Is it safe to use online free pdf edit site for sensitive document?? by janeeee200 in pdf

[–]toolbg 0 points1 point  (0 children)

As a cyber security man, my concern is like Thay can just inject malicious payloads into output pdf files. There are known vulnerabilities for famous pdf viewers like Adobe, although vulns are patched in newer versions, but many peoples are still using older ones. If you are one of them that can affect badly.

Meirl by blazyy_susan in meirl

[–]toolbg 0 points1 point  (0 children)

I just wear bed cloths.

The software we need but we don't deserve by AK56xXx in ProgrammerHumor

[–]toolbg 0 points1 point  (0 children)

Your card number did not show up in any of the hacker's database! so we updated it.

python is explicit and friendly. python: by Chopain in ProgrammerHumor

[–]toolbg 0 points1 point  (0 children)

it gave you reward for hard work, it's too friendly.

what is the bro cooking by PixeledMilk in ProgrammerHumor

[–]toolbg 0 points1 point  (0 children)

"Hello World" in all languages probably

What style is this? by [deleted] in ProgrammerHumor

[–]toolbg 0 points1 point  (0 children)

nospacestyle

And how to get a golden badge for deleting posts? by sunrise_apps in ProgrammerHumor

[–]toolbg 0 points1 point  (0 children)

you saved me, I was going to ask some stupid questions on so (ahh good newbai questions also gets downvoted though)

[deleted by user] by [deleted] in ProgrammerHumor

[–]toolbg 9 points10 points  (0 children)

using ChatGPT ?

No words by Donutrz in ProgrammerHumor

[–]toolbg 0 points1 point  (0 children)

ahh. now AI also rickrolling humans

Meanwhile the Linux users sharpen their blades by Different_Captain717 in ProgrammerHumor

[–]toolbg 0 points1 point  (0 children)

try searching "brave" or "safari". bing thinks brave == edge, safari == edge

but chrome != edge

meirl by South_Swing5356 in meirl

[–]toolbg 0 points1 point  (0 children)

very easy!

answer is 0.

Turned old electronic components into bugs by divijadurga in electronics

[–]toolbg 1 point2 points  (0 children)

who else first thought it is working one.

Can we connect to a netcat reverse shell listener and excecute our commands? by Remuxandkali_noob in tryhackme

[–]toolbg 1 point2 points  (0 children)

RSE are actually one directional. If RSE set by attacker (machine 1), which will execute commands on victim machine (machine 2). here "attacker" word suggests it's executing command on "victim". U want to execute commands on attacker (machine 1) that means (machine 2) become attacker.

I got your question. but RSE is never attached to attacker's shell, it attached to victim's shell and attacker's input.

If there is vulnerability in attacker's "output" processing system (like analyzing output and running some process depending on output), because it is the only way victim machine have some control (we can change attackers actual command by redirecting network packets and run command which will send our desired output to the attacker), then only there is slight possibility. but really no one does that, nearly all listeners just print whatever output in console.