Explore >> Select a destination


You are here

www.philipotoole.com
| | blog.netways.de
17.3 parsecs away

Travel
| | We're rewriting our network stack in Icinga 2.11 in order to to eliminate bugs with timeouts, connection problems, improve the overall performance. Last but not least, we want to use modern library code instead of many thousands of lines of custom written code. More details can be found in this GitHub issue. From a developer's point of view, we've evaluated different libraries and frameworks before deciding on a possible solution. Alex created several PoCs and already did a deep-dive into several Boost libraries and modern application programming. This really is a challenge for me, keeping up with the new standards and possibilities. Always learning, always improving, so I had a read on the weekend in ?Boost C++ Application Development Cookbook - Second Edit...
| | bvisness.me
18.0 parsecs away

Travel
| | The Handmade Manifesto is on its third revision now. Let's look back at old versions of the manifesto and see how our messaging has shifted over time.
| | www.lieberbiber.de
18.7 parsecs away

Travel
| | On January 19, 2038 all signed 32-bit timestamps representing time and date relative to the "UNIX epoch" will roll over. Just 68 years later, in 2106, all unsigned 32-bit values will do so. But even before that, timestamps used by the Network Time Protocol will roll over in 2036. Since it's only 19 years to Armageddon, I'll lok at what this means for Linux, Windows and other systems and how problems are being solved.
| | www.cybereason.com
37.6 parsecs away

Travel
| Cybereason GSOC observed distribution of the Bumblebee Loader and post-exploitation activities including privilege escalation, reconnaissance and credential theft. Bumblebee operators use the Cobalt Strike framework throughout the attack and abuse credentials for privilege escalation to access Active Directory, as well as abusing a domain administrator account to move laterally, create local user accounts and exfiltrate data...