Introducing ZeroBB! A minimalistic forum (bulletin board) on the Tor network. If you have news to report, ideas to share, dislike moderation, and prefer to be anonymous, then this is for you. #ZeroBB is based on ZeroBin which is an open-source online paste tool where the server has zero knowledge of pasted data. The data is encrypted/decrypted in the browser using 256 bits #AES.
You need Tor to access this URL. Boosts are welcome.
On Fri we had the (yearly) curry night of ex- #DMADesign computer games people. First time I was able to turn up in ages. Thirty years since we made games, and some of us still do! This is where Lemmings, GTA and Hired Guns came from.
The Space Shuttle had a 59-pound printer on board, known as the Interim Teleprinter. Putting this heavy printer in orbit cost $1.5 million per flight, but it was a key piece of flight hardware,
providing the astronauts with mission plans, weather reports, and other documents from Mission Control. Let's take a look inside... 1/12
Cloudflare making headlines again, probably not the way it would prefer. From @dangoodin at Ars:
A familiar debate is once again surrounding Cloudflare, the content delivery network that provides a free service that protects websites from being taken down in denial-of-service attacks by masking their hosts: Is Cloudflare a bastion of free speech or an enabler of spam, malware delivery, harassment and the very DDoS attacks it claims to block?
Meanwhile, from Proofpoint:
Proofpoint is tracking a cluster of cybercriminal threat activity leveraging Cloudflare Tunnels to deliver malware. Specifically, the activity abuses the TryCloudflare feature that allows an attacker to create a one-time tunnel without creating an account. Tunnels are a way to remotely access data and resources that are not on the local network, like using a virtual private network (VPN) or secure shell (SSH) protocol.
First observed in February 2024, the cluster increased activity in May through July, with most campaigns leading to Xworm, a remote access trojan (RAT), in recent months.
Campaign message volumes range from hundreds to tens of thousands of messages impacting dozens to thousands of organizations globally. In addition to English, researchers observed French, Spanish, and German language lures. Xworm, AsyncRAT, and VenomRAT campaigns are often higher volume than campaigns delivering Remcos or GuLoader. Lure themes vary, but typically include business-relevant topics like invoices, document requests, package deliveries, and taxes.
"Goodbye Xbox 360"
https://www.youtube.com/watch?v=eQxUutzKsms
You can now play the demo of Metro Siege in your browser: https://metrosiege.com/play/
#Amiga #Retrogaming
X, formerly known as Twitter, has automatically activated a setting that allows the company to train its Grok AI on users’ posts.
X enabled the new setting by default.
The good news is that you can switch it off and also delete your conversation history with the AI.
"Technical Details: Falcon Content Update for Windows Hosts
What Happened?
On July 19, 2024 at 04:09 UTC, as part of ongoing operations, CrowdStrike released a sensor configuration update to Windows systems. Sensor configuration updates are an ongoing part of the protection mechanisms of the Falcon platform. This configuration update triggered a logic error resulting in a system crash and blue screen (BSOD) on impacted systems."
https://www.crowdstrike.com/blog/falcon-update-for-windows-hosts-technical-details/
"Automated CrowdStrike BSOD Workaround in Safe Mode using Group Policy"
https://gist.github.com/whichbuffer/7830c73711589dcf9e7a5217797ca617
"On July 19, 2024, a CrowdStrike update was suspected to cause the Blue Screen of Death on Microsoft Windows, affecting millions of computers (Windows/Mac) worldwide, including those of essential services like emergency services, hospitals, banks, airlines, trains and others.
The blue screen of death is reported with a stop code of PAGE_FAULT_IN_NONPAGED_AREA from the csagent.sys driver."
Heads up new OpenSSH (sshd) security bug only exists in RHEL 9 and friends. OpenSSH bug leaves RHEL 9 and the RHELatives vulnerable https://www.theregister.com/2024/07/11/openssh_bug_in_rhel_9/ #linux
-"When the going gets weird, the weird turn pro..."