Twitter | Pretraživanje | |
Hardened-GNU/Linux
We are "patient" zero, so we hardened ourselves!
994
Tweetovi
143
Pratim
974
Osobe koje vas prate
Tweetovi
Hardened-GNU/Linux 3. velj
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux proslijedio/la je tweet
grsecurity 23. sij
New blog post: The Life of a Bad Security Fix: We'll do more shorter-form blogs like this rather than just tweet into the void over several months about the journeys of bad fixes:
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux 21. sij
2000 stickers and 1000 fridge magnets are arrived. Hope we can bring it to ;-)
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux 15. sij
Odgovor korisniku/ci @hardenedlinux
s/bridge/fridge/g
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux 15. sij
Thanks to our donors! We printed a few thousands of stickers and bridge magnets for "Public Money? Public Code!" promotion!
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux 27. pro
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux 24. pro
Odgovor korisniku/ci @g00n1x @OrangeCMS
VPN is a different use case, we made this document publicly only because it's a good hardening option( whitelisting *anything* based on PaX/Grsecurity's RBAC) for the bastion which is the case.
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux 23. pro
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux 7. pro
We gave out one ticket as a gift for a libre software/firmware/hardware contributor already, as we did previously. Hope all attendees will enjoy the journey in Leipzig. See you guys at the Congress!
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux 30. stu
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux 26. stu
We split different resources( based on “resource centric” in syzkaller ) by collecting different states triggered by them to generate( stack-based) new program. That's what we call state based fuzzer:
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux proslijedio/la je tweet
Zaolin 25. stu
Check out our new blog post about Open Source Firmware and its impact.
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux 23. stu
Good example of off-the-shelf defense-in-depth introduction
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux 22. stu
A good study case to "defender and someone else":
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux 22. stu
Secure Firmware Development Best Practices
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux 21. stu
Awesome work! Another milestone for security/transparency on x86 server!
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux 21. stu
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux 19. stu
Linux Kernel Runtime Guard (LKRG) on Whonix
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux 14. stu
Exploiting Intel’s Management Engine – Part 1: Understanding PT’s TXE PoC (INTEL-SA-00086) Exploiting Intel’s Management Engine – Part 2: Enabling Red JTAG Unlock on Intel ME 11.x (INTEL-SA-00086) MFSUtil:
Reply Retweet Označi sa "sviđa mi se"
Hardened-GNU/Linux 11. stu
Bypassing Authentication on SSH Bastion Hosts
Reply Retweet Označi sa "sviđa mi se"