#arpnetworks 2015-05-13,Wed

↑back Search ←Prev date Next date→ (Showing only urls - See all)(Click on time to show url line in full context)

WhoWhatWhen
m0undshttp://venom.crowdstrike.com/ vulnerability in virtual floppy stuff for KVM, Xen and QEMU [10:17]
Hieni know that page http://spoofer.csail.mit.edu/summary.php providing status, but now it's almost broken [10:53]
mkbhttp://marc.info/?l=openbsd-misc&m=119318909016582 [11:10]
brycechttp://www.spokesman.com/stories/2015/may/13/spokane-adopts-new-rules-for-short-term-rentals/comments/ [11:43]
m0undshttp://i.imgur.com/wfa52sf.png [11:44]
mercutiohttp://www.phoronix.com/scan.php?page=news_item&px=OZWPWN-4-PoD-Linux [14:32]
brycec(Looking at https://www.kernel.org/doc/readme/drivers-staging-ozwpan-README) [14:33]
Really not sure these bugs warrant CVEs though. https://lkml.org/lkml/2015/5/13/739 [14:38]
mercutiohttp://www.itworld.com/article/2920349/security/for-containers-security-is-problem-1.html [14:42]
brycechttp://cateee.net/lkddb/web-lkddb/STAGING.html [14:43]
And if you're curious about the whole Ozmo thing, here's a decent description from the Linux perspective http://fabiobaltieri.com/2013/02/14/hp-wi-fi-direct-mouse-on-linux/ [14:46]
http://venom.crowdstrike.com/ [15:32]
m0undshttp://aws.amazon.com/security/security-bulletins/XSA_Security_Advisory_CVE_2015_3456/ [16:26]
mercutiohttp://www.ubuntu.com/usn/usn-2608-1/ [17:11]
m0undshttps://securityblog.redhat.com/2015/05/13/venom-dont-get-bitten/ up_the_irons [17:28]
https://lists.ubuntu.com/archives/ubuntu-announce/2015-April/000196.html [18:25]
***awyeah has quit IRC (Quit: ZNC - http://znc.in) [19:33]
staticsafehttp://www.garrisonhost.com/ssl-certificates/alphassl.html alphassl resellers are usually your best bet [20:31]
mercutiohttp://wiki.cacert.org/WildcardCertificates [20:46]
brycec(From http://wiki.cacert.org/FAQ/AboutUs) [20:55]
gizmoguyhttps://buy.wosign.com/free/ [21:13]

↑back Search ←Prev date Next date→ (Showing only urls - See all)(Click on time to show url line in full context)