Explore >> Select a destination


You are here

mkaz.blog
| | hjr265.me
3.1 parsecs away

Travel
| | I have lines like these in my /etc/hosts file: 127.0.0.1 toph.local 127.0.0.1 drafts.toph.local 127.0.0.1 quiz.toph.local I can run development servers locally and access them over .local hostnames (e.g. toph.local) instead of the loopback IP addresses (e.g. 127.0.0.1). It works fine. But every time I start working on a new project, I needed to add a new line to the /etc/hosts file. It didn't sit right with me. I should be able to point all *.
| | serverascode.com
2.8 parsecs away

Travel
| | A techno-blog for our techno-times
| | shibumi.dev
2.0 parsecs away

Travel
| | How to identify the Operating System (OS) via ping utils
| | thatsn0tmy.site
26.8 parsecs away

Travel
| Hi folks! I recently read about a few vulnerabilities on Terramaster which were basically stolen from me heavily inspired by my previous ones, so I decided to look into Terramaster again, just to find a few more. Ah. This time I didn't spend much time reasearching, and I couldn't find an auth bypass so you will need valid credentials to reach the RCEs. Don't worry tho, you ransomware operators can still get the admin hashes and username. Some assembly hashcat required.