#arpnetworks 2015-05-13,Wed
↑back
Search
←Prev date
Next date→
(
Showing only urls
-
See all
)
(Click on time to show url line in full context)
Who
What
When
m0unds
http://venom.crowdstrike.com/
vulnerability in virtual floppy stuff for KVM, Xen and QEMU
[10:17]
Hien
i know that page
http://spoofer.csail.mit.edu/summary.php
providing status, but now it's almost broken
[10:53]
mkb
http://marc.info/?l=openbsd-misc&m=119318909016582
[11:10]
brycec
http://www.spokesman.com/stories/2015/may/13/spokane-adopts-new-rules-for-short-term-rentals/comments/
[11:43]
m0unds
http://i.imgur.com/wfa52sf.png
[11:44]
mercutio
http://www.phoronix.com/scan.php?page=news_item&px=OZWPWN-4-PoD-Linux
[14:32]
brycec
(Looking at
https://www.kernel.org/doc/readme/drivers-staging-ozwpan-README
)
[14:33]
Really not sure these bugs warrant CVEs though.
https://lkml.org/lkml/2015/5/13/739
[14:38]
mercutio
http://www.itworld.com/article/2920349/security/for-containers-security-is-problem-1.html
[14:42]
brycec
http://cateee.net/lkddb/web-lkddb/STAGING.html
[14:43]
And if you're curious about the whole Ozmo thing, here's a decent description from the Linux perspective
http://fabiobaltieri.com/2013/02/14/hp-wi-fi-direct-mouse-on-linux/
[14:46]
http://venom.crowdstrike.com/
[15:32]
m0unds
http://aws.amazon.com/security/security-bulletins/XSA_Security_Advisory_CVE_2015_3456/
[16:26]
mercutio
http://www.ubuntu.com/usn/usn-2608-1/
[17:11]
m0unds
https://securityblog.redhat.com/2015/05/13/venom-dont-get-bitten/
up_the_irons
[17:28]
https://lists.ubuntu.com/archives/ubuntu-announce/2015-April/000196.html
[18:25]
***
awyeah has quit IRC (Quit: ZNC -
http://znc.in
)
[19:33]
staticsafe
http://www.garrisonhost.com/ssl-certificates/alphassl.html
alphassl resellers are usually your best bet
[20:31]
mercutio
http://wiki.cacert.org/WildcardCertificates
[20:46]
brycec
(From
http://wiki.cacert.org/FAQ/AboutUs
)
[20:55]
gizmoguy
https://buy.wosign.com/free/
[21:13]
↑back
Search
←Prev date
Next date→
(
Showing only urls
-
See all
)
(Click on time to show url line in full context)