Comments
Name That Toon: Screen Sharing
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 7 / 13   >   >>
DarwinS524
0%
100%
DarwinS524,
User Rank: Apprentice
6/25/2017 | 3:03:30 PM
Cartoon Contest
See!!!  I TOLD you guys this new graphics card was worth the extra money!!!
robert.hoisington
67%
33%
robert.hoisington,
User Rank: Apprentice
6/23/2017 | 3:12:20 PM
UaaS?
... yeah - this is just the free tier....
NUTsTUN
75%
25%
NUTsTUN,
User Rank: Apprentice
6/20/2017 | 9:00:12 AM
M-x unicorn
"Wow, they weren't lying! Emacs does have a command for everything..."
incredmo
0%
100%
incredmo,
User Rank: Apprentice
6/18/2017 | 4:36:41 AM
Name That Toon: Screen Sharing, 3D unicorns
Some startup claims they can create 3D unicorns, ( I thought I had heard every troll request for funding). Guys you are not going to believe this one.
Brad_Martin
67%
33%
Brad_Martin,
User Rank: Strategist
6/15/2017 | 8:00:10 AM
caption
Betty:  Dave, aren't you suppose to be researching unix?

Dave: Sorry boss, I think I made a typeo on my search

Betty: Thank Alpha that I hadn't asked you to research Hard Disk...
cybersavior
0%
100%
cybersavior,
User Rank: Strategist
6/14/2017 | 4:47:17 PM
Submission

Horsey McHornface

Brad_Martin
60%
40%
Brad_Martin,
User Rank: Strategist
6/14/2017 | 11:18:06 AM
Caption

Hmmm, it doesn't look malicious - I'll click it!

cybersavior
50%
50%
cybersavior,
User Rank: Strategist
6/14/2017 | 10:03:20 AM
Caption
Don't misspell "run icon".
LynnB069
40%
60%
LynnB069,
User Rank: Apprentice
6/13/2017 | 1:29:47 PM
Cartoon quote
Harry's managers didn't understand the true value of finding a zero-day, so he elected to use props.
papa.surf
50%
50%
papa.surf,
User Rank: Apprentice
6/9/2017 | 4:24:49 PM
Re: Not Java?
I know they've warned us about "trojan horses" messing up the computers but this thing is totally ridiculous.
<<   <   Page 7 / 13   >   >>


White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
The Fundamental Flaw in Security Awareness Programs
Ira Winkler, CISSP, President, Secure Mentem,  7/19/2018
Number of Retailers Impacted by Breaches Doubles
Ericka Chickowski, Contributing Writer, Dark Reading,  7/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14505
PUBLISHED: 2018-07-22
mitmweb in mitmproxy v4.0.3 allows DNS Rebinding attacks, related to tools/web/app.py.
CVE-2018-14500
PUBLISHED: 2018-07-22
joyplus-cms 1.6.0 has XSS via the manager/collect/collect_vod_zhuiju.php keyword parameter.
CVE-2018-14501
PUBLISHED: 2018-07-22
manager/admin_ajax.php in joyplus-cms 1.6.0 has SQL Injection, as demonstrated by crafted POST data beginning with an &quot;m_id=1 AND SLEEP(5)&quot; substring.
CVE-2018-14492
PUBLISHED: 2018-07-21
Tenda AC7 through V15.03.06.44_CN, AC9 through V15.03.05.19(6318)_CN, and AC10 through V15.03.06.23_CN devices have a Stack-based Buffer Overflow via a long limitSpeed or limitSpeedup parameter to an unspecified /goform URI.
CVE-2018-3770
PUBLISHED: 2018-07-20
A path traversal exists in markdown-pdf version &lt;9.0.0 that allows a user to insert a malicious html code that can result in reading the local files.