Comments
Name That Toon: Screen Sharing
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 7 / 13   >   >>
DarwinS524
0%
100%
DarwinS524,
User Rank: Apprentice
6/25/2017 | 3:03:30 PM
Cartoon Contest
See!!!  I TOLD you guys this new graphics card was worth the extra money!!!
robert.hoisington
67%
33%
robert.hoisington,
User Rank: Apprentice
6/23/2017 | 3:12:20 PM
UaaS?
... yeah - this is just the free tier....
NUTsTUN
75%
25%
NUTsTUN,
User Rank: Apprentice
6/20/2017 | 9:00:12 AM
M-x unicorn
"Wow, they weren't lying! Emacs does have a command for everything..."
incredmo
0%
100%
incredmo,
User Rank: Apprentice
6/18/2017 | 4:36:41 AM
Name That Toon: Screen Sharing, 3D unicorns
Some startup claims they can create 3D unicorns, ( I thought I had heard every troll request for funding). Guys you are not going to believe this one.
Brad_Martin
67%
33%
Brad_Martin,
User Rank: Strategist
6/15/2017 | 8:00:10 AM
caption
Betty:  Dave, aren't you suppose to be researching unix?

Dave: Sorry boss, I think I made a typeo on my search

Betty: Thank Alpha that I hadn't asked you to research Hard Disk...
cybersavior
0%
100%
cybersavior,
User Rank: Strategist
6/14/2017 | 4:47:17 PM
Submission

Horsey McHornface

Brad_Martin
60%
40%
Brad_Martin,
User Rank: Strategist
6/14/2017 | 11:18:06 AM
Caption

Hmmm, it doesn't look malicious - I'll click it!

cybersavior
50%
50%
cybersavior,
User Rank: Strategist
6/14/2017 | 10:03:20 AM
Caption
Don't misspell "run icon".
LynnB069
40%
60%
LynnB069,
User Rank: Apprentice
6/13/2017 | 1:29:47 PM
Cartoon quote
Harry's managers didn't understand the true value of finding a zero-day, so he elected to use props.
papa.surf
50%
50%
papa.surf,
User Rank: Apprentice
6/9/2017 | 4:24:49 PM
Re: Not Java?
I know they've warned us about "trojan horses" messing up the computers but this thing is totally ridiculous.
<<   <   Page 7 / 13   >   >>


Why CISOs Need a Security Reality Check
Joel Fulton, Chief Information Security Officer for Splunk,  6/13/2018
Cisco Talos Summit: Network Defenders Not Serious Enough About Attacks
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2018
Meet 'Bro': The Best-Kept Secret of Network Security
Greg Bell, CEO, Corelight,  6/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12294
PUBLISHED: 2018-06-19
WebCore/platform/graphics/texmap/TextureMapperLayer.cpp in WebKit, as used in WebKitGTK+ prior to version 2.20.2, is vulnerable to a use after free for a WebCore::TextureMapperLayer object.
CVE-2018-12519
PUBLISHED: 2018-06-19
An issue was discovered in ShopNx through 2017-11-17. The vulnerability allows a remote attacker to upload any malicious file to a Node.js application. An attacker can upload a malicious HTML file that contains a JavaScript payload to steal a user's credentials.
CVE-2018-12588
PUBLISHED: 2018-06-19
Cross-site scripting (XSS) vulnerability in templates/frontend/pages/searchResults.tpl in Public Knowledge Project (PKP) Open Monograph Press (OMP) v1.2.0 through 3.1.1-1 before 3.1.1-2 allows remote attackers to inject arbitrary web script or HTML via the catalog.noTitlesSearch parameter (aka the S...
CVE-2018-10811
PUBLISHED: 2018-06-19
strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable.
CVE-2018-10945
PUBLISHED: 2018-06-19
The mg_handle_cgi function in mongoose.c in Mongoose 6.11 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash, or NULL pointer dereference) via an HTTP request, related to the mbuf_insert function.