infosex.exchange <3

You are probably looking for the infosec.exchange Mastodon instance

This host is mostly for my random stuff, and in little part acts like a well-intentioned placeholder for the typosquatted domain.

Discoverability and Archiving

Currently I'm using this host for saving the items from my own feeds to the Wayback Machine and provide in-links for search engines. I hate that I have to do this, but the non-sense ideology of Mastodon pretty much ruined the search feature for Fediverse as a whole, and this wasn't changed by the fact that they owned their mistake and implemented search eventually.

Yes, I (or anyone else) could do similar things with other peoples published feeds, regardless of the tantrum. No, you can't defederate this, because the process doesn't rely on an instance.

Gluttony Section for Search Engines

@whitequark
this post | permalink
@simontsui @howelloneill I was like this, then the amount of articles made the roles switch :D
this post | permalink
@singe I tried to look up the post on @wdormann's account but I guess RT's don't propagate here. Also, my Twitter->Fedi script could use better markers...
this post | permalink
[Yarden Shafir @ X] RT by @yarden_shafir: Well... It's not quite KD, but WinDbg has supported debugging the Linux kernel via an EXDI connection for some time. Easiest setup is to enable the gdbserver on QEMU and use EXDI in WinDbg selecting "Linux" as the OS. I've source level stepped the Linux kernel doing that...

https://twitter.com/wmessmer/status/1765156291729858728
this post | permalink
[Yarden Shafir @ X] RT by @yarden_shafir: If you've ever wanted to live debug user mode Linux processes (e.g.: in WSL) from WinDbg, with 1.2402.24001.0, you can! Start up a gdbserver in WSL (e.g.: gdbserver localhost:1234 ./vim) and connect to it via WinDbg's "Connect to remote debugger"

https://twitter.com/wmessmer/status/1764854267712860298
this post | permalink
Fuzzer Development 3: Building Bochs, MMU, and File I/0

https://h0mbre.github.io/Loading_Bochs/
this post | permalink
[Will Dormann @ X] RT by @wdormann: An interesting exercise: Look at this list of 40 commonly exploited vulnerabilities the Five Eyes agencies saw in 2022 and estimate how many could not have occurred if memory safe languages were used in all the products. My very rough count: Five or fewer.

https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a
this post | permalink
[RSS] Reverse engineering photovoltaic system F-logic DataCube3 - Analysis of CVE-2024-25833, CVE-2024-25832, CVE-2024-25830, and CVE-2024-25831

https://neroteam.com/blog/f-logic-datacube3-vulnerability-report
this post | permalink
@pancake restart for windows updates
this post | permalink
Is there a generic phrase for tactics when much desired items/services/etc. are bundled with shitty ones and can only be bought/accepted together?

Examples:
- Cookie "selections"
- Cable channels
- Laws for Feeding Children and Total Surveillance
- Landline subscription with your Internet package
- ...
this post | permalink
Next Page