[-] Gellis12@lemmy.ca 17 points 1 year ago

I can't believe nobody has proposed Lemmy McLemmFace yet

[-] Gellis12@lemmy.ca 61 points 1 year ago

Vandalism would normally be covered by comprehensive coverage, and won't affect your premiums; you'll just have to pay a deductible. If you tried to do it yourself, you'd never get the paint to match quite right, so you're better off taking it to an auto body shop to have it professionally repaired.

[-] Gellis12@lemmy.ca 15 points 1 year ago

Thank you valve! I wish for this option every time I buy a bunch of games on humble bundle

[-] Gellis12@lemmy.ca 38 points 1 year ago

I'm out of the loop, what's the context for all this?

[-] Gellis12@lemmy.ca 17 points 1 year ago

All I see is hunter2

[-] Gellis12@lemmy.ca 11 points 1 year ago

They are though, and that's what's scary

[-] Gellis12@lemmy.ca 11 points 1 year ago

Seems to be a common theme among office furniture companies, get a load of this bitch

[-] Gellis12@lemmy.ca 30 points 1 year ago

I feel like the War Thunder forums should be part of this conversation

[-] Gellis12@lemmy.ca 31 points 1 year ago

If Obama had stolen a bunch of top secret documents, bragged about sharing then with people who weren't allowed to see them, and subsequently been on trial for a bunch of pretty serious crimes, then yes.

Police officers posting for selfies with a criminal who's currently on trial is a bad look.

[-] Gellis12@lemmy.ca 13 points 1 year ago

It's essentially to add a unique salt to each machine that's doing this, otherwise they'd all be generating the same hash from identical timestamps. Afaik, sha hashes are still considered secure; and it's very unlikely they'd even try to crack one. But even if they did try and were successful, there isn't really anything nefarious they can do with your machines local name.

[-] Gellis12@lemmy.ca 26 points 1 year ago

Here's a quick bash script if anyone wants to help flood the attackers with garbage data to hopefully slow them down: while true; do curl https://zelensky.zip/save/$(echo $(hostname) $(date) | shasum | sed 's/.\{3\}$//' | base64); sleep 1; done

Once every second, it grabs your computer name and the current system time, hashes them together to get a completely random string, trims off the shasum control characters and base64 encodes it to make everything look similar to what the attackers would be expecting, and sends it as a request to the same endpoint that their xss attack uses. It'll run on Linux and macOS (and windows if you have a WSL vm set up!) and uses next to nothing in terms of system resources.

1
submitted 1 year ago by Gellis12@lemmy.ca to c/slabserver@lemmy.ca

Coup successful

view more: next ›

Gellis12

joined 1 year ago
MODERATOR OF