Jump to content

Amaroq_Starwind

Members
  • Content Count

    612
  • Joined

  • Last visited

3 Followers

About Amaroq_Starwind

  • Rank
    Elite Member

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. For college, I need to do a PowerPoint presentation about my desired career. I also need to interview two professionals (each from a different company) in my chosen field and write up a resumé. It's no secret that I wish to eventually work at Malwarebytes, so naturally this means that I'll need to ask somebody here if I may conduct an interview. Unfortunately, as I haven't really done this before, I don't really know the first place to start. I don't really know what questions to ask, either, and I still haven't decided what other companies to ask for an interview. Any advice in this matter would be appreciated.
  2. A shame that you can't use software to prevent insect infestations.
  3. Something I would like to do in the not too distant future is arrange drills for my local college for both preparedness and response to cyber attacks. However, short of "back up your important files, we will have a ransomware drill this friday afternoon", I can't actually think of any specific ways to execute it. I've been wanting to do this sort of thing for a while now, but I just don't know what to put on paper. Any discussion would be appreciated. 🦊 Speaking of which, what do you think of my accidental acronym? Cyberattack Preparedness and Response, or CPR. I didn't even realize I had made that until I started typing this addendum.
  4. I recently learned about the existence of Named Pipes in Windows, and now I'd like to find some software that lets me do stuff involving them. https://en.wikipedia.org/wiki/Named_pipe Does anybody on this forum have recommendations for such software? I'm also wondering if the MalwareBytes ever does anything involving Named Pipes. Also... Apparently Windows and OS/2 handle Named Pipes differently from UNIX/Linux; on UNIX, Named Pipes are more or less persistent (at least for the duration of system uptime), but on Windows and OS/2, Named Pipes are deleted the moment that they are no longer referenced. Not sure what the benefits and drawbacks of each approach are.
  5. Well, VR Headsets could hypothetically be used to simulate various visual impairments... Personally though, I have the opposite problem: I really dislike when developers keep increasing the font size in a program that I use regularly without giving me any option to change it back. Since I frequently need to multi-task while still maintaining my privacy in a busy household, I usually have very limited screen real estate. It's even worse on mobile devices.
  6. You could have just turned that feature off, or added an exclusion.
  7. I will let the video speak for itself. It was actually just uploaded by JayzTwoCents not long ago.
  8. This has been requested quite a few times, but it would take significant time and resources to develop due to how different Windows and Linux are on a fundamental level, not only in how they work but also in what kind of threats to look out for. They know that people want it, and they know that it's actually needed due to the continually changing infosec landscape, but they make it a policy to not talk about anything they are working on until it's nearly ready for deployment. In short... If they are working on Malwarebytes for Linux, they won't tell us until they're almost done. They don't want to get people's hopes up in case something doesn't pan out.
  9. Turns out computers really are better at finding Waldo than humans are. https://blog.clarifai.com/wheres-waldo-using-machine-learning-to-find-all-the-waldos http://www.randalolson.com/2015/02/03/heres-waldo-computing-the-optimal-search-strategy-for-finding-waldo/
  10. This is a recent video that I came across and I think would be really interesting for fellow community members. It explains how mutation XSS works, and how Client-side Sanitation can be implemented.
  11. Some exploits were "recently discovered" in the ZIP file specification called Zip Slip and ZipperDown. However, these exploits aren't actually that new. I feel like it is still worth sharing this video to explain the dangers of relative paths in ZIP files, as well as the dangers of miscommunication for the sake of advertising. Safe coding, everyone!
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.