Leaflet@lemmy.world to Linux@lemmy.mlEnglish · 19 hours agoAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netexternal-linkmessage-square25fedilinkarrow-up1108arrow-down11file-text
arrow-up1107arrow-down1external-linkAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netLeaflet@lemmy.world to Linux@lemmy.mlEnglish · 19 hours agomessage-square25fedilinkfile-text
minus-squareryannathanslinkfedilinkarrow-up4arrow-down5·16 hours agoGoing to rely on security through obscurity instead?
Going to rely on security through obscurity instead?