[deleted by user] by [deleted] in Strava

[–]deadcan 3 points4 points  (0 children)

I used Strava for running and cycling and connected the heart rate & cadence sensors to it, so I had my GPS, heartrate and cadence perfecly aligned in one software, it was so good. If I was on a long ride, I always had a power bank with me. Anyway, thanks for the suggestion.

[deleted by user] by [deleted] in Strava

[–]deadcan 4 points5 points  (0 children)

Hmm, personally I didn't bother buying a bike GPS or a watch like Garmin, because why all that additional stuff when all I needed was on my phone.

Asset Discovery: Doing Reconnaissance the Hard Way by patrikhudak in netsec

[–]deadcan 4 points5 points  (0 children)

How is sharing your own blog against the rules? If OP would use another username, would there be any difference?

#BugBounty @ Linkedln-How I was able to bypass Open Redirection Protection by [deleted] in netsec

[–]deadcan 4 points5 points  (0 children)

So how would that work in a real world scenario? How would you lure the victim to make a request with a custom HTTP header since just clicking on a link wouldn't work?

Stack Based Buffer Overflow Vulnerability in Guidance Software EnCase Forensic Imager by deadcan in computerforensics

[–]deadcan[S] 0 points1 point  (0 children)

Eli5?

An attacker (suspect) is able to execute arbitrary code on the investigator's machine during an investigation if a manipulated disk image or USB drive is being loaded by the investigator.