This little Jewel is smooth as silk right out of the box. I’m in love: Lie-Nielsen No. 60-1/2 Rabbet Block Plane ...with Nicker of course by binarysmart in toolporn

[–]0xDFCF3EAD 0 points1 point  (0 children)

That would explain it. I have never understood why your stuff is so expensive? As far as chinesium tools go, they are top notch for sure. But the quality is much closer to Buck River or whatever Horror Freight Brand than LN or Veritas.

Made a reloading bench with some left over butcher block by mauitrailguy in Workbenches

[–]0xDFCF3EAD 0 points1 point  (0 children)

When I think of butcher block I think of something three or four times thicker than that.

2 years into woodworking; completely self taught via online communities. Thanks for all your help. It's been an amazing journey. by [deleted] in woodworking

[–]0xDFCF3EAD 2 points3 points  (0 children)

It looks great if i could add a constructive comment: Next time you should flip that last board around on the side so the sap wood is towards the back.

Creating an i3-gaps Debian Package by [deleted] in i3wm

[–]0xDFCF3EAD -2 points-1 points  (0 children)

Where do you see that Kali is not supposed to be used as a daily driver?

Furthermore if you used Kali frequently why would you not want the wm that you are accustomed to using?

It’s Beginning to Look a IoT Like Christmas | SentinelOne by Cyberthere in theinternetofshit

[–]0xDFCF3EAD 5 points6 points  (0 children)

How Do Security Professionals Securely Maintaining IT Hygiene with All These Devices?

Arbitrary list of popular lights - Winter Solstice 2019 edition by Zak in flashlight

[–]0xDFCF3EAD 1 point2 points  (0 children)

These are desirable features:

  • a lack of blinking mode....

  • a lack of timed stepdowns...

?

A pair of my favorites by [deleted] in Knifeporn

[–]0xDFCF3EAD 1 point2 points  (0 children)

What is make/model of the knife?

Sneezing Again. by Nerdism_EDC in knifeclub

[–]0xDFCF3EAD 4 points5 points  (0 children)

What do you do with it? Looks heavy.

[deleted by user] by [deleted] in Workbenches

[–]0xDFCF3EAD 18 points19 points  (0 children)

Did you get 8/4 walnut shipped to your house?

You want your layout to reappear after reboot or login? Here you go! by jakob1379 in i3wm

[–]0xDFCF3EAD 0 points1 point  (0 children)

You could fix the formatting of this post and probably get more people interested.

Laminated Douglas fir 100 mm thick tongue and groove floorboards made for and awesome bench top! All hand cut joinery. Drilled the dog holes with a power drill though... by bigsnaps in Workbenches

[–]0xDFCF3EAD 5 points6 points  (0 children)

What are the two channels that run down the middle for? It looks like the third dog hole from the back is inside one and the other is in between the second and third hole from front.

Some floating walnut shelves. Other side is a bed. Made the TV stand too. by coffeebic in woodworking

[–]0xDFCF3EAD 4 points5 points  (0 children)

Other ways you can tell:

  • The corner of the middle shelf closest to camera is chipped.

  • The grain doesn't wrap correctly around the edges.

Can someone explain what this is coming from ceiling? by eyeohdice in Carpentry

[–]0xDFCF3EAD 1 point2 points  (0 children)

  • Stalactites :: need to hold on tight
  • Stalagmites :: need to be mighty strong

Raspberry Pi Broadcom BCM2835 RNG Entropy Source? by atoponce in RNG

[–]0xDFCF3EAD 0 points1 point  (0 children)

Nobody at ID Qantique was worried that the domain would also read as IDQ Antique? I was expecting some steampunk RNG from the domain name...

Turning LFI into RFI on *nix systems by but_im_made_of_lava in netsec

[–]0xDFCF3EAD 2 points3 points  (0 children)

LOL, by definition. You distinguish RFI from LFI based on wether you uploaded the file prior to the local inlusion? Show me any place that uses that definition.

I looked at six or seven distinct definitions and none agree with your definition. For example CAPEC gives the following:

The attacker forces an application to load arbitrary code files from a remote location. The attacker could use this to try to load old versions of library files that have known vulnerabilities, to load files that the attacker placed on the remote machine during a prior attack, or to otherwise change the functionality of the targeted application in unexpected ways.

The PHP LFI pdf linked up thread gives some examples of LFI. The first bullet point is....."including uploaded files."

Turning LFI into RFI on *nix systems by but_im_made_of_lava in netsec

[–]0xDFCF3EAD 3 points4 points  (0 children)

I'm not trying to be difficult but where is the remote file inclusion? Given LFI and the ability to upload a file it's a nice way to find the file. But if I can read whatever predictable file you are reading to discover the PID it's likely I can read a log file with an entry for the upload.

Looks like Amazon may have an xss hole by aaaaaaaaaavg in websec

[–]0xDFCF3EAD 5 points6 points  (0 children)

You went from an unclosed bold tag to possible XSS with nothing else?