15 ruj 2018, 23:19
20 ruj 2018, 07:16
28 ruj 2018, 09:57
29 ruj 2018, 12:15
22 stu 2018, 08:20
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
22 stu 2018, 21:25
Ako imate ideju za razvoj inovativnog INFOSEC proizvoda ili usluge, mi imamo odmah zainteresirane investitore.
26 stu 2018, 21:36
27 stu 2018, 18:16
shrike je napisao/la:https://www.theinquirer.net/inquirer/news/3066979/this-linux-virus-is-a-total-jerk-even-by-malware-standards?fbclid=IwAR2SNVMqs1bwj7zFC16FjnpfdsMeD_HfaKv0VL21teVKPAGgjiXvalN3j48
Linux virus koji uđe na sustav i rudari kriptovalutu monero.
Asked about how the malware could gain access to systems, Vurasko responded, "In the first place it works like this: somebody searches for servers with [the] SSH port open; he is trying to brute [force] servers he found; if the brute force attack was successful, he connects to the compromised server using brute-forced credentials and starts the malware."
27 stu 2018, 19:19
jurastublic je napisao/la:shrike je napisao/la:https://www.theinquirer.net/inquirer/news/3066979/this-linux-virus-is-a-total-jerk-even-by-malware-standards?fbclid=IwAR2SNVMqs1bwj7zFC16FjnpfdsMeD_HfaKv0VL21teVKPAGgjiXvalN3j48
Linux virus koji uđe na sustav i rudari kriptovalutu monero.
Molim lijepo, nije virus nego malware skripta. I ne "uđe u sustav" ništa lakše nego moja baba.
Nemoj nasjedati na te poluinformacije, evo ti pravi članak o tom "malware-u":
https://www.itwire.com/security/85406-l ... h-ssh.html
ukratko citat čovjeka odgovornog za pronalaženje (ili možda i pisanje - tko zna) te malware skripte:Asked about how the malware could gain access to systems, Vurasko responded, "In the first place it works like this: somebody searches for servers with [the] SSH port open; he is trying to brute [force] servers he found; if the brute force attack was successful, he connects to the compromised server using brute-forced credentials and starts the malware."
Znači, brute force lutrija da dobiješ root, ništa ovdje za vidjeti - idemo dalje.
27 stu 2018, 20:04
shrike je napisao/la:Drago mi je da se topic prati