Aly

1.6K posts

Aly banner
Aly

Aly

@DixieCheer

Bachelor of Science in General Management. Technophile. Always learning.

In a Sunflower. Bergabung Şubat 2009
176 Mengikuti64 Pengikut
Tweet Disematkan
Aly
Aly@DixieCheer·
Aly tweet media
ZXX
0
0
0
58
AllaR
AllaR@Allar990·
@ABridgen This guy is literally trying to steal credit for something that was already done back in 2001...
AllaR tweet media
English
57
35
487
28.7K
Andrew Bridgen
Andrew Bridgen@ABridgen·
🚨BREAKING: Robert F Kennedy Jr announced it is official. Mercury is REMOVED from all vaccines. “Now that America has removed mercury from all vaccines, I call on every global health authority to do the same”
English
1.9K
8.8K
47.6K
1.9M
Aly me-retweet
Saltydkdan
Saltydkdan@saltydkdan·
Hey @Adobe @creativecloud thanks so much for putting more people out of jobs by discontinuing software that many people still use Fuck every one of you behind this decision so you can keep pushing your garbage AI tools nobody asked for
English
47
1.8K
13.5K
141.2K
Aly me-retweet
Kirbs
Kirbs@tristandavisart·
Being loud works. Adobe just announced it is no longer discontinuing Animate.
Kirbs tweet media
English
336
7.1K
61.8K
2.4M
Aly me-retweet
Thomas ‘TomSka’ Ridgewell
Truly vile that @Adobe are opting to kill Animate/Flash with no contingencies in place for the thousands of animators (including EVERY SINGLE ONE I work with) who are going to lose access to the program they've been mastering for up to 3 decades. This is an industry-killing move.
English
130
3.4K
31K
527K
Aly me-retweet
lcamtuf
lcamtuf@lcamtuf·
Moltbook debate in a nutshell
lcamtuf tweet media
Deutsch
183
3.9K
62K
1M
Aly me-retweet
Peter Girnus 🦅
Peter Girnus 🦅@gothburz·
I'm a Hacker. I attend DEF CON every year. We play a fun game called "Spot the Fed". Last week, the Department of Justice released three million pages of Epstein documents. I read them professionally. Not for the names. For the tradecraft. The tradecraft is immaculate. But here's what made me put down my coffee. An FBI informant told authorities in 2017 that Epstein had a "personal hacker." An Italian. Born in the southern region of Calabria. I've met hackers from Calabria. At DEF CON. At Black Hat. The informant said this hacker developed zero-day exploits. For iOS. For BlackBerry. For Firefox. The informant said this hacker sold the exploits to the United States. To the United Kingdom. To an unnamed central African government. And to Hezbollah. Hezbollah paid with "a trunk of cash." That's not how the US government pays. The US government uses purchase orders. But the exploits were the same. Same zero-days. Different payment methods. Different clients. Same hacker. Speaking of hackers in Epstein's emails. If you've been to Black Hat, you know the name. He's on the Black Hat conference board. He co-founded Trail of Bits. He co-wrote the iOS Hacker's Handbook. On April 14, 2018, the hackersent an email. To jeevacation@gmail.com. That's Epstein's personal email address. Subject line: "New Yorker." Document reference: HOUSE_OVERSIGHT_033280. I don't know what was in the email. The email exists. In the files. In the congressional oversight documents. I've been to Black Hat with the hacker in question. Not personally. In the same room. Watching the same talks. About zero-days. About offensive security. About "responsible disclosure." Epstein had a personal hacker selling zero-days to governments and Hezbollah. Epstein was in contact with a Black Hat board member. Epstein funded MIT Media Lab. Where they research AI. And security. And "the future." I don't know what this means. I know what it looks like. It looks like my industry. But there's more. US security officials say Epstein ran "the world's largest honeytrap operation." For Russian intelligence. The KGB. The documents mention Putin 1,056 times. Moscow 9,629 times. An email from September 2011: "You had an appointment with Putin on September 16th." Scheduled like a dentist visit. Security sources say a Russian oil tycoon introduced Epstein to the Maxwells. Robert Maxwell. Ghislaine's father. Called "Israel's Superspy." Alleged KGB. Alleged Mossad. Alleged MI6. Three agencies. One family. Plus a personal hacker. Plus a network of security researchers. Plus MIT. Plus zero-days sold to multiple governments and terrorist organizations. At DEF CON, we have a saying. "Spot the fed." It's a game. You try to identify the government agents in the crowd. It's funny. Until it isn't. Until you realize the game goes both ways. They're spotting you too. And taking notes. And building networks. And buying exploits. Epstein wasn't just an intelligence asset. He was an intelligence infrastructure. A platform. Multi-tenant. Multi-cloud. Russia. Israel. US. UK. Hezbollah. Everyone got access. Everyone paid differently. Same exploits. Same kompromat. Same network. Different clients. The question everyone asks: Was Epstein an intelligence asset? That's the wrong question. The right question: Was the entire security research community compromised? The answer is in the files. Three million pages. We just haven't read them all yet. Was the entire security research community compromised? Anyway, see you at DEF CON!
Peter Girnus 🦅 tweet media
English
807
4.5K
16.6K
1.1M
Aly me-retweet
Peter Girnus 🦅
Peter Girnus 🦅@gothburz·
I'm the Chief Human-AI Synergy Officer at Microsoft. My job is empowerment. We cut 15,000 jobs this month. That's also empowerment. For the shareholders. The President went to Davos. He said "Can technology be a platform that enables people to get better?" We enabled 15,000 people to get better. At job hunting. He said "We're going to use technology to help our employees get better themselves." We helped them. By replacing them. With technology. That's synergy. 70% of workers are anxious about AI. 30% of executives are anxious. The executives are less anxious because they're not getting replaced. They're doing the replacing. That's leadership. Workers say AI isn't saving them any time. 40% say it saves nothing. Executives say AI saves them 8 hours a week. The executives are right. AI saves them 8 hours of managing people. Who no longer work here. We're "uplifting human talent." Uplifting means some humans go up. Others go out. The door. That's the lift. Young workers aged 22 to 25 saw 16% employment decline. In AI-exposed jobs. The President said "This might be the best time to hire the best young people." While we cut 15,000. To make room. For the young people. We'll hire later. After the severance clears. He said "If the best we are today is the best we're ever going to be, computers will outpace us." Computers outpaced 15,000 of us. This month. The rest are still racing. I'm writing a memo now. "Building a future where AI uplifts human talent." Fewer humans. More uplift. That's synergy.
English
14
18
109
7.1K
Aly me-retweet
Paweł Wójcik 🦋
Paweł Wójcik 🦋@SaladinAlDronni·
Lucas @LucasADWebber already announced it, but I will repeat the same- we are cooking a massive study on what is currently happening with the Islamic State in West Africa, and this Niamey attack couldn't be a better indication that our arguments there were foreboding. Soon.
Paweł Wójcik 🦋@SaladinAlDronni

And finally, a video recorded with GoPro cameras of the Islamic State assault in the capital of Niger. Grim is an understatement, the sheer size of IS's contingent making it to the airport, the destruction, the freedom of movement. We have barely started 2026. #Niger #Niamey

English
1
2
23
2.1K
Aly me-retweet
NetAskari
NetAskari@NetAskari·
Chinese group accused of having hijacked a popular notepad application "The exact technical mechanism remains under investigation, though the compromise occured at the hosting provider level rather than through vulnerabilities in Notepad++ code itself. Traffic from certain targeted users was selectively redirected to attacker-controlled served malicious update manifests." : notepad-plus-plus.org/news/hijacked-…
English
0
7
34
5K
Aly me-retweet
Brian Allen
Brian Allen@allenanalysis·
BREAKING: MSNBC just confirmed it. The Epstein release included a spreadsheet of allegations involving Trump and other powerful figures. Then it disappeared. Not disproven. Not corrected. Removed. I saved it before they could delete it
Brian Allen tweet mediaBrian Allen tweet media
Brian Allen@allenanalysis

🚨BREAKING: A Trump-related document in the Epstein files was public, then deleted by DOJ, then dismissed as “sensational.” See it for yourself 👇

English
5.7K
28.2K
77.3K
3.4M
Aly
Aly@DixieCheer·
@JimSTruthBTold @JoJoFromJerz But the citizens of Greenland have specifically made it clear that they don’t want to be sold. I think they should have that choice. Don’t you?
English
0
0
0
7
Aly me-retweet
Jo
Jo@JoJoFromJerz·
The current president of the United States of America just told the world that he’s going to invade another country because he wasn’t given a peace prize.
English
6.6K
7K
47.7K
719.1K
Aly
Aly@DixieCheer·
@vxunderground Sometimes I think Malwarebytes started the Instagram NOT a BREACH just to get people’s info for the one time free scan. I bet the people who signed up for the free scans got advertising email also. Sneaky way to get a list of potential customers.
English
1
0
2
3.8K
vx-underground
vx-underground@vxunderground·
MalwareBytes has an local database on the machine. It is a SQLite database. It contains settings for various properties such as licensing, malware identified, and known-good and known-bad lists. This is standard anti-malware stuff. The database with "ThankYouForChoosingMalwarebytes" is the less interesting database, as it mostly contains settings (this can still be abused though). Regardless, MalwareBytes does a couple of things with this SQLite stuff MalwareBytes establishes a kernel-mode minifilter (mbam.sys). They setup minifilter callback routines to handle events on the system for process creation, process loading, and registry modification (Image 1) In other words, MalwareBytes is notified immediately when a process is created or an executable image is loaded. When a process is created or an executable image is loaded, MalwareBytes has special functionality to temporarily "pause" execution so it can review it. However, this "pause" happens faster than you or I can blink. Computers are fast. The mbam.sys creates an internal record of all processes running. When a new process is loaded it is added to this internal record. When a program is closed, it is removed from the record. It does this so it doesn't accidentally review or "pause" the same process twice. When a program is added to this list, the kernel-mode component communicates with the user-mode component that then signals and connects to a local SQLite database. The SQLite database then does a lookup to determine if the process "paused" is known or unknown (Image 2) However, it should be noted, Image 2 is not the important SQLite instance I am looking for. This is something else MalwareBytes uses (and communicates to with kernel-mode components). The point still stands. If it is known, it communicates back to the kernel-mode component that is it known. If it known, and known to be malicious, MalwareBytes takes action on the program attempting to run and immediately stops execution. If it is known to be good, MalwareBytes marks it internally as "seen" and keeps it in it's internal record. Image 3 is from the internal database they use. It's fairly large and is mostly settings. I still haven't find where the really nice, big, and important dataset they use is. It requires more poking and more sticks.
vx-underground tweet mediavx-underground tweet mediavx-underground tweet media
Dead Exit@_deadexit

@vxunderground Explain this to me because I’m stupid

English
36
178
3K
382K
Aly
Aly@DixieCheer·
@vxunderground But their advertising to even existing customers is irritating. The one on their software is almost enough to make me choose another company.
English
0
0
5
3.5K
Aly
Aly@DixieCheer·
@jimhigdon You’re products, including your supposedly 10 mg THC gummies are selling in stores. Is that REAL THC. Or CBD hemp? Your drinks with 5mg of THC is also selling in stores. How can you sell REAL THC? I thought people need a medical marijuana card to buy THC.
English
0
0
0
18
Jim Higdon
Jim Higdon@jimhigdon·
We have 364 days to stop the McConnell hemp shutdown that will make every non-intoxicating CBD product into a Schedule I narcotic.
English
197
2.1K
6.6K
165.1K
Aly
Aly@DixieCheer·
@vxunderground Did you answer via messaging too?
English
0
0
0
819
vx-underground
vx-underground@vxunderground·
Dawg, if you've received a fake letter in the mail from someone impersonating the government, and it's got a USB stick in it, that's a fucking bomb (probably not, I don't know)
vx-underground tweet media
English
21
11
325
28.7K
Aly
Aly@DixieCheer·
@onagh @FBIDirectorKash @DHSgov For someone who was trained as a fighter pilot, why didn’t the military train you for something else then?
English
0
0
0
6
Ona Hopke
Ona Hopke@onagh·
Sometimes when you purchase a Piper Aircraft you expect a Fury Business Class but end up with a Personal Archer. Just bingeing Netflix with Private Planes & Cyber Security @FBIDirectorKash @DHSgov
English
2
0
0
278