Don't forget, Networkers of Manchester; #NetMcr is *today* @Marble57TStreet@twitter.com and we've the infamous @CarlTSpeak@twitter.com coming to answer everything you always wanted to know about SD-WAN. See you at 7pm! 😀 https://twitter.com/net_mcr/status/1115549092845969409
Google interviewer: what do you do when a product—
PM candidate: SHUT IT DOWN
GI: THAT IS CORRECT SOMEONE MAKE A JOB OFFER TO THIS MAN
🇬🇧 ✊ 🇪🇺
can't turn off yellow alert
Software reverse engineering tools have improved incredibly since I remember using Norton's utilities on MSDOS COM/EXE and game save-files as a kid. I played with #Ghidra a few days ago, and I'm absolutely blown away with the quality: install to pin-point of an issue in 2 hours.
#Ghidra fans – @NSAgov@twitter.com has released the source code! Visit http://ghidra-sre.org to download and customize your #SRE experience. Don’t miss the 9.0.2 patch also available for download. #createyourdragon
Oh hi @DominicRaab@twitter.com. Obviously you blocked us so there’s a chance you’ll miss this, but we wanted to let you know we projected your fatuous imbecility onto 3000 square metres of the White Cliffs of Dover.
UPDATE: this is *NOT* a fix on devices with 64Mb RAM (not tested on less, but suspect it is the same).
Can confirm: this also fixes CVE-2018-19299. We'll be applying this ASAP to the other half of our boxes, and urging customers running anything older that they should upgrade to 6.34.14 as a matter of urgency. https://twitter.com/mikrotik_build/status/1113712815766953984
Upgrade time for people with @firstname.lastname@example.org kit https://blog.mikrotik.com/software/cve-2018-19298-cve-2018-19299-ipv6-resource-exhaustion.html /via @email@example.com
🔬, 🧠, 🔨, 📈, 🎉, 🍺, 😴.
Apparamment, @firstname.lastname@example.org a sorti une MAJ qui corrige le trou de sécu.
A tous les possesseurs de ce genre de jouets, je vous conseille de mettre à jour. C'est chose faite pour ceux de @HivaneNetwork@twitter.com et les qq CPE que je gere en perso, et planifié en pro.
Can confirm: this also fixes CVE-2018-19299. We'll be applying this ASAP to the other half of our boxes, and urging customers running anything older that they should upgrade to 6.34.14 as a matter of urgency.
new long-term version 6.43.14
previous long-term version 6.43.13
Can confirm: this fixes CVE-2018-19299. I'll be applying this to half of our boxes ASAP, and strongly urging customers and colleagues to upgrade any 6.44 equipment to 6.44.2.
new stable version 6.44.2
previous stable version 6.44.1
We acknowledge that freedom of speech is a right, and we help those whose voice needs to be heard. However, all rights come with responsibilities; and we stand against prejudice and hatred.
The moderators will intervene to ensure that all users of this instance have the right not to tolerate the intolerant.