Rezultati pretraživanja
  1. 6. velj
  2. 4. velj

    Serious Security – How ‘special case’ code blew a hole in OpenSMTPD -

  3. 31. sij

    Cool! I just added over 100 pages of material and labs on for Windows with to my six-day SANS course:

  4. 31. sij

    In this research, we propose an innovative security model to solve the issues of allowing remote authentication access using SSH protocol exchange keys without affecting the encrypted protocols transmissions.

  5. 31. sij

    Tool review: massh-enum (OpenSSH user enumeration) by

  6. 30. sij
  7. 14. sij

    My new six-day PowerShell course at SANS is going to make people FREAK OUT when they see what you can do with PowerShell Core 7 + OpenSSH for Windows. :-) ( )

  8. 7. sij
  9. 8. pro 2019.

    Can we stop calling an Operating System & promote REAL like & Cuz, like, TCP/IP & wouldn't exist. Just sayin'

  10. 17. stu 2019.

    UF2/FIDO key generation with the Nano S on (without any additional software, only the base system)

  11. 30. lis 2019.

    KDE Plasma 5.17.1 & major version of arrived in one of the five Tumbleweed snapshots that were released this week - 😃

  12. Learn how to set up a basic OpenSSH server on Ubuntu, including ssh keys and ssh config from the client-side.

  13. PuTTY version 0.73 is released Putty is an ssh client for all Windows users. I believe MS is also working on a portable OpenSSH client and server. Either way update putty.exe to fix vulnerabilities.

  14. Privsep is now mandatory (was already enabled by default) in portable.

  15. 7. ruj 2019.

    Create your own SSH CA and use signed SSH keys only to restrict the access to your systems and apply additional restrictions. At the same time it's easy to revoke certificates. It's just great - and secure. ;)

    Prikaži ovu nit
  16. 1. kol 2019.

    Yesterday was day 56 of my . But I didn't actually do much coding. I coded just a little in and HTML. What I mainly did was spend a lot of time on my , setting up an server and server, and port forwarding. Maybe I'll redo this day.

  17. is based on a well-known class of DRAM Rowhammer attacks; but instead of writing, it allows attackers to read bits from the adjacent rows. Researchers demonstrated their finding with an attack against 7.9 and extracted an RSA-2048 key from the memory.

    Prikaži ovu nit
  18. 16. svi 2019.
  19. 4. svi 2019.

    My and Resources - including online presentations and blog posts - check them out here: Learn how OpenSSH works and how to use it with PowerShell Remoting.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.