just_another_person

joined 2 years ago
[–] just_another_person@lemmy.world 4 points 6 hours ago (1 children)

And? Both of those can participate in Windows Domain Services.

[–] just_another_person@lemmy.world 2 points 8 hours ago (2 children)

I've played this game before. Made absolutely zero sense.

[–] just_another_person@lemmy.world 17 points 9 hours ago* (last edited 9 hours ago)

If your goal is to truly obfuscate and anonymize, this will not work as any endpoint you run can be easily tied back to you.

[–] just_another_person@lemmy.world 2 points 9 hours ago (3 children)

Why not UnRaid or TrueNAS?

[–] just_another_person@lemmy.world 26 points 17 hours ago

If Eaton pushed an update to those UPS units, it could have gained root-level access to the host tabulation environment—without ever modifying certified election software.

🙄

Stop with the "IF" bullshit. Either get some hard fucking proof, or shut the fuck up.

The shit happening in New York has more proof than this dumbshit.

Wow. Glad you're not responsible for anything at all, ever.

[–] just_another_person@lemmy.world 3 points 17 hours ago (1 children)

Whoa, Chris Gethard. Thought he quit the game. This was great though.

[–] just_another_person@lemmy.world 126 points 18 hours ago (17 children)

Leave it at home.

[–] just_another_person@lemmy.world -2 points 19 hours ago

Wine or compatibility layers.

[–] just_another_person@lemmy.world 1 points 22 hours ago* (last edited 19 hours ago) (5 children)

This person is getting to be fucking annoying.

The title is definitely not as described, only applies to Windows (I think), and won't work without a permissions escalation.

The only reason it's classified as a CVE is because they requested it be such.

There are no payload attacks proven here, or PoC attack code. This person has been posting pretty basic "hacks" for a few years, and makes a mountain out of an anthill every damn time.

🙄 Ugh

 

Yup

view more: next ›