@CTDummy@lemm.ee it did the phunk kawoosh
Cybersecurity professional with an interest in networking, and beginning to delve into binary exploitation and reverse engineering.
@CTDummy@lemm.ee it did the phunk kawoosh
Bruh. Obviously. The person said pay off their mortgage, which is distinctly different from making a mortgage payment. Jfc.
Also, the Vision Pro isn’t outrageously expensive, it’s just expensive. It’s not even just Apple. MSI, Asus, Lenovo, Dell, and Acer all have laptops in the $3,000+ range. I don’t really understand what your point is really, there’s tons of shit that I couldn’t afford for the decade I made minimum wage, but that I can afford now that I make much more. I wasn’t mad those things existed when I couldn’t afford them, and I definitely didn’t think they shouldn’t exist just because they were out of my budget.
What’s the deal with the periods in between paragraphs?
It’s $3,500. That’s the price of a specced up MacBook Pro. That’s almost half the price of the Pro Display XDR. I mean I didn’t buy one because it is pretty expensive, plus I barely use my Index, but it’s definitely not “pay of your mortgage” level of expensive.
My dude. You are not a serious person. I’m blocking you so I don’t waste my time with you in the future. Enjoy your life I guess.
Wow you found three different articles, all about the same CVE, that the manufacture published a firmware patch for before any public disclosure was made. That’s definitely just as bad as pretending you don’t know about CVEs in your products lol.
You presented one that doesn’t have security vulnerabilities? Here’s yet another CVE out for trendnet: https://nvd.nist.gov/vuln/detail/CVE-2018-19239
Every. Single. Brand. Has. CVEs. I’ve used Mikrotik, I’ve used Cisco, I’ve used Juniper, I’ve used Ubiquiti. I have a trendnet Poe switch in my attic powering some cameras and an AP right now. I have no “problem” with any brand of anything.
I do have a problem with you implying that a company doesn’t take security seriously when they do. I start to think you’re intentionally lying when you lift up trendnet as the model, because they have quite an especially atrocious history of it.
https://www.rapid7.com/db/modules/exploit/linux/misc/cisco_ios_xe_rce/
We can go back and forth on RCEs literally all day. If your bar for using a product is “no RCEs”, get off the grid entirely my guy.
MikroTik is just as serious a network company as Cisco or Juniper, and vastly more serious from an enterprise networking point of view than trendnet.
Also where tf did OP mention anything about warranties?
Edit - https://medium.com/tenable-techblog/trendnet-ac2600-rce-via-wan-8926b29908a4
Edit - https://www.archcloudlabs.com/projects/trendnet-731br/
Edit - lol holy shit look how customer focused trendnet is! They just plugged their ears and pretended an unauthenticated RCE in their product didn’t exist haha. https://arstechnica.com/information-technology/2015/04/no-patch-for-remote-code-execution-bug-in-d-link-and-trendnet-routers/
https://www.rapid7.com/db/modules/exploit/linux/misc/cisco_ios_xe_rce/
We can go back and forth on RCEs literally all day. If your bar for using a product is “no RCEs”, get off the grid entirely my guy.
MikroTik is just as serious a network company as Cisco or Juniper, and vastly more serious from an enterprise networking point of view than trendnet or ubiquiti.
You’re free to continue thinking their not a serious networking company though, just as I’m free to continue thinking your a foolish, not serious person.
https://www.rapid7.com/db/modules/exploit/linux/misc/cisco_ios_xe_rce/
We can go back and forth on RCEs literally all day. If your bar for using a product is “no RCEs”, get off the grid entirely my guy.
MikroTik is just as serious a network company as Cisco or Juniper, and vastly more serious from an enterprise networking point of view than trendnet or ubiquiti.
You’re free to continue thinking their not a serious networking company though, just as I’m free to continue thinking your a foolish, not serious person.
https://www.rapid7.com/db/modules/exploit/linux/misc/cisco_ios_xe_rce/
We can go back and forth on RCEs literally all day. If your bar for using a product is “no RCEs”, get off the grid entirely my guy.
MikroTik is just as serious a network company as Cisco or Juniper, and vastly more serious from an enterprise networking point of view than trendnet or ubiquiti.
You’re free to continue thinking their not a serious networking company though, just as I’m free to continue thinking your a foolish, not serious person.
You are a foolish person.
Yeah I’ve worked at WISPs that were pushing TBs through their core routers every day. Those core routers? Mikrotiks. Every apartment buildings core routers and fiber aggregation switches? Mikrotiks. You had to get down to the access layer switches that fed the individual apartments to hit Cisco equipment.
This person is just repeating some shit they read somewhere, hoping it makes them sound knowledgeable. In another post they’re recommending trendnet shit. Get back to me when you can set up BGP peering on your trendnet lol.
Bruh. I would have never noticed that, so thanks for bringing it up. 5.21k does look like a “biglier” number than 5,210 if you’re a fucking idiot I guess.
I can’t quite get a read on if you’re being sarcastic or not, but if you are you should know that there are curated porn blocklists for pihole. This obviously won’t stop anyone from accessing porn via nsfw channels on sites that are not exclusively nsfw, like lemmy, Reddit, tumblr, or whatever.
Run pihole with a MikroTik router at your houses demarc.
Set up firewall rules in the tik to redirect any packet with dst tcp/udp 53 outbound on wan to the pihole. If you’re worried about dns when pihole is down, create disabled rules to allow the dns traffic as well, then set up a scheduler script using if blocks to toggle the sets of rules depending on status. This will force any client on your network, even one with hardcoded dns IPs, to use the pihole.
If the client is configured for DoH you’ll just have to build out an ip block list in the MikroTik and block all known DoH IPs.
Create firewall rules to drop all vpn traffic you can, combining port based rules and similar IP lists as for DoH, but subbing in VPN provider IPs. If you want to route your home traffic over a vpn, set up a vpn client in the router itself and basically site-to-site your home to the vpn provider you use.
This would block the vast majority of kids trying to bypass parents blocks, but it’s asking quite a lot from the parents who don’t have experience configuring this stuff already.
Hahaha they think I actually own a phone.
For real. It’s an iPhone 4s, if the wait was really that bad the person could have just gotten a grey market cellebrite ufed and been done with this whole thing. They sell for like $300-$400 on eBay ffs.
Ok, I’ve read about couple articles about this letter now. All of them have the same information, and all are lacking the same information.
So this guy drops off a box at someone’s house, with a note talking about how he failed to assassinate Trump. The person with the box opens it up when this guy hits the news, arrested for the assassination attempt.
Did this guy expect to fail? Why was there only a note detailing his failed attempt, and not another one in the case he was successful?
Was he just hoping this someone with the box would go through it when he was on the news?
My gut is telling me that if there was only a failure note this whole thing was either a sham, or the person with the box knew something was going down and threw out the letter for the scenario that didn’t play out. I feel like an insane conspiracy nut job thinking like this though, but this is weird right? What kind of person who has such conviction of belief that they’re willing to kill a person goes in to it expecting to fail?
I’m running the beta of this right now. You still need NCP, because nowhere near all of the control panel options are actually in the new app. It’s just a handful of basic options.