Akendo

3K posts

Akendo

Akendo

@4k3nd0

Katılım Haziran 2012
410 Takip Edilen84 Takipçiler
Sabitlenmiş Tweet
Akendo
Akendo@4k3nd0·
...a system where all the parts react the same way is a system with a fatal flaw. Like individuals, like Organization. Overspecialization leads to dead. - 草薙素子 - Kusanagi Motoko (Ghost in the Shell, 1995)
English
0
0
1
0
Akendo retweetledi
Aj
Aj@ajayns_·
Optical flow, fluid dynamics, refraction with lots and lots of render targets in WebGL #threejs #webgl
English
199
672
9.5K
657.5K
Akendo
Akendo@4k3nd0·
@bob5ec Stop being in my head! I was just thinking about this diagram.
English
1
0
0
18
Akendo retweetledi
des
des@dotnetschizo·
my favourite turn based strategy game
des tweet media
English
101
8.7K
100.1K
4.8M
Akendo retweetledi
Andrew Curran
Andrew Curran@AndrewCurran_·
It turns out music, movies, entertainment, and society in general peaked during the exact time period when you, the person reading this, were a teenager.
Andrew Curran tweet media
English
325
2.9K
20.7K
3.1M
Akendo retweetledi
hacker.house
hacker.house@hackerfantastic·
An apparent "VMWare ESXi" 0day is being advertised for $1.2million alongside an Outlook RCE Exploit 0-Day for $1,700,000, with "ShinyHunters" forum owner vouching for it as escrow and the same adverts being posted on some Russian forums.
hacker.house tweet media
English
11
103
522
141K
Akendo retweetledi
John Raymond Hanger 
John Raymond Hanger @johnrhanger·
Good morning with good news: Renewables generated 95% of Portugal's electricity in April! Wow! That compares to 76.5% in April 2023, 66.8% in April 2022 and 56.1% in April 2021. Wind was 31%, solar nearly 12%, hydro 45% and bioenergy 7%! Data from: ember-climate.org
John Raymond Hanger  tweet media
English
56
131
620
114.9K
Akendo retweetledi
Anthony Bonato
Anthony Bonato@Anthony_Bonato·
Mathematicians throw shade like no others
Anthony Bonato tweet media
English
165
2.2K
22.9K
1.2M
Akendo retweetledi
lcamtuf
lcamtuf@lcamtuf·
Data structures In CS books / In reality
lcamtuf tweet medialcamtuf tweet media
English
2
17
122
7.9K
Akendo retweetledi
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
When I look at this table, the first thing I see is that size matters more I reckon users prefer being told: „use a password with at least 10 letters“ instead of „use at least 8 characters, lower and upper case letters, numbers and symbols“ hivesystems.com/blog/are-your-…
Florian Roth ⚡️ tweet media
English
40
102
356
77.1K
Akendo retweetledi
Greg Linares (Laughing Mantis)
Greg Linares (Laughing Mantis)@Laughing_Mantis·
This type of AI abuse will be used by threat actors ASAP. Does your security team have a playbook for identifying, countering and mitigating this from targeting your users and execs? Implement secret phrases or secret physical items that can be used to verify identity.
Prakash@8teAPi

This is AI It’s so over

English
29
141
676
134.1K
Akendo retweetledi
Devansh (⚡, 🥷)
Devansh (⚡, 🥷)@0xAsm0d3us·
If you, like many, think relying just on `cat` command's output is enough to be sure about the integrity of a bash file. Think twice, you could get hacked. Read below 👇
Devansh (⚡, 🥷) tweet media
English
72
475
3.5K
945.5K
Akendo retweetledi
Soren Iverson
Soren Iverson@soren_iverson·
Just when I thought I’d seen it all
Soren Iverson tweet media
English
57
288
5.1K
390.3K
Akendo retweetledi
Phil Eaton
Phil Eaton@eatonphil·
> Data Structures for Data-Intensive Applications: Tradeoffs and Design Guidelines New book dropped (And the full PDF is available too I guess) cs-people.bu.edu/mathan/publica…
Phil Eaton tweet media
English
10
127
831
64.5K
Akendo retweetledi
Andreas Kling
Andreas Kling@awesomekling·
Time spent making this image: 2 minutes Time spent explaining the joke to my wife: 8 minutes
Andreas Kling tweet media
Jarred Sumner@jarredsumner

@awesomekling you can fit so much stuff in the unused bits within a 64 bit pointer

English
8
48
739
94.4K
Akendo retweetledi
dragosr
dragosr@dragosr·
Interesting new Docker vulns and escapes that might be accessible from malicious containers during build: CVE-2024-21626: vulnerability in runc with race condition in WORKDIR instruction, enabling container breakout and root RCE by manipulating file descriptors to access the host's filesystem, affecting both docker build and docker run. CVE-2024-23651: TOCTOU vulnerability in --mount=cache flag during a RUN command allows a symlink to bind mount, an a root host RCE, during docker build. CVE-2024-23653: Inadequate validation of the StartRequest.SecurityMode in custom Buildkit LLB generators, permitting creation of privileged container resulting in host root RCE during docker build. CVE-2024-23652: Arbitrary during build when RUN --mount is used; if the mount's target path is altered to a symlink, can delete host directories during docker build snyk.io/blog/leaky-ves…
English
2
9
20
7.1K