Installation of a KDE theme wiped a user`s data.
A KDE global theme has wiped all data from a user`s machine. This is a bad look for KDE.
A KDE global theme has wiped all data from a user`s machine. This is a bad look for KDE.
How much data storage would an ISP need to store all data on customers for 2 years?
How to parse a JSON file using jq on Linux.
A ChatGPT bug allowed users to download data from the chat bot.
There has been another data breach at Sony, source code has been stolen.
The Australian Federal Police has suffered an embarrassing data breach. This is not the last either.
More very useful script samples for creating a very nice Arma 3 mission.
Cybersecurity is more important than ever in 2022. Take steps today to be more secure.
Telstra data breach is another blow to consumer confidence. This is not good in 2022.
Using redirection on the command line is very easy to do. The main strength of the UNIX command line is that you may output data from one command-line application to another. Here is one example. ls -hula | lessls -hula | less This is using the pipe character to pipe the output of the ls(1) … Read more
Confidential Samsung data leaked in a massive breach, this includes the content below. DEVICES/HARDWARE -Source code for every Trusted Applet (TA) installed on all Samsung device’s TrustZone (TEE) with specific code for every type of TEE OS (QSEE, TEEGris etc) THIS INCLUDES DRM MODULES AND KEYMASTER/GATEKEEPER! -Algorithms for all biometric unlock operations, including source code … Read more
The databases and internal software of the Twitch video streaming platform have been leaked on the Internet. Twitch is an American video live streaming service that focuses on video game live streaming, including broadcasts of esports competitions, operated by Twitch Interactive, a subsidiary of Amazon.com, Inc. This leak includes the following. Entirety of twitch.tv, with … Read more
The account data of 500 million users of the social networking website LinkedIn is for sale on a hacker`s website. This goes to show that you cannot trust any website with your details if they have poor OPSEC. You are better off networking by meeting with others at trade shows and exhibitions. There you may … Read more
The leaked Facebook data is from 2019, this has been passed around for a long time before this became public. Many accounts may not even be in this, it is nearly 3 years old now. There are 105 countries in this, not 106. But the point is that the data is not new and was … Read more
The leaked Intel files contain a lot of information about the Intel Management Engine as well as a few Linux test utilities and source code. This is very interesting, I wonder how this was leaked. But the company`s image might be tainted by this leak, I mean how did it occur and how much damage … Read more
Reading ID3 data from an MP3 file on Linux is very easy with the ffmpeg suite. The ffprobe command can do this very easily. This example will return the title and artist of the MP3 file. 4.4 Mon Mar 02 jason@Yog-Sothoth 0: $ ffprobe -loglevel quiet -show_entries format_tags=artist,title 02\ Snake\ Hips.mp3 [FORMAT] TAG:title=Snake Hips TAG:artist=The … Read more
I have been researching a system for deploying a database cluster. I have chosen the Microsoft SQL Server product. This does support server clustering and uses nodes clustered together on a network to create a failover network that will automatically maintain operation if one node is to fail. A virtual network of database nodes spread … Read more
I have been researching a system for deploying a database cluster. I have chosen the Microsoft SQL Server product. This does support server clustering and uses nodes clustered together on a network to create a failover network that will automatically maintain operation if one node is to fail. A virtual network of database nodes spread … Read more
Theresa May is trying to make encryption illegal in the UK. She wants Content Service Providers to use Deep Packet Inspection to analyze the data sent over provider networks using probes embedded in the packet flow over the network. The Home Office seemed confident that this was technically possible. Other witnesses questioned whether it is … Read more
Mandatory data retention laws passed the senate this week. The premise is to fight against Islamic terrorist attacks by retention of ISP customer data. But this will not work out right from the start. ISP`s are confused by the 400 page document that outlines what they must retain, and they are not ready to capture … Read more