When we all fall down When we walk into silence When we shadow the sun When we surrender to violence Oh, then the damage is done, put away that gun I don't want to be there I don't want to be anywhere Oh, here it comes, here comes the night Here it comes, hell in the night Here it comes, here comes the night That's right
Καλημέρα σε όλους τραγουδάρα.... , συνδυάστε και αυτά , Cyber Polygon 2020 - https://redskywarning.blogspot.com/2021/04/blog-post_16.html - https://arstechnica.com/information-technology/2021/04/pentagon-explains-odd-transfer-of-175-million-ip-addresses-to-obscure-company/ . Προετοιμάζονται για κάτι , global reset που λένε? , αυξημένο bandwith για επιθέσεις? , θα δούμε . Καλή δουλειά σε όλους ....
Από σχόλια στο ars According to coverage I've read elsewhere, they're looking for foreign vulnerabilities. The Chinese military apparently makes extensive use of the DoD's unused IP addresses for internal networking; so when this went live any misconfigured hardware in China would have been broadcasting traffic into a newly opened DoD honeypot. At this point I assume they've locked everything down, but that analysts in secure rooms will be digging through the collected take for a long time looking for anything of value.
3 σχόλια:
Gods of War
When we all fall down
When we walk into silence
When we shadow the sun
When we surrender to violence
Oh, then the damage is done, put away that gun
I don't want to be there
I don't want to be anywhere
Oh, here it comes, here comes the night
Here it comes, hell in the night
Here it comes, here comes the night
That's right
Καλημέρα σε όλους τραγουδάρα.... , συνδυάστε και αυτά , Cyber Polygon 2020 - https://redskywarning.blogspot.com/2021/04/blog-post_16.html - https://arstechnica.com/information-technology/2021/04/pentagon-explains-odd-transfer-of-175-million-ip-addresses-to-obscure-company/ . Προετοιμάζονται για κάτι , global reset που λένε? , αυξημένο bandwith για επιθέσεις? , θα δούμε . Καλή δουλειά σε όλους ....
Από σχόλια στο ars
According to coverage I've read elsewhere, they're looking for foreign vulnerabilities. The Chinese military apparently makes extensive use of the DoD's unused IP addresses for internal networking; so when this went live any misconfigured hardware in China would have been broadcasting traffic into a newly opened DoD honeypot. At this point I assume they've locked everything down, but that analysts in secure rooms will be digging through the collected take for a long time looking for anything of value.
Δημοσίευση σχολίου