Russell Howe

14.7K posts

Russell Howe banner
Russell Howe

Russell Howe

@rhowe212

Cycling, eating, LFGSS, gardening. Mostly deleting things. 没有为什么. Also same handle on bsky

London, England Katılım Ağustos 2016
707 Takip Edilen308 Takipçiler
Sabitlenmiş Tweet
Russell Howe
Russell Howe@rhowe212·
See latest tweet
Enfield, London 🇬🇧 English
0
0
3
0
Russell Howe
Russell Howe@rhowe212·
docker-proxy, just why?
English
0
0
0
5
Corey Quinn
Corey Quinn@QuinnyPig·
@SMT_Solvers For CI/CD workloads, suddenly the Mac builds aren't an audit exception case anymore. But for nearly $10K a month I'll do the fucking exception paperwork.
English
2
0
20
1K
Russell Howe retweetledi
Adam
Adam@adamdotdev·
It's 2026 and your CEO just sent you a 2,400 line pull request. You get a cup of coffee and sit down to review it. It's a disaster. A dozen unrelated refactors. Unused methods with names like `convertFromBase10` and `normalizeBeforeSerialization`. You catch a few hardcoded API keys, but that's ok. It's part of the dance. They didn't consider that someone might look at this diff. Here's a comment buddy. They respond in an hour (after Copilot, qodo, CodeRabbit and Greptile finish their reviews) saying we shouldn't worry about "implementation details" anymore, those are relics of the past. Hey let's jump into a room and figure it out. We can't just agree to disagree, this is probably my last job in tech and I can't watch this fucker burn the place to the ground. The PR merges and goes to prod. You feel a shared sense of apathy and dread with Hannah the intern (she has to review his AI generated social media posts ever since Grok got too imaginative). That night you go to sleep and have nightmares of that code. You can still see the shapes of it on the backs of your eyelids. You go to work the next day ready to quit. You no longer understand the system. There is no foundation. Time to use those savings and an SBA loan to buy a liquor store and never login to GitHub again.
staysaasy@staysaasy

It’s 2018 and your coworker just sent you a 400 line pull request. You get a cup of coffee and sit down to review it. It’s beautiful. Elegant micro-refactors. Crispy method names. You catch a few things, but that’s ok. It’s part of the dance. They didn’t consider extensibility on part of their API. Here’s a comment buddy. They respond in an hour saying they think we should do one piece differently than your comment. Hey let’s jump into a room and figure it out. We can’t just agree to disagree, this code is too important. The PR merges and goes to prod. You feel a shared sense of ownership and accomplishment. That night you go to sleep and dream of that code. You can still see the shapes of it on the backs of your eyelids, your IDE syntax highlighting sparking neurons in your reptile brain. You go to work the next day ready to go. You understand the system. N is your foundation. Time to build n+1.

English
93
263
4.4K
391K
Russell Howe
Russell Howe@rhowe212·
This plus the dnsmasq vulns. Good job DNS is a niche protocol
International Cyber Digest@IntCyberDigest

‼️🚨 Microsoft has patched a critical Windows DNS Client remote code execution vulnerability that allows an unauthorized attacker to execute code over a network. All it takes is a malicious DNS response. The vulnerability is tracked as CVE-2026-41096 with a CVSS score of 9.8. It is a heap-based buffer overflow in dnsapi.dll, the Windows component that processes DNS answers on every machine. To trigger it, an attacker needs a position where they can influence DNS responses: a rogue DNS server, a poisoned resolver, a compromised router, hostile WiFi, or a man-in-the-middle placement. That puts ordinary Windows DNS activity in the blast radius. Browsers, VPN clients, enterprise apps, update checks, and background services constantly ask DNS where to connect. The vulnerable processing sits in the Windows DNS Client path, not an edge-facing server product. Microsoft assessed exploitation as "less likely," and Rapid7 lists the issue as not publicly disclosed and not known to be exploited at release. On the contrary, a 9.8 unauthenticated network RCE in DNS client handling is exactly the kind of bug defenders should assume will be reverse-engineered quickly. Defenders should: - Deploy the May 2026 cumulative updates and confirm coverage across endpoints and servers - Restrict DNS traffic to trusted resolvers where possible - Monitor Dnscache and svchost.exe for abnormal child processes or unexpected outbound activity - Treat public WiFi and untrusted resolver paths as higher-risk until patching is complete

English
0
0
0
57
Russell Howe retweetledi
Apparent Order
Apparent Order@apparentorder·
@realchrisebert The AWS Sustainability service is only for customers. 🙃
English
0
1
0
18
Cycleway, my arse! @issaddlethereis.bsky.social
I dread turning into Tabernacle St (#Cycleway13) every single time I cycle home from the office. And not for the usual reasons (traffic). The carriageway surface worsens by the week. Sunken and raised ironworks, potholes, poor repairs, cracks, the lot! @IslingtonBC doesn't care.
English
7
0
11
1K
Rebane
Rebane@rebane2001·
i set up a new vps at some weird provider and they sent me an e-mail with my vps credentials the root password said N/A, so you'd think that there's no root password by default. BUT NO! THE ROOT PASSWORD IS LITERALLY "N/A"!! AND SSHD IS EXPOSED ON PUBLIC IPV4?? THE FUCK ??
Rebane tweet media
English
78
46
2K
94.2K
Russell Howe retweetledi
Anon Opin.
Anon Opin.@anon_opin·
All software used by government must be open source. If it's not already open source, the publisher should have to publish the code in order to get the contract.
English
12
15
125
13.7K
Russell Howe
Russell Howe@rhowe212·
@rolandbouman I don't read the output because I trust compilers and the people who make them and if I see behaviour I don't understand there will at some point most likely be a rational explanation. That's not really the case for a model
English
0
0
0
31
Russell Howe retweetledi
Paul Vixie
Paul Vixie@paulvixie·
I'm now unemployed. I hear that the oss community is buried in AI bug reports and don't have enough people to triage and verify. Where is the sign up sheet?
English
17
46
309
77.2K
Russell Howe retweetledi
Casey Muratori
Casey Muratori@cmuratori·
Just want to make sure I'm reading this right: Microsoft rewrote the run dialog with performance "top-of-mind", and the best they could manage to do when putting up a single text box was 10fps?
Casey Muratori tweet media
English
159
85
2.3K
378.9K
Russell Howe retweetledi
rekdt
rekdt@rekdt·
@FeiKhal Back in those days we didn’t have a fancy robot telling us how to push bad code. We had to generate it the old fashioned way, with pure unadulterated incompetence
GIF
English
4
8
60
821
Russell Howe retweetledi
Brad Spengler
Brad Spengler@spendergrsec·
Upstream's covering up of security information they're aware of at time of commit is directly related to why your distros have no fixes for the copy.fail vuln. Completely irresponsible.
English
4
20
89
12.9K