training SimpLE model for link prediction on knowledge graph

Referring to this paper by Prof Kazemi, Prof Poole on SimpLE model for link prediction on knowledge graph.

In page 3, the paragraph on learning SimpLE Models, I understand that we have a batch of positive triples from the knowledge graph, where for each positive triple in the batch, we generate $ n$ negative triple by corrupting it. So does that mean the batch size just increased by a factor of $ n$ and there are only negative examples in the batch?

I think I understand the optimization function but I don’t understand how we generated the labeled batch. Clarification would help!

Looking for a way to overwrite a symbolic link

I’m peparing for OSCP and I found an interesting situation (Alpine Linux).

There is a daemon super_service executed by root that is reading configuration file from /var/super_service/configs/ which is a symbolic link to location that my user john has no write permissions.

$   id uid=1000(john) gid=1000(john) groups=1000(john)  $   ls -la /var/super_service drwxr-xr-x    2 root     root          4096 May  9  2019 . drwxr-xr-x    3 root     root          4096 May  9  2019 .. lrwxrwxrwx    1 root     root            13 May  9  2019 configs -> /etc/super_service/configs  $   ls -la /etc/super_service/configs drwxr-xr-x    1 root     root          4096 Jan 29 12:10 . drwxr-xr-x    1 root     root          4096 Jan 29 12:10 .. -rw-------    1 root     root           283 Jan 23  2019 root.cfg 

Potential flaw is that /var/super_service/configs/ symbolic link permissions are rwx for everyone. If I manage to “redirect” this symbolic link to location controlled by me, I’d be able to control the config file read by super_service. Unfortunately, due to /var/super_service permissions (r-x) I’m not able to remove or replace this symbolic link.

I wonder if this situation is exploitable in any way?

My understanding is that if /var/super_service/configs would be regular file, not symbolic link, with exact permissions I could overwrite this file. But is there an equivalent of overwrite that is applicable for symbolic links?

I have password reset link with a long string of characters. What do those characters mean? [closed]

I have password reset link with login/reset_password?h=f7f7935cf3f63b3c01fc6987fb80f05c what does this h=32 characters mean?

I am testing a password reset functionality and found out that there is an URL parameter h with 32 characters in the password reset link. What is the purpose of these 32 characters?

woff file broken link

I was building my site on testing.mysite.com , and I have transfered it to mysite.com

When I open mysite and the developer tools in chrome, I see this error in the console.

GET https://testing.mysite.com/wp-content/uploads/2019/10/pxiByp8kv8JHgFVrLEj6V1g-1.woff net::ERR_CERT_AUTHORITY_INVALID       (index):615  

I have search testing.mysite through my files, but I only founded it on cache files.

How do I fix this?

Accidentally clicked spam email link on android, risk of malware?

I was browsing my spam folder on my phone in the gmail app and stupidly let curiosity get the better of me. The app had blocked images by default but I clicked to allow them as well as accidentally clicked a link in the email while scrolling through. A page began to load but I closed it before anything visually loaded as soon as I saw the URL.

I was on a Oneplus 5 android phone connected to my home WiFi. Android version 9 with August 1, 2019 security patch. Gmail app last updated Feb 12th 2020. The gmail app had permissions to my contacts, calendar, and storage at the time I clicked the link. The phone is rooted with magisk but no root prompts were given so I don’t think this is an issue..?

The email was a spam email about someone who had viewed me on linkedin recently. From long-pressing to copy the url, the link I believe I clicked was http://mycity.citywork.vn/wp-content/uploads/2020/twisterrt.php

I’ve already run a malwarebytes virus scan from the mobile app on the phone (came up clean) and changed the passwords (from another PC) to all 5 emails that I had linked in the gmail app as well as cleared the app caches and storage.

I was wondering if any experts could let me know what damage could possibly have been done considering the scenario (android device, home network, gmail app, clicked links in possibly malicious spam email causing a page to load, but no further prompts, user input, or changes as far as I was able to see), as well as if possible to investigate the link to determine what it was attempting to do/load.

I’m a fairly technical (and fairly paranoid) person looking for a fairly technical answer in terms of the potential of whether something malicious could have been run/installed on the device and whether a full device wipe is recommended.

Thanks in advance for your help!