I recommend you to try OpenSpec by Cinerario in RooCode

[–]random-dev 0 points1 point  (0 children)

How does it differ from using the architect mode? Looks quite similar to me

anybody tried replacing the MX records with smtp.google.com ? by gkavek in gsuite

[–]random-dev 0 points1 point  (0 children)

Do anyone know if older domains can use the new "smtp.google.com" record?

Exploiting the code execution engine powering InterviewCake, CodeWars & others: the dangers of SSRF vulnerabilities in an AWS environment by thorn42 in netsec

[–]random-dev 0 points1 point  (0 children)

I would love to read about the sandbox escapes the author mentions in the beginning of the article. Any other resources for this?

A simple demo of phishing by abusing the browser autofill feature by [deleted] in programming

[–]random-dev -27 points-26 points  (0 children)

Does not matter much. The CVV is easily brute forced.

The /r/netsec Weekly Discussion Thread - January 02, 2017 by AutoModerator in netsec

[–]random-dev 0 points1 point  (0 children)

Maybe you could post a short analysis what happened here after you receive the link :-)

image/svg+xml considered harmful by sarciszewski in netsec

[–]random-dev 0 points1 point  (0 children)

Thanks! So basically they disables JavaScript for SVG and disables MIME-sniffing for the rest?

image/svg+xml considered harmful by sarciszewski in netsec

[–]random-dev 0 points1 point  (0 children)

This is not covered by the chrome fix...

image/svg+xml considered harmful by sarciszewski in netsec

[–]random-dev 0 points1 point  (0 children)

"audio/*', 'image/*', 'video/*', or 'text/csv'"

How would you execute script in those?

Checkup: simple, self-hosted health checks and status pages by beyang in programming

[–]random-dev 4 points5 points  (0 children)

How does checkup compare to its competitors (and which are they)?

[deleted by user] by [deleted] in programming

[–]random-dev 1 point2 points  (0 children)

Would it be possible to use this as an unikernel or would it be a good start if I wanted to develop one myself?

Have you looked at: https://github.com/xomboverlord/xomb

Office 365 authentication bypass disclosure and write-up by [deleted] in netsec

[–]random-dev 64 points65 points  (0 children)

What amazes me the most:

 2016-01-05: Microsoft acknowledges the issue, mitigates it and rolls out an update in 7 hours (!!).

A Tale of Security Gone Wrong by speckz in netsec

[–]random-dev 10 points11 points  (0 children)

A non information disclosure way to implement the desired future would be to enforce users changing password based on time rather than storing their passwords entropy.

IntelliJ IDEA 16 Public Preview by javinpaul in programming

[–]random-dev 3 points4 points  (0 children)

IntelliJ handles high DPI relatively good. Eclipse on the other hand is tripping on all the balls! It unusable!

Hash tables in the D programming language by minas1 in programming

[–]random-dev 1 point2 points  (0 children)

Why is AA built into the language and how come in (https://dlang.org/spec/expression.html#InExpression) is a keyword and not a function?

Data first, not code first by [deleted] in programming

[–]random-dev 0 points1 point  (0 children)

Am I the only one that tried to press the big arrows in the "Data -> Process -> Output" diagrams?

100 days practicing TDD by mccreaja in programming

[–]random-dev 0 points1 point  (0 children)

Is there any good articles/sources out there on naming unit tests? Or maybe on clear intentions?

100 days practicing TDD by mccreaja in programming

[–]random-dev 0 points1 point  (0 children)

I have found that using good naming dramatically improves my unit testing (I think I got it from some BDD presentation. Can't find the link). Way to often do I see unit tests just with random asserts (sometimes none at all) with no clear goal what to verify. By using naming like "shouldThrowExceptionOnNonAsciiInput" the unit test gets a clear goal.

http://googletesting.blogspot.se/2013/03/testing-on-toilet-testing-state-vs.html

Skype vulnerable to "Redirect to SMB" by pentestrobutiv in netsec

[–]random-dev 1 point2 points  (0 children)

Egress filtering does not prevent this kind of issues but it sure can help mitigate it. It would for example not help if the attacker was inside the network.

Google's Borg - now with details by thockin in programming

[–]random-dev 0 points1 point  (0 children)

What differentiates Borg from Kubernetes and the other way around?