wtfpic.twitter.com/CB55SRwid3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dreadl0ck proslijedio/la je Tweet
The Windows Defender telemetry and sample collection network is called - I kid you not - "SpyNet". Here's a good resource with all the URLs used for sending the telemetry and other data: https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus …pic.twitter.com/4pNXJ35qdx
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Cloud Native open sourced the Kubernetes Security Audit:https://www.cncf.io/blog/2019/08/06/open-sourcing-the-kubernetes-security-audit/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dreadl0ck proslijedio/la je Tweet
Rustls vs OpenSSL: https://jbp.io/2019/07/01/rustls-vs-openssl-performance.html …: * 15% quicker to send data * 5% quicker to receive data * 20-40% quicker to full handshake (client) * 10% quicker to full handshake (server) * 30-70% quicker to resume (client) * 10-20% quicker to resume (server) * Uses <1/2 as much RAM
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dreadl0ck proslijedio/la je Tweet
Today we present
#ridl (or#mds), a new class of speculative execution vulnerability on#intel CPUs to leak in-flight data across any security boundary https://mdsattacks.com@vu5ec@themadstephan@noopwafel@sirmc@pit_frg@gimaisura@kavehrazavi@herbertbos@c_giuffrida#mdsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Oh and here is a timelapse video I made on my way to the conference on the second day. Join me on a sunny ride through vondelpark and the city center :)
#HITB2019AMS#HITBSecConfpic.twitter.com/xslmdwsaQ6Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Speaking at HITB was awesome, I got a lot of positive feedback and a couple of new ideas. Slides are available here: https://conference.hitb.org/hitbsecconf2019ams/materials/ … Talk is on YT: https://youtu.be/_FN1yvXC3Vg?t=13919 … New release is available on github: https://github.com/dreadl0ck/netcap … PS: Netcap is watching you :)pic.twitter.com/N0xph7nqMt
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.