I am retiring this social media account. Find me as @hal_pomeranz@infosec.exchange

Orlando, FL
Joined November 2008
Filter
Exclude
Time range
-
Near
While @JBeanDesign appreciates everything I’ve been getting done around the house, somebody PLEASE pull me in on some interesting casework! #DFIRMrMom
2
Replying to @k8em0
At least they are making it easy to say “No”?
2
Replying to @bettersafetynet
Middle ground doesn’t sell advertising
1
4
Replying to @TimMedin
You gonna eat all that?
1
Replying to @horrible_site
Corporate InfoSec is vastly more complicated than locking a car door, and is not a core business function for most companies. They’ll never get pro-active about security to any meaningful level. Maybe they shouldn’t have to.
I'm getting extremely fed up with the victim-blaming in InfoSec. Nobody has a security budget that exceeds their attack surface, and few companies have sufficient staffing. So who's "fault" is that breach exactly?
3
2
25
Upgrade to a new iPhone for "free" with trade-in... as long as you agree to the 36-month installment plan during which your phone is carrier locked (inluding the eSIM). I'm calling BS on you @ATT.
1
8
Replying to @MalwareJake
Multi-year advent calendar
1
3
Coming soon to WWHF training— a two-day course full of Linux Command-Line goodness. And oh yes, there will be sed and awk!
1
3
Wow, I wrote this 10 years ago. A friend used it today to mount an encrypted Linux image. Evergreen content. deer-run.com/users/hal/CEIC-…
3
19
Replying to @MarkSimos
Interesting. Does that count as two moves?
1
Replying to @hennovanarkel
Wow, OK, make that four valid solutions!
1
6
Replying to @crash0ver1d3
The third solution is in the thread
1
Replying to @carloslacasa
Interestingly, that was the last of the three solutions that I saw.
Move one rod to make this a true mathematical equation. I know of three valid answers.
13
2
1
18
However the initial connection with -N and port forwarding does log your source IP server side. The sudo command is logged. It’s not like you’re invisible. And if you were planning on deleting the logs anyway, then you are just wasting time (and are vulnerable to remote logging).
Replying to @hacks4pancakes
“It’s not having what you want. It’s wanting what you have.”
5