×
The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.
On 8/7/2018 10:48 AM, Rob Berendt wrote:
One might argue that by not posting the hackers guide you do not encourage
people to lock their system down better. But you are entitled to your
opinion and I respect that.
Did you know that threads from midrange.com are mirrored on Twitter?
https://twitter.com/midrangecom/status/1026844342533713921 One doesn't
need a Twitter account to see these.
Bots and scrapers abound here, on Twitter, everywhere; the threat
surface is very large. I personally (that is just me myself) feel...
wrong releasing turnkey copy/paste instructions for walking into
unsuspecting systems - tens of thousands of which have no idea that this
mailing list and resources even exists. I'm not saying that no one
should talk about security - here I am doing exactly that, and with
specifics. It's just that it doesn't feel right to me. My karma
doesn't need that.
If there are security professionals on the list, it is my hope that they
add the idea of 'not really all that restricted' LMTCPB(*YES) user
profiles to their repertoire. Especially in the context of 'how many
places can we execute a command on this system?'
Thank you for broaching the idea.
As an Amazon Associate we earn from qualifying purchases.