Skip to content

Say Hello to the World's Largest Hard Drive, a Massive 36TB Seagate

Technology
149 99 0
  • 0 Stimmen
    1 Beiträge
    11 Aufrufe
    Niemand hat geantwortet
  • Cloudflare to AI Crawlers: Pay or be blocked

    Technology technology
    15
    1
    179 Stimmen
    15 Beiträge
    79 Aufrufe
    F
    Make a dummy Google Account, and log into it when on the VPN. Having an ad history avoids the blocks usually. (Note: only do this if your browsing is not activist related/etc) Also, if it's image captchas that never end, switch to the accessibility option for the captcha.
  • Deep Dive on Google's TPU (Tensor Processing Unit)

    Technology technology
    1
    45 Stimmen
    1 Beiträge
    12 Aufrufe
    Niemand hat geantwortet
  • No, Social Media is Not Porn

    Technology technology
    3
    1
    21 Stimmen
    3 Beiträge
    28 Aufrufe
    Z
    This feels dystopian and like overreach. But that said, there definitely is some porn on the 4 platforms they cited. It's an excuse sure, but let's also not deny reality.
  • 15 Stimmen
    1 Beiträge
    11 Aufrufe
    Niemand hat geantwortet
  • Apple acquires RAC7, its first-ever video game studio

    Technology technology
    16
    1
    67 Stimmen
    16 Beiträge
    80 Aufrufe
    E
    I'm not questioning whether or not the game is good, just wondering why Apple would want to limit their customer base so much.
  • Pimax: one more brand exposed for promoting "positive reviews".

    Technology technology
    2
    1
    55 Stimmen
    2 Beiträge
    29 Aufrufe
    moose@moose.bestM
    This doesn't really surprise me, I've gotten weird vibes from Pimax for years. Not so much to do with their hardware, but how their sales / promo team operates. A while back at my old workplace we randomly got contacted by Pimax trying to have us carry their headset, which was weird since we didn't sell VR stuff or computers even, just other electronics. It was a very out of place request which we basically said we wouldn't consider it until we can verify the quality of the headset, after which they never replied.
  • 1 Stimmen
    8 Beiträge
    40 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.