Steve. If that really is your name.

845 posts

Steve. If that really is your name. banner
Steve. If that really is your name.

Steve. If that really is your name.

@ITd00d

Every once in a while I think about how many progress bars I've watched over the years.

Sunny Florida Katılım Aralık 2021
319 Takip Edilen32 Takipçiler
Steve. If that really is your name. retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 Microsoft calls this "intended behaviour," so here we go. How to dump the credentials of every user stored in Microsoft Edge: 1. Open Edge. Don't browse anywhere, just open it. 2. Flip to Task Manager, find Edge, expand the task. 3. Highlight the "browser" sub-task, right-click, and choose "Create Memory Dump." 4. Open the dump file and look for credentials. The logged-in Windows user can dump every stored Edge credential with no additional rights. Which means any malware that user executes has those credentials for the asking. Thanks to Rob VandenBrink at SANS: isc.sans.edu/diary/32954
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
292
2.4K
13.5K
1.1M
Steve. If that really is your name. retweetledi
KITKAT
KITKAT@KITKAT·
Help us find them. Use the Stolen KitKat Tracker. Link in bio.
KITKAT tweet media
English
6.2K
12.1K
116.1K
14M
DebugPrivilege
DebugPrivilege@DebugPrivilege·
To be honest, this is why I avoid the US at all costs. I’ve been there a couple of times and the people are lovely, but the tipping culture is just nuts. You better start learning cooking though. Food is insanely overpriced imho
English
9
0
26
5.3K
Windows Latest
Windows Latest@WindowsLatest·
Microsoft just turned the Microsoft 365 Copilot app for mobile into a Copilot chamber with a new feature that auto-uploads local files to OneDrive and Copilot when you actually try to view the document. "Opening documents from your device now starts with Copilot chat," Microsoft warned. This means that if you open any local file on Android and Microsoft 365 Copilot is set as the default app, it will first send your file to OneDrive. Then, OneDrive will send it to Copilot for summary, and you can finally open the file in the document viewer from Copilot's references tab.
Windows Latest tweet media
English
72
77
409
35.3K
Finn McKenty
Finn McKenty@thefinnmckenty·
Why did we forget how to make websites like this?
Finn McKenty tweet media
English
568
252
3.6K
686.5K
Steve. If that really is your name. retweetledi
Grzegorz Tworek
Grzegorz Tworek@0gtweet·
What do the ❌ Application Event Log, ❌ System Event Log, ❌ Sysmon Event Log, ❌ monitoring tools, ❌ and some EDRs have in common? They all rely on ETW listeners! Close their listeners with ControlTrace() and they will stop reporting. Or just close all listeners in your system with a shiny new toy: github.com/gtworek/PSBits…
Grzegorz Tworek tweet media
English
8
78
362
37.5K
Steve. If that really is your name. retweetledi
gabsmashh
gabsmashh@gabsmashh·
i saw someone use ai;dr earlier in response to a post and i think we need to make this a more widely-used abbreviation
English
71
1.7K
18.9K
507.8K
Steve. If that really is your name. retweetledi
Sos "Wishlist Lazy Kickers" Sosowski
Remember when Windows added a new “Notepad” app with CoPilot and forced the good old notepad.exe to open the new app instead of itself even if you don’t want it? Well, a new feature just dropped.
Sos "Wishlist Lazy Kickers" Sosowski tweet media
English
58
701
8.1K
191.5K
Steve. If that really is your name. retweetledi
vx-underground
vx-underground@vxunderground·
Big news on the internet today as the United States Department of Justice wildly underestimated computer nerds Mahmoud Al-Qudsi (@mqudsi), the founder of NeoSmart Technologies, is a nerd who specializes in computer forensics. His entire career (dating back over 2 decades) has been focused almost exclusively on data forensics, data restoration, and data backups. Because Mr. Al-Qudsi is a nerd who unironically enjoys painstakingly reviewing computer forensics at the byte level, something almost no one else on the planet enjoys, Mr. Al-Qudsi began exploring the recently released Epstein files. Today he released a write-up explaining the problems with the Epstein redactions, errors they left in the PDF files, ... and all sorts of other artifacts the Department of Justice accidentally left behind. By leveraging these different digital artifacts, it is possible for experts such as Al-Qudsi to reconstruct the files without their redactions. See subsequent post for his write-up tl;dr he's reverse engineering and reconstructing epstein files. but hard and will take lots of work pic: me trying to understand computer forensics based on fonts used
vx-underground tweet media
English
146
1.5K
11.7K
373K
RossRadio
RossRadio@cqcqcqdx·
Some drill operator just brought up a mile of Broadband Infrastructure 🥴
RossRadio tweet media
English
365
369
12.9K
471.8K
Kr$na
Kr$na@krishdotdev·
Peak Capitalist Product Strategy: - They removed SD card slots to make you pay for cloud storage. - They removed 3.5mm jacks to make you buy their TWS ear buds. - They removed chargers in the name of eco-friendly so you pay extra for chargers. - They removed ports to make you purchase their dongles and hubs. - They removed repairability for selling replacements. - They removed ownership to sell their subscriptions.
Kr$na tweet mediaKr$na tweet mediaKr$na tweet mediaKr$na tweet media
English
342
8.2K
43.1K
1.4M
Jessie Frazelle
Jessie Frazelle@jessfraz·
seems a bit hypocritical that the folks who scraped all the internet to train their models, now want a cut of what it creates, but aren't willing to pay for what they scraped...?
Jessie Frazelle tweet media
English
128
374
2.7K
96.2K
Steve. If that really is your name. retweetledi
sudox
sudox@kmcnam1·
sudox tweet media
ZXX
90
1K
7.6K
78.4K
vx-underground
vx-underground@vxunderground·
Malware researcher banned from Twitch. The ban cites a VOD from January 1st, 2001, despite Twitch officially going live as a spin-off of JustinTV in June, 2011. They state Azaka is underage, despite Azaka being an adult, a long time Twitch affiliate, and Twitch having Azaka's government issued identification and tax information. This is most likely the result of an automated system incorrectly flagging Azaka as a minor (???) and Twitch staff failing to do due diligence. Alternatively, Azaka is a time traveler, from multiple dimensions, and exists as a child in another universe where Twitch went live in 1999. Hence, his ban is spread across the entire Twitch multiverse.
安坂星海 Azaka || VTuber@AzakaSekai_

i'm shaking so badly right now from this anxiety attack i NEED TO TALK TO SOMEONE AT TWITCH THIS INSTANT you HAVE MY TAX INFORMATION AS AN AFFILIATE WHAT DO YOU MEAN

English
78
936
15.9K
796K
Steve. If that really is your name. retweetledi
Abakcus
Abakcus@abakcus·
If you divide 1 by 998,001 you get all three-digit numbers from 000 to 999 in order, except for 998.
Abakcus tweet media
English
217
1.9K
27.4K
1.4M
Steve. If that really is your name.
@lauriewired Prediction: These ai data centers are just the next peice of the puzzle to own nothing. Our operating systems will be in the cloud, and we're back to 'dumb' terminals. We're losing the ability to self compute quickly.
English
0
0
0
13
LaurieWired
LaurieWired@lauriewired·
Prediction: 2026 is going to be the year Memory Tiering eats the world. The pieces are already there: - Memory Shortage (duh) - CXL 3.1 realistically purchasable (memory pooling) - Linux Transparent Page Placement becomes opt-out instead of opt-in - Kubernetes DRA (dynamic resource allocation) graduated to stable - systemd-oomd kill threshold getting smarter All of these are building on each other to allow extreme over-provisioning of ram on hyperscalers. You might think your cloud instance has 128gb of RAM…it could be only 32GB of real DRAM. It’s just really, really clever. I’ll be writing a series over the next few days on each of these, stay tuned!
LaurieWired tweet mediaLaurieWired tweet media
English
105
226
3.8K
518.7K
Steve. If that really is your name. retweetledi
Steven Lim
Steven Lim@0x534c·
📷𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗠𝗦-𝗣𝗵𝗼𝘁𝗼𝘀 𝗨𝗥𝗜 𝗡𝗧𝗟𝗠 𝗟𝗲𝗮𝗸 𝗗𝗲𝘁𝗲𝗰𝘁𝗶𝗼𝗻 The MS Photos URI scheme can be abused to leak NTLMv2 hashes with nothing more than a single browser click. This technique was highlighted by security researcher Ruben Enkaoua. github.com/rubenformation… Microsoft has assessed this behavior as non-vulnerable, and therefore no CVE has been assigned. Nonetheless, the method remains a practical avenue for threat actors to capture a user’s NTLM credentials. To help defenders stay ahead of potential abuse, I’ve developed a custom Defender XDR detection rule designed to monitor and flag suspicious activity involving this URI scheme. I’m sharing this detection logic with the community to support broader monitoring and awareness.🫡 #Cybersecurity #NTLMLeak #ThreatDetectio
Steven Lim tweet media
English
1
38
200
18.9K