fraksken

joined 1 year ago
[–] fraksken@infosec.pub 4 points 1 hour ago

Fun for the survivor I guess... Do you have a source? I'd like to learn more about it.

[–] fraksken@infosec.pub 1 points 1 day ago (1 children)

Extract recursively?

[–] fraksken@infosec.pub 2 points 1 day ago

xvzf would extract, verbose, unzip file [filename]

[–] fraksken@infosec.pub 1 points 1 day ago

x for extract v is verbose f for file input

[–] fraksken@infosec.pub 8 points 4 days ago

Here come the lists ...

[–] fraksken@infosec.pub 1 points 1 week ago

That was their second reaction to it as well. They are well behaved though. Once we made clear it was not for mauling and destroying, they seem to be fine.

Still hiding them at night ...

 

Bought some sheep skin for the cats. They both enjoy it very much. I just need to mind them not tearing it apart ...

[–] fraksken@infosec.pub 6 points 1 week ago (3 children)

18°c is uncalled for though? Above 12 should be fine

[–] fraksken@infosec.pub 29 points 1 week ago (1 children)

I hope the foundation of your house is deeper than that.

[–] fraksken@infosec.pub 2 points 1 week ago
[–] fraksken@infosec.pub 2 points 1 week ago (1 children)

This is not the first time you have contemplated this, now have you?

 

On quite a few news websites there's a new hot topic how the Australian "Ghost" app got hacked by Interpol and has led to prevention of murders and resulted in a few arrests.

Is there any information out there on what security methods Ghost used and how it was exploited?

 

Just wanted to reach out to mention I think the linked page may be missing an opening ( in the image example: ![Lemmy from Motörhead]https://upload.wikimedia.org/wikipedia/commons/8/84/Lemmy-02.jpg)

great documentation by the way!

view more: next ›