dmesg of NetBSD/hppa 9.2 (patched) on HP 9000/712/60
We went to visit Fondation Beyeler another time yesterday - it seems the Life installation will be closed down after the next weekend? Still free after 21:00 in the evening. Was way more crowded, which made it harder to take photos. Some areas were overgrown with water plants this time around.
Heh. The Synology stayed up too. Wonder what the hell that was.
On the up side, my DSL line is now back to syncing at 50/10 instead of 25/10, like in the few days before... 😕
Got this cheap plastic keyboard for free with a refurbished PC I bought a few years ago… It‘s kind of German layout, but with two super annoying changes (the # key is out of place next to a smaller backspace instead of where it belongs between Ä and return - and all the keys are one row down in the navigation block in favour of those additional power/sleep buttons above).
Totally defeats my muscle memory…
"It means every instance of Kaspersky Password Manager in the world will generate the exact same password at a given second. This would be obvious to spot if every click on the “Generate” button, in the password generator interface, produced the same password. However, for some reason, password generation is animated: dozens of random chars are displayed while the real password has already been computed. This animation takes more than 1 second, so it is not possible to click several times on the “Generate” button within a second. That is definitely why the weakness had not been discovered before."
I have a story here.
My teams do a lot of work on detection of botnet activity, and when this first hit, we were very confused because we would normally expect to catch some metadata that would have given some evidence to work with.
We had nothing.
We were second guessing our system, then we realized that unlike most Revil strikes, the botnet was Kaseya itself.
I have long pointed to systems like this basically being the same as a rootkit.
I think that the issue here is that so many orgs farmed that out. You can do compliance reviews all day long, but they won’t catch this.
I would advise a few things.
Endpoint protection is the final ring of defense, intended to stop this sort of thing. Do not simply create directory exemptions to support CM systems like Kaseya.
Strong acls on backup providers… nothing runs under built-in accounts for this.
I see a lot of people talking about windows defender bypasses with this, but it you had a stronger EDR in play, that could’ve stymied the encryption effort.
Ultimately, if we have MSSPs that are this big, we will end up with abuse of them as a botnet. A lot of smaller companies are overall better off with the MSSP mode for CM… so we need to make sure that these providers are held to a higher standard. Regular SAST/DAST, quarterly/monthly pentests. Better SOC/threat hunting within The MSSP.
Isolated client environments.
These are fundamentals, but they are seriously key things that obviously were not up to snuff.
Jason Miller's new right-wing social media site "Gettr" was hacked this morning.
Okay I found it...
mstdn.social is getting BLASTED with request from these nasty GTA5 servers with the address: "https://nui-game-internal/"
Would blocking that "domain" work..?
Found a service manual online that seems to match what I'm seeing. There are a few interesting things going on on that PSU board.
The power LED is driven directly by the unregulated AC. A little crude, maybe? But, hey, sure.
+12V and -5V regulation is your typical 7800 (U1) / 7900 (U2) series jobs, except it's a little unusual to see such heavy filtering on the input side (there are 3 pi-filters in low-pass configuration).
But the main +5V section gets complicated. No less than 2 ICs are at work here - U3, a 14 pin specialised precision voltage regulator (UA723CN) and U4 a differential comparator (TL331CP). Looking at the UA723 datasheet there's a lot of different regulation topologies it can be applied in. The details of this section are a little over my head, but it seems to actually be a switching ("buck") application, with the TL331 controlling the output voltage based on a zener reference. Pretty involved for the time and market!
So you know how the 1541 has a 6502 in it? (it's basically a computer in a disk drive, but it has no display...)
Here's a demo, and a writeup about the demo, on how to make a demo for a 1541 disk drive.
and have it display stuff.
Mind you the start of the demo showed cutting cables and I was very "NOOOooOOOO don't damage the equipment" so I hope people make custom cables instead of damaging cables but that's me
generic computer and internetworking geek
network and systems administration, infosec, retrocomputing
The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!