This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Last revision Both sides next revision | ||
start [2022/12/24 02:49] richard [Blogs / Articles] |
start [2023/05/29 06:48] richard |
||
---|---|---|---|
Line 127: | Line 127: | ||
Log4j vulnerability\\ | Log4j vulnerability\\ | ||
- | https://www.wired.com/story/log4j-flaw-hacking-internet/ | + | https://www.wired.com/story/log4j-flaw-hacking-internet/ \\ |
+ | \\ | ||
+ | https://www.quantamagazine.org/alan-turings-most-important-machine-was-never-built-20230503/\\ | ||
+ | \\ | ||
+ | BadUSB, Hak5 O.MG cable, Human Interface Device Spoofing \\ | ||
+ | https://www.makeuseof.com/what-is-a-usb-drop-attack/ \\ | ||
+ | https://www.youtube.com/watch?v=mPF9f-PLDPc \\ | ||
+ | \\ | ||
==== Networking blogs/articles ==== | ==== Networking blogs/articles ==== | ||
Line 154: | Line 162: | ||
\\ | \\ | ||
GRC.com DoS https://www.theguardian.com/technology/2001/jun/05/hacking.security, https://www.geek.com/news/grccom-surrenders-545393/, http://archive.is/P1T7z \\ | GRC.com DoS https://www.theguardian.com/technology/2001/jun/05/hacking.security, https://www.geek.com/news/grccom-surrenders-545393/, http://archive.is/P1T7z \\ | ||
+ | How I survived a DDoS attack - Jeff Geerling https://www.jeffgeerling.com/blog/2022/three-ddos-attacks-on-my-personal-website https://www.youtube.com/watch?v=VPcYMgTYQs0\\ | ||
\\ | \\ | ||
DEF CON 18 - Zoz - Pwned By The Owner: What Happens When You Steal A Hacker's Computer - https://www.youtube.com/watch?v=Jwpg-AwJ0Jc\\ | DEF CON 18 - Zoz - Pwned By The Owner: What Happens When You Steal A Hacker's Computer - https://www.youtube.com/watch?v=Jwpg-AwJ0Jc\\ |