Today, for some reason, i can’r create not even article link.
I check my proxies and they are working fine. I try to change setting, cleaning cache but nothing fixes the issue.
I also get many captchas like the one in the screenshot starting from yesterday.
Right now ONLY blog comments are working…
Any idea what happen?
Referring to this paper by Prof Kazemi, Prof Poole on SimpLE model for link prediction on knowledge graph.
In page 3, the paragraph on learning SimpLE Models, I understand that we have a batch of positive triples from the knowledge graph, where for each positive triple in the batch, we generate $ n$ negative triple by corrupting it. So does that mean the batch size just increased by a factor of $ n$ and there are only negative examples in the batch?
I think I understand the optimization function but I don’t understand how we generated the labeled batch. Clarification would help!
I’m peparing for OSCP and I found an interesting situation (
There is a daemon
super_service executed by root that is reading configuration file from
/var/super_service/configs/ which is a symbolic link to location that my user
john has no write permissions.
$ id uid=1000(john) gid=1000(john) groups=1000(john) $ ls -la /var/super_service drwxr-xr-x 2 root root 4096 May 9 2019 . drwxr-xr-x 3 root root 4096 May 9 2019 .. lrwxrwxrwx 1 root root 13 May 9 2019 configs -> /etc/super_service/configs $ ls -la /etc/super_service/configs drwxr-xr-x 1 root root 4096 Jan 29 12:10 . drwxr-xr-x 1 root root 4096 Jan 29 12:10 .. -rw------- 1 root root 283 Jan 23 2019 root.cfg
Potential flaw is that
/var/super_service/configs/ symbolic link permissions are
rwx for everyone. If I manage to “redirect” this symbolic link to location controlled by me, I’d be able to control the config file read by
super_service. Unfortunately, due to
/var/super_service permissions (
r-x) I’m not able to remove or replace this symbolic link.
I wonder if this situation is exploitable in any way?
My understanding is that if
/var/super_service/configs would be regular file, not symbolic link, with exact permissions I could overwrite this file. But is there an equivalent of overwrite that is applicable for symbolic links?
To reduce disk space I have planned to use a hard link instead of full copy, Is there any security issue while two different processes using different hard links of the same executable file as base?
I have password reset link with
login/reset_password?h=f7f7935cf3f63b3c01fc6987fb80f05c what does this
h=32 characters mean?
I am testing a password reset functionality and found out that there is an URL parameter
h with 32 characters in the password reset link. What is the purpose of these 32 characters?
If I post a Facebook link on my company website so that customers can click to be taken to my company's Facebook page, is there any way to get stats on those clickthroughs? Thanks!
Anyone tell me about http link?
Which is harder to exploit: Password reset link with tokens/timestamps/code/ticket etc Or, temporary password sent on user mail using which login can be done and password can be changed.
Any suggestions on how they can be exploited please?
I was building my site on testing.mysite.com , and I have transfered it to mysite.com
When I open mysite and the developer tools in chrome, I see this error in the console.
GET https://testing.mysite.com/wp-content/uploads/2019/10/pxiByp8kv8JHgFVrLEj6V1g-1.woff net::ERR_CERT_AUTHORITY_INVALID (index):615
I have search testing.mysite through my files, but I only founded it on cache files.
How do I fix this?
I was browsing my spam folder on my phone in the gmail app and stupidly let curiosity get the better of me. The app had blocked images by default but I clicked to allow them as well as accidentally clicked a link in the email while scrolling through. A page began to load but I closed it before anything visually loaded as soon as I saw the URL.
I was on a Oneplus 5 android phone connected to my home WiFi. Android version 9 with August 1, 2019 security patch. Gmail app last updated Feb 12th 2020. The gmail app had permissions to my contacts, calendar, and storage at the time I clicked the link. The phone is rooted with magisk but no root prompts were given so I don’t think this is an issue..?
The email was a spam email about someone who had viewed me on linkedin recently. From long-pressing to copy the url, the link I believe I clicked was http://mycity.citywork.vn/wp-content/uploads/2020/twisterrt.php
I’ve already run a malwarebytes virus scan from the mobile app on the phone (came up clean) and changed the passwords (from another PC) to all 5 emails that I had linked in the gmail app as well as cleared the app caches and storage.
I was wondering if any experts could let me know what damage could possibly have been done considering the scenario (android device, home network, gmail app, clicked links in possibly malicious spam email causing a page to load, but no further prompts, user input, or changes as far as I was able to see), as well as if possible to investigate the link to determine what it was attempting to do/load.
I’m a fairly technical (and fairly paranoid) person looking for a fairly technical answer in terms of the potential of whether something malicious could have been run/installed on the device and whether a full device wipe is recommended.
Thanks in advance for your help!