Erica 💜🦊 utilise witches.town. Vous pouvez læ suivre et interagir si vous possédez un compte quelque part dans le "fediverse".

Erica 💜🦊 @packetcharmer@witches.town

rp, decidedly not lewd Afficher plus

Erica 💜🦊 partagé

omg I hate WIC so much!!!
- the list of things is ultra specific, so if someone gets Brand X plain yogurt and it’s not designated, it won’t work
- our computer system is spotty, so that fruits that used to work won’t work anymore
- there’s no definitive way for me to know if an item is WIC or not

Erica 💜🦊 partagé

Hi everyone.

Here is a PDF copy of "Toxic Parents" by Susan Forward and Craig Buck. It was referred to me by my therapist and deals with ways to reclaim your life when you have toxic parents (even as an adult).

dropbox.com/s/kg65aktmtx07616/

@varx so the technologies have improved somewhat, but incumbent ISPs seem to want to do the bare minimum to upgrade their networks (which I think is their biggest sin)

@varx I’ve seen some business plans also ban hosting servers (I know Comcast does this) mostly because of the upstream limits of DOCSIS

@varx Mesh networks solve the last mile issue, but they don’t replace long haul trunks. In a pinch you can MacGyver a solution out of either satellite or shortwave radio links(shortwave only if you’re really desperate and don’t mind losing 99.999% of your network capacity, but it would work in a pinch)

@varx so in their defense ISPs often forbid servers by policy because most residential internet distribution technologies (ADSL, DOCSIS, PON FTTP, etc.) both heavily oversubscribe as well as prioritize downstream over upstream. Small servers are usually ok, but anything that could be considered production runs the risk of causing congestion for other clients.

Guerrilla gets trapped by Happy Science folks /3 Afficher plus

Erica 💜🦊 partagé
Erica 💜🦊 partagé

@SarcasmKid
THAT WAS A TRICK QUESTION OLIVE
ALL SHARKS ARE CUTE

@KitRedgrave I mean knowing Linux is great, makes things easier once you compromise those servers, but most corporations have their auth centered around windows workstations controlled by active directory so you’ll want to know how to break that too.

Erica 💜🦊 partagé

food, caps Afficher plus

@KitRedgrave the real trick is figuring out how the tools work well enough that you still know what to do when they fail, because they will fail on you. I’ve gotten to the point that I can fully compromise a Windows domain without using metasploit at all, just Responder, hashcat, impacket, and mimikatz. The main value of Metasploit to me is that meterpreter makes post-exploitation a lot easier.

Erica 💜🦊 partagé

@KitRedgrave reverse engineering is a really good skill for offensive security and security research

Erica 💜🦊 partagé
Erica 💜🦊 partagé

🇬🇧 Hey, everyone! We just deployed a new version containing a much expected feature: CW a post coming from Twitter. It's experimental and it's better described in the README. Follow the link and let me know of any issues :)

🇧🇷 Oi, pessoal! A gente acabou de lançar uma versão com uma feature muito esperada: usar CW num post vindo do Twitter. Ainda é experimental e está melhor descrita no README. Dê uma olhada no link e avisem de qualquer problema :)

github.com/renatolond/mastodon

-- @renatolond