2025-02-20: 14 news articles added 2025-02-20: 23 files added 2025-01-22: 1 voting poll added 2025-02-14 (1739491200) Sometimes mitigating vulnerabilities means updating to bleeding edge code. And sometimes, those updates have issues. The downtime this morning was a result of that. Things should be stable rest of day. 2025-02-05 (1738713600) Popularity can be a curse. Currently debugging a memory leak of about 750 bytes per request on average which leads to many gigs of ram leaking over about 12 hours. You may see 404s occasionally as the daemons are restarted while debugging. Yay overly complicated massive dependency-requiring frameworks with a million moving layers. Maybe a rewrite of the code base in awk tied to a raw openssl binding on tcp/443 will calm the nerves. It certainly would be easier to debug. ... [ View Full Changelog ] |
When it comes to security tools, there are quite a few out there. We do not have room to list them all, but we can list some and get a feel for what has caused the largest impact. Most impactful security tool of all time from this short list? | |
Answers | Results |
Nmap — Recon is where you start. | 42% |
Metasploit — Because, well, Metasploit. | 28% |
Tcpdump/Libpcap/Wireshark — Show me the bits. | 14% |
Sqlmap — All the databases will be mine! | 14% |
John the Ripper — I enjoy cracking all the passwords. | 0% |
OSSEC — Host security still matters. | 0% |
2025-02-20: 14 news articles added 2025-02-20: 23 files added 2025-01-22: 1 voting poll added 2025-02-14 (1739491200) Sometimes mitigating vulnerabilities means updating to bleeding edge code. And sometimes, those updates have issues. The downtime this morning was a result of that. Things should be stable rest of day. 2025-02-05 (1738713600) Popularity can be a curse. Currently debugging a memory leak of about 750 bytes per request on average which leads to many gigs of ram leaking over about 12 hours. You may see 404s occasionally as the daemons are restarted while debugging. Yay overly complicated massive dependency-requiring frameworks with a million moving layers. Maybe a rewrite of the code base in awk tied to a raw openssl binding on tcp/443 will calm the nerves. It certainly would be easier to debug. ... [ View Full Changelog ] |
When it comes to security tools, there are quite a few out there. We do not have room to list them all, but we can list some and get a feel for what has caused the largest impact. Most impactful security tool of all time from this short list? | |
Answers | Results |
Nmap — Recon is where you start. | 42% |
Metasploit — Because, well, Metasploit. | 28% |
Tcpdump/Libpcap/Wireshark — Show me the bits. | 14% |
Sqlmap — All the databases will be mine! | 14% |
John the Ripper — I enjoy cracking all the passwords. | 0% |
OSSEC — Host security still matters. | 0% |