It is done. Over 550 pages on how professional hackers target and breach computer networks. This is a body of work culminated from several decades of experience breaching computer systems. The book is an interactive tutorial which comes with several labs for practicing the skills taught. It serves as both a teaching aid and a reference guide. It's my hope that this book is used to improve networks and computer security. We hold no punches and teach precisely how hack attacks work. Happy hacking!
"There's a problem with the Timescope."
"It's useless for future vision-"
"Because it'll show any possible future, yes, I know. But the past is fixed."
"We thought so. But look here. It's tuned to 200 years ago."
"2020? Okay, lets see... What? That can't have happened!"
#MicroFiction #TootFic #SmallStories
@smallsees I don't think there is a Bad Horse option, I can't imagine it would sell all that well
GitHub's mysterious secret user repos:
Want your own profile to look like that? Just create a repository that matches your GitHub username and create a README there.
A new Synapse release candidate 1.17.0rc1. It's a bug fix release, if you have been hit by stuck invites recently this is the one for you. If you would like to help us test give it a spin! https://github.com/matrix-org/synapse/releases/tag/v1.17.0rc1
I checked this on Friday, and then again this morning... Shodan was showing around 70-ish new F5s...
Which means there are at least 70 new honeypots in the wild.
Free Software programmer, network engineer and Debian developer.
100% tomato verified. 🍅✔
The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!