Leaflet@lemmy.world to Linux@lemmy.mlEnglish · 1 year agoAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netexternal-linkmessage-square32fedilinkarrow-up1172file-text
arrow-up1172external-linkAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netLeaflet@lemmy.world to Linux@lemmy.mlEnglish · 1 year agomessage-square32fedilinkfile-text
minus-squareryannathans@aussie.zonelinkfedilinkarrow-up5·1 year agoGoing to rely on security through obscurity instead?
Going to rely on security through obscurity instead?