

Hey to everyone moving in from reddit. Don’t forget that lemmy can’t fill the void you’re trying to fill without content.
Thanks to the federated nature of lemmy, we have infrastructure, we just need more creators on it.
Hey to everyone moving in from reddit. Don’t forget that lemmy can’t fill the void you’re trying to fill without content.
Thanks to the federated nature of lemmy, we have infrastructure, we just need more creators on it.
Typically if you’re gonna deploy a bunch of bots on lemmy, it’s easiest to do via your own instance, which is fairly easy to filter out.
Luckily the federated aspect will help with this a little bit.
Then they must have tried your password and saved it to one of a specific number of places. Infostealers are by definition a class of malware, which means it’s got to be installed somewhere with access to the directory storing the credential.
Or it was from an old computer, or mislabeled.
https://www.youtube.com/watch?v=L3f9do5mtT8
Here’s a good talk on infostealers for anyone curious.
For stealerlogs yes, it means malware was on your system, and exfiltrated data, typically from your browsers.
Playing cataclysm DDA in a zombie apocalypse.
Geriatric rapid response occuring at Walker and wheelchair speed.
Then when push comes to shove, I will not consider their safety.
The guy literally got brain damage and became more conservative. You can’t buy that kind of political commentary.
Ubuntu is the Microsoft of Linux.
And somehow Trump, who allegedly reeks of old ketchup and shit, spouts constant nonsense, and looks like the skin of a dried hot dog, does?
Me with a sledgehammer:
Too bad it’s packed full of features I don’t care about and lacks ones I do.
These handhelds are cool but I think I’ll skip this one.
You failed to answer my question. You’re clearly missing the point intentionally. You’re either a troll or retarded.
Okay if I turned off password auth, just used keys, disabled the Kali user and root login, how are you breaking in? Where’s the vulnerability? Which cve or cwe are you able to exploit?
A large attack surface doesn’t mean insecure. It just means less secure.
Source: I literally pentest for a living. No, I don’t even use Kali on a regular basis.
I don’t use the protocol, so I can’t give much opinion