Skip to content

'We're done with Teams': German state hits uninstall on Microsoft

Technology
102 64 152
  • 424 Stimmen
    80 Beiträge
    114 Aufrufe
    S
    It really depends on the company. Some look for any way to squeeze you. Others are pretty decent and probably more efficient as they dont waste as many working hours on bullshit claims and claim resolution. Also if i rent a car i want things to go smoothly. I got places to be. You make my life easy, ill happily pay again and do my best to make yours easy too.
  • Deep Dive on Google's TPU (Tensor Processing Unit)

    Technology technology
    1
    45 Stimmen
    1 Beiträge
    8 Aufrufe
    Niemand hat geantwortet
  • Role of Email Deliverability Consulting in ROI

    Technology technology
    1
    2
    0 Stimmen
    1 Beiträge
    9 Aufrufe
    Niemand hat geantwortet
  • 88 Stimmen
    3 Beiträge
    19 Aufrufe
    gnulinuxdude@lemmy.mlG
    I have never used a food delivery service because they all feel so fucking scummy and exploitative. Seems like they are in equal need as we are for regulatory overhaul of this business practice.
  • 168 Stimmen
    11 Beiträge
    41 Aufrufe
    A
    Law enforcement officer
  • 4 Stimmen
    20 Beiträge
    56 Aufrufe
    V
    Oh, I get it. You're a purposefully ignorant dumbass.
  • 1 Stimmen
    8 Beiträge
    27 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • 588 Stimmen
    77 Beiträge
    63 Aufrufe
    F
    When a Lemmy instance owner gets a legal request from a foreign countries government to take down content, after they’re done shitting themselves they’ll take the content down or they’ll have to implement a country wide block on that country, along with not allowing any citizens of that country to use their instance no matter where they are located. Block me, I don’t care. You’re just proving that you can’t handle the truth and being challenged with it.