Hacker   12314

« earlier    

An Illustrated Guide to SSH Agent Forwarding
# ls -l /tmp/ssh* — look for somebody's agent socket
total 24
srwxr-xr-x 1 steve steve 0 Aug 30 08:46 agent.6094=

# export SSH_AUTH_SOCK=/tmp/ssh-CXkd6094/agent.6094

# ssh steve@remotesystem

remote$ — Gotcha! Logged in as "steve" user on remote system!
One cannot tell just from looking at the socket information which remote systems will accept the user's key, but it doesn't take too much detective work to track it down. Running the ps command periodically on the local system may show the user running ssh remotesystem, and the netstat command may well point to the user's home base.
ssh  security  hacking  hacker 
1 hour ago by hellsten
Does It Matter Which Charger I Use?
Does It Matter Which Charger I Use?
Does  It  Matter  Which  Charger  I  Use  -  life  hacker  2013 
3 days ago by kilroy2
SMBlog -- 23 February 2018
That left us with no good choices. The infrastructure for a cryptographic solution was lacking. The uux command rendered illusory any attempts at security via the Usenet programs themselves. We chose to do nothing. That is, we did not implement fake security that would give people the illusion of protection but not the reality.
history  usenet  security  hacker  trolls 
13 days ago by yorksranter

« earlier    

related tags

-  11/9/2017  2  2013  4gw  aaron  addons  aggregator  ai  and  android  api  app  archive  art  article  asm  assembly  authoritarianism  aviation  badbot  birthday  bitcoin  blockchain  blog  book  boss  boston  bowdoin  bucket  car  cars  celebrity  cell  charger  chicpress  china  chrome  chronicle  cia  classes  classics  cnn.com  code_changes  commentary  comments  community  computer  computers  computing  config  cool  corruption  cotxes  course  courses  cpu  crypto  culture  cyberpunk  cybersecurity  cyberwarfare  dailykos.com  data  database  dataset  dccc  decentralization  democratic  developer  development  digg  digital  diy  diyelectronics  dnc  does  doj  donaldtrump  download  education  ee  election2016  electronics  email  emails  ethics  fake  fashion  fbi  feedly  follow  free  fsb  fun  funny  futurism  g0v  geo  geocoding  gift  git  github  gizmodo.com  globe  go  gop  government  gps  group  gtd  guide  hack  hacker  hacker_news  hackernews  hackers  hacking  hacks  hardware  hiring  history  hn  holder  homeland  hopehicks  hosting  hrc  hrmcmaster  humor  humour  i  ifttt  inside  instapaper  intel  intelligence  interesting  internet  investigations  iot  ips  it  jamescomey  jaredkushner  jeffsessions  jm  k8s  key  knuth  konstantinkozlovsky  kubernetes  lab  labs  language  leak  learning  leviathan  life  lifehack  liner-notes  links  linux  list  listening  longform  longread  longreads  lowtrustsociety  machine  mail  malware  marketing  matter  media  meltdown  memoir  memory  min  mit  mmm  modem  modules  money  moralhorror  msnbc  netart  networking  news  nibble  nope  northkorea  npm  nsa  nsc  nyc  nyt  obama  of  offense-defense  old_code  on  online  open  openai  opensource  opporesearch  ops  org:mat  osint  overcast  papers  pentest  perl  personal  peterlevashov  phones  pinned  pinterest  pipelines  podcast  podcasting  politics  preprint  pretend  privacy  prof  profhacker  programming  propaganda  public  puppet  putin  python  raspberry_pi  raspberrypi  read  reading  reference  reincepriebus  republican  research  resource  return  risk  robertmuller  rpi  russia  russiagate  s3  safety  satire  scandals  science  screen  scum  security  server  skygofree  smtp  social  software  spectre  sqlite  ssh  staffers  stephenmiller  sticker  story  stupidity  submissions  suicide  swartz  swat  syria  tech  technical  technology  terminal  threat-modeling  to  to_blog  tools  top  training  trend  trolls  tutorial  twitter  type  typer  typing  uav  unintended-consequences  use  usenet  virus  vulnerabilities  vulnerability  wapo  web  webdev  webusb  which  whitehouse  wifi  wikileaks  wsj  xijinping  ycombinator  zine   

Copy this bookmark: