Skip to content

Elon Musk wants to rewrite "the entire corpus of human knowledge" with Grok

Technology
199 159 4.4k
  • 75 Stimmen
    29 Beiträge
    0 Aufrufe
    E
    We can take action. We can grab the die that Joel McHale has tossed into the air.
  • 110 Stimmen
    3 Beiträge
    11 Aufrufe
    D
    Is this the same Maury Blackman who violently beat a woman less than half his age? I'm not sure, which is why I'm asking a question.
  • 0 Stimmen
    1 Beiträge
    19 Aufrufe
    Niemand hat geantwortet
  • 141 Stimmen
    22 Beiträge
    219 Aufrufe
    P
    That would be 1 in 4 users and that's just not accurate at all. What you mean to say is 25% of Windows users still use windows 7. Its still an alarming statistic, and no wonder bruteforce cyberattacks are still so effective today considering it hasn't received security updates in like 10 years. I sincerely hope those people aren't connecting their devices to the internet like, at all. I'm fairly sure at this point even using a Debian based distro is better than sticking to windows 7.
  • Hands-On: EufyMake E1 UV Printer

    Technology technology
    18
    1
    38 Stimmen
    18 Beiträge
    157 Aufrufe
    S
    I watched a bit of Michael Alm's video on this, but noped out when I saw all of the little boxes of consumables appearing. If regular printer ink is already exorbitant, I can only imagine what these proprietary cartridges will cost.
  • 21 Stimmen
    3 Beiträge
    41 Aufrufe
    B
    We have to do this ourselves in the government for every decommissioned server/appliance/end user device. We have to fill out paperwork for every single storage drive we destroy, and we can only destroy them using approved destruction tools (e.g. specific degaussers, drive shredders/crushers, etc). Appliances can be kind of a pain, though. It can be tricky sometimes finding all the writable memory in things like switches and routers. But, nothing is worse than storage arrays... destroying hundreds of drives is incredibly tedious.
  • 1 Stimmen
    8 Beiträge
    78 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • 0 Stimmen
    7 Beiträge
    70 Aufrufe
    F
    It's an actively hostile act, regardless of what your beliefs are on the copyright system.