Sprite970's profile picture. 锁推必BAN

Sprite

@Sprite970

锁推必BAN

大企业不都是这样吗,美国大多数企业也是这样的policy

据内部人士爆料,快手研发线紧急限制Cursor、Claude Code等第三方编程工具使用,办公端直接闪退,仅特殊需求可申请严格审核。核心原因是防范内部代码、业务逻辑通过AI工具泄露。 你怎么看?



这东西怎么越看越像国内搞黑产的猫池…?

The Secret Service dismantled a network of more than 300 SIM servers and 100,000 SIM cards in the New York-area that were capable of crippling telecom systems and carrying out anonymous telephonic attacks, disrupting the threat before world leaders arrived for the UN General…

SecretService's tweet image. The Secret Service dismantled a network of more than 300 SIM servers and 100,000 SIM cards in the New York-area that were capable of crippling telecom systems and carrying out anonymous telephonic attacks, disrupting the threat before world leaders arrived for the UN General…
SecretService's tweet image. The Secret Service dismantled a network of more than 300 SIM servers and 100,000 SIM cards in the New York-area that were capable of crippling telecom systems and carrying out anonymous telephonic attacks, disrupting the threat before world leaders arrived for the UN General…
SecretService's tweet image. The Secret Service dismantled a network of more than 300 SIM servers and 100,000 SIM cards in the New York-area that were capable of crippling telecom systems and carrying out anonymous telephonic attacks, disrupting the threat before world leaders arrived for the UN General…


Sprite сделал(а) репост

Babylon Bee ftw

ConceptualJames's tweet image. Babylon Bee ftw

当年这些人为了盗刷QB不仅仅是用互联星空,好多孩子带着便携电话,带着鳄鱼夹子的那种到老小区一楼的交换箱盗打电话冲QB

这种行为是入侵+盗窃吧,V2EX还有人敢发出来炫耀 不过这也是中国👮很多时候都对于小偷小摸小骗等事情的不作为的结果

changwei1006's tweet image. 这种行为是入侵+盗窃吧,V2EX还有人敢发出来炫耀
不过这也是中国👮很多时候都对于小偷小摸小骗等事情的不作为的结果


不是很理解, 猪肝红护照搞网络军火不是给自己找麻烦么?

寻求合作打造网络军火商团队 有意的私信联系

yuange75's tweet image. 寻求合作打造网络军火商团队

有意的私信联系


What a 🤡

Update: Crowdstrike came out and released a technical report confirming my analysis. They were reading in a bad data file and attempting to access invalid memory. This global crash was a two-part bomb. The detonator apparently, was NOT new.. it was PRE-INSTALLED. /1



Sprite сделал(а) репост
UK_Daniel_Card's tweet image.

推特真的是啥人都有,各种评论CrowdStrike的妖魔鬼怪,各种“内核大神”真是层出不穷啊。懂得真多呢🤔


Sprite сделал(а) репост

This is what hell looks like according to AI


同意。如果不是当年看到墨西哥讲话,我不可能把出国重新提上日程。

天朝现在的命运在墨西哥讲话的时候已经被决定了。



独立各服务+1 AIO的话,容易一台机器爆炸所有的服务全爆炸….

Этот твит больше недоступен.

Sprite сделал(а) репост

在一个独立开发者的交流群里,看到有人问,做好了 Chrome 插件,如何实现免费/付费的接入,他不想过于复杂地折腾 OAuth 登录和支付模块,在研究 Chrome 插件排行榜(extpose.com/top-grossing)的时候,恰好看到一个有趣的玩法: 1)在后端实现一个最简单的邮件注册和登录模块,用于记录用户付费状态…

Barret_China's tweet image. 在一个独立开发者的交流群里,看到有人问,做好了 Chrome 插件,如何实现免费/付费的接入,他不想过于复杂地折腾 OAuth 登录和支付模块,在研究 Chrome 插件排行榜(extpose.com/top-grossing)的时候,恰好看到一个有趣的玩法:

1)在后端实现一个最简单的邮件注册和登录模块,用于记录用户付费状态…

Sprite сделал(а) репост

I had an inquiry about ACPI checks, and decided to run through how they work and how to mitigate them on VMware and QEMU. It's a quick and dirty write-up, so excuse the brevity. revers.engineering/evading-trivia…


Sprite сделал(а) репост

⛓️#BlackLotus bootkit illustrates how the UEFI ecosystem supply chain complexity negatively impacts the industry. EFI bootloader tricks from 10+ years ago still work over new Secure Boot bypasses (CVE-2022-21894). @TheWack0lian PoC: github.com/Wack0/CVE-2022…

#ESETResearch analyze first in-the-wild UEFI bootkit bypassing UEFI Secure Boot even on fully updated Windows 11 systems. Its functionality indicates it is the #BlackLotus UEFI bootkit, for sale on hacking forums since at least Oct 6, 2022. @smolar_m welivesecurity.com/2023/03/01/bla… 1/11



我是在自己内网里跑一个ESXi,然后把这些国产软件放到虚拟机里运行,如果需要访问桌面只需要3389登进去就好。

Этот твит больше недоступен.

Sprite сделал(а) репост

“Mais que diab….”


Sprite сделал(а) репост

Some crazy idiot did it! #w2k3builder v1 released! a virtual machine for debugging and building your own version of Windows 2003 (using leaked microsoft src). Batteries included. via @w2k3builder vimeo.com/759543579


Sprite сделал(а) репост

Intel AlderLake Gen 12 (Desktop/Laptop) BIOS firmware leaked: * Tooling for tweaking BIOS images * Insyde's framework for customization (compatible with EDK2) * Intel reference code and OEM's implementation * Binary blobs: Intel CSME, ACMs (including the one for BootGuard)


垃圾国家

因为转发了社工信息而坐牢的例子 shuax.com 1. 不要乱发东西。 2. 有事第一时间请律师。

taresky's tweet image. 因为转发了社工信息而坐牢的例子 shuax.com

1. 不要乱发东西。
2. 有事第一时间请律师。


Loading...

Something went wrong.


Something went wrong.