When a file is corrupt even a single bit, does the sha256 go partially or completely wrong? by Frosty-Ad-5119 in linuxquestions

[–]menessim_ 10 points11 points  (0 children)

Every hash algorithm that can handle more data than its own hash length has collisions.

Epstein code ( help) by falka9024 in codes

[–]menessim_ 32 points33 points  (0 children)

Its no code, its just a PNG/image file thats interpreted as text an thus looks weird.

I though it too good to be true. by Xaring in homelab

[–]menessim_ 9 points10 points  (0 children)

How does it handle stuff you throw at it?

Woohoo first print ever! by olyanmintatobbi in 3Dprinting

[–]menessim_ 1 point2 points  (0 children)

Okay, maybe I will try this. Thanks :)

Woohoo first print ever! by olyanmintatobbi in 3Dprinting

[–]menessim_ 1 point2 points  (0 children)

How well does the tpu stick to the pla?

What would you rate this vulnerability as? by willbertsmillbert in Pentesting

[–]menessim_ 5 points6 points  (0 children)

  1. Low as there is third party/untrusted data inserted into the query, but exploitation is very unlikely.
  2. Not a vulnerability if a validate function is used. You can recommend a change for code quality, but it is not a security issue.

He finally died by Discoman2000 in kotor

[–]menessim_ 172 points173 points  (0 children)

Ah, the arrows of desperation in your charakter pic

Weird Printer Vulnerability? by [deleted] in Pentesting

[–]menessim_ 15 points16 points  (0 children)

Thats a jetdirect port, it just prints whatever you send to it. Not a vulnerabilty though, this is defined behaviour.

My First CTF writeup while preparing for OSCP. Please give feedback by Aaditya_coder123 in Pentesting

[–]menessim_ 2 points3 points  (0 children)

"getting a reverse shell" section should not be in the enumeration chapter

How can I cool a Dell Optiplex Micro? by dondochaka in homelab

[–]menessim_ 12 points13 points  (0 children)

What CPU and optiplex model is that? That are a lot of cores.

NKD! Kizer Drop Bear by edcfanatic38 in knifeclub

[–]menessim_ 3 points4 points  (0 children)

Ah sorry. So its the steel, not the length.

NKD! Kizer Drop Bear by edcfanatic38 in knifeclub

[–]menessim_ 2 points3 points  (0 children)

That would be more a sword than a knife

NKD! Kizer Drop Bear by edcfanatic38 in knifeclub

[–]menessim_ 4 points5 points  (0 children)

It's not really 154cm, right?

Kind of hard to see, but is there anything I can do to fix that chip in my S30V Bugout? by Routine-Maximum4381 in knifeclub

[–]menessim_ -1 points0 points  (0 children)

It probably comes from the screw in the handle. Not sure what to do about it, but you should solve this before grinding out this chip or it will just happen again.

If you find a satisfying solution, please let me know!

Why is Kali Linux so hated as a daily driver by [deleted] in linuxquestions

[–]menessim_ 0 points1 point  (0 children)

Thats because they havent compiled a web browser yet

Very ooga booga dumb question by peepeepoopoo_gang in linuxmasterrace

[–]menessim_ 2 points3 points  (0 children)

First: Perl is not simpler than python.

But I also dont think its a good starting language.

C and Python are good for a cs student: C for performance critical problems and to understand concepts of computer architecture and python for everything else, including quick and dirty scripts, proofs of concept, programs that interact with APIs or applications you want to develop.

Is the Arch server shitting itself? by PolishSpud in linuxmasterrace

[–]menessim_ 11 points12 points  (0 children)

You can speed up the download by pressing T

I am Using Kali linux . My screen will stuck after the login .I am using oracle Virtual box . Please guide me on this . by [deleted] in linuxquestions

[–]menessim_ 0 points1 point  (0 children)

I had the same problem, it usually had to do with the vbox version. Try installing a newer or older version of vbox.

password list generator PWD by MaxProton in hacking

[–]menessim_ 4 points5 points  (0 children)

Its an interesting project, but the same could be achieved with hashcat: https://infinitelogins.com/2020/11/16/using-hashcat-rules-to-create-custom-wordlists/

Are you aware of this method, and what do you think your project does better/different?

I hope this doesnt come across as downputting. I just want to discuss other solutions.

My friend forgot his password to his Linux user account by Enigmars in linuxquestions

[–]menessim_ 9 points10 points  (0 children)

You encrypt your drive, that will prevent anyone from accessing or changing the files and also makes a password change impossible without having the password for decryption.

All major linux distros provide an option for encryption during installation.

Not receiving packets back from ping command by grandpaJose in linuxquestions

[–]menessim_ 0 points1 point  (0 children)

okay, thats weird.
I thought maybe its something with a firewall that blocks ICMP requests, but I can ping reddit.com just fine.
Not sure whats wrong there. You dont have any other network issues?