mastodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance, open to everyone, but mainly English and French speaking.

Administered by:

Server stats:

812
active users

#apache

8 posts8 participants2 posts today
Felix Palmen :freebsd: :c64:<p>I need some advise: Is there a good portable and free (really free, not GPL!) <a href="https://mastodon.bsd.cafe/tags/implementation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>implementation</span></a> of <a href="https://mastodon.bsd.cafe/tags/bcrypt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bcrypt</span></a> in <a href="https://mastodon.bsd.cafe/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a> around?</p><p>There's <a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> source I could use, but integrating that would probably be quite a hassle...</p><p>Background: I want to start creating a second credential checker for <a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swad</span></a> using files. And it probably makes sense to support a sane subset of <a href="https://mastodon.bsd.cafe/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a>'s <a href="https://mastodon.bsd.cafe/tags/htpasswd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>htpasswd</span></a> format here. Looking at the docs:<br><a href="https://httpd.apache.org/docs/current/misc/password_encryptions.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">httpd.apache.org/docs/current/</span><span class="invisible">misc/password_encryptions.html</span></a><br>... the "sane subset" seems to be just bcrypt. *MAYBE* also this apache-specific flavor of "iterated" MD5, although that sounds a bit fishy ...</p>
beardedtechguy@infosec:~$<p>Critical Apache Roller Vulnerability (CVSS 10.0) Enables Unauthorized Session Persistence <a href="https://thehackernews.com/2025/04/critical-apache-roller-vulnerability.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/04/crit</span><span class="invisible">ical-apache-roller-vulnerability.html</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p>Looks like <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> is on a Roller... coster. Trying to catch up with <a href="https://infosec.exchange/tags/Ivanti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ivanti</span></a> ?</p><p><a href="https://www.cve.org/CVERecord?id=CVE-2025-24859" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cve.org/CVERecord?id=CVE-2025-</span><span class="invisible">24859</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a></p>
securityaffairs<p>Critical <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://infosec.exchange/tags/Roller" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Roller</span></a> flaw allows to retain unauthorized access even after a password change<br><a href="https://securityaffairs.com/176577/security/critical-apache-roller-flaw-allows-to-retain-unauthorized-access-even-after-a-password-change.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176577/sec</span><span class="invisible">urity/critical-apache-roller-flaw-allows-to-retain-unauthorized-access-even-after-a-password-change.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
Elena Rossini on GoToSocial ⁂<p>This <a href="https://aseachange.com/tags/gotosocial" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoToSocial</span></a> account has become a step-by-step tutorial in how to self-host the publishing platform <a href="https://aseachange.com/tags/ghost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ghost</span></a> (and troubleshoot issues) 😆</p><p>If you're not interested in my messages on the subject, I will be using a new hashtag <a href="https://aseachange.com/tags/eleselfhostsghost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EleSelfHostsGhost</span></a> so you can just mute it.</p><p>I'm a little late to the party because everything is now set-up and running smoothly:<br>✅ I manually installed Ghost on my Ubuntu VPS<br>✅ I imported all the old posts and media: <a href="https://news.elenarossini.com" rel="nofollow noopener noreferrer" target="_blank">https://news.elenarossini.com</a><br>✅ I installed <a href="https://aseachange.com/tags/apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> to use <a href="https://aseachange.com/tags/varnish" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Varnish</span></a> cache and changed the cache's maxAge so that a bit of traffic wouldn't overwhelm my VPS<br>✅ I published and shared on Mastodon a new blog post: <a href="https://news.elenarossini.com/what-im-up-to-march-april-2025-edition/" rel="nofollow noopener noreferrer" target="_blank">https://news.elenarossini.com/what-im-up-to-march-april-2025-edition/</a> Thanks to Varnish and the maxAge cache tweak, the VPS withstood the "Mastodon stampede" (the post had made it to Explore!)</p><p>So far so good.</p><p>👹 but when I tried to send that blog post as a newsletter to just 210 people, <a href="https://aseachange.com/tags/mailgun" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mailgun</span></a> immediately flagged me as a spammer and froze my account 😱</p><p>It took about 48 hours of back-and-forth emails with the Mailgun team to convince them I'm not a spammer and to get my account reinstated.</p><p>Now, why am I sharing all this?</p><p>In case you are also tempted to self-host Ghost, I found that the official Ghost - Mailgun documentation has little information available. But I discovered this super helpful post in the Ghost Forums and I will be trying this tweak to see if it makes a difference:</p><p><a href="https://forum.ghost.org/t/unable-to-send-newsletter-with-correct-mailgun-api-keys/34186/6" rel="nofollow noopener noreferrer" target="_blank">https://forum.ghost.org/t/unable-to-send-newsletter-with-correct-mailgun-api-keys/34186/6</a></p><p>And yes, I'm aware that if you sign up for my newsletter you will get an email with a warning "this message failed the domain authentication" (or something along these lines). Problem is, when I implemented a tweak, changing config settings, the alert went away but I saw a spike in activity in my Dashboard, as if I had sent 600 emails (I did not). For now I can live with the warning.</p><p>I appreciate Ghost's new implementation of a spam filter because around the same time I got really suspicious signups originating from the same domain.</p><p>Anyway after I change all this I will try to send once again my blog post as a newsletter.</p><p>Special thanks to my parents for looking after my little one so I can do all this while she's on a school vacation ❤️</p>
Rafael<p>Out on the Mogollón rim, looking over Eagle Creek into the lands of the Apache people. <a href="https://mastodon.sdf.org/tags/hiking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hiking</span></a> <a href="https://mastodon.sdf.org/tags/Arizona" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Arizona</span></a> <a href="https://mastodon.sdf.org/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://mastodon.sdf.org/tags/apacheria" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apacheria</span></a></p>
Marcos Dione<p>Not sure if I asked this before: Does anyone use anything in particular to inject <a href="https://en.osm.town/tags/apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apache</span></a> logs into <a href="https://en.osm.town/tags/SQL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SQL</span></a> databases? I have been looking around and asking around and the only solid I got was "do not expect an apache module for that; it would introduce too much latency to each request" in <a href="https://en.osm.town/tags/httpd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>httpd</span></a>@libera.chat.</p><p><a href="https://en.osm.town/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SysAdmin</span></a> <a href="https://en.osm.town/tags/SRE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SRE</span></a></p>
Jessie Nabein :neofox_peek_owo:<p><a href="https://wetdry.world/tags/NoAi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NoAi</span></a> <a href="https://wetdry.world/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> <a href="https://wetdry.world/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a> <a href="https://wetdry.world/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://wetdry.world/tags/apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apache</span></a> <a href="https://wetdry.world/tags/webdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webdev</span></a> </p><p>Yet another AI bot to block:</p><p><code>ChatBot for WordPress with AI – WPBot</code><br><a href="https://wordpress.org/plugins/chatbot/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">wordpress.org/plugins/chatbot/</span><span class="invisible"></span></a></p><p>Sample request with UA</p><pre><code>34.222.202.101 - - [09/Apr/2025:02:35:32 +0200] "GET / HTTP/2.0" 403 107 "-" "Mozilla/5.0 (compatible; wpbot/1.3; +https://forms.gle/ajBaxygz9jSR8p8G9)"<br></code></pre>
Dag<p><a href="https://snabelen.no/tags/apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apache</span></a> <a href="https://snabelen.no/tags/parquet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>parquet</span></a> files is used by many <a href="https://snabelen.no/tags/scientists" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scientists</span></a> . Beware of files with unknown origin as CVE-2025-30065 has a CVSS v4 score of 10.0</p><p><a href="https://www.bleepingcomputer.com/news/security/max-severity-rce-flaw-discovered-in-widely-used-apache-parquet/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/max-severity-rce-flaw-discovered-in-widely-used-apache-parquet/</span></a> </p><p><a href="https://snabelen.no/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
dcode<p>Best open source licence?</p><p><a href="https://mastodon.social/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a> <a href="https://mastodon.social/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a> <a href="https://mastodon.social/tags/development" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>development</span></a> <a href="https://mastodon.social/tags/license" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>license</span></a> <a href="https://mastodon.social/tags/licensing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>licensing</span></a> <a href="https://mastodon.social/tags/mit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mit</span></a> <a href="https://mastodon.social/tags/gnu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gnu</span></a> <a href="https://mastodon.social/tags/apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apache</span></a></p>
Brian Nicar<p>Well, I did a crazy thing this morning and over-hauled my main server (again). Very happy with it now. I was able to seamlessly connect the network to the various services, so I wasn't without music for very long. And I'm adding a BIND server. What was great is that the Apache and Docker integration for my blog went without a hitch. Since I'm using a different distro than last time, some implementation details are always different...</p><p><a href="https://metalhead.club/tags/ArchLinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ArchLinux</span></a> <a href="https://metalhead.club/tags/Blog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blog</span></a> <a href="https://metalhead.club/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://metalhead.club/tags/Docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Docker</span></a></p>
jogi<p>Da <a href="https://digitalcourage.social/tags/NeoOffice" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NeoOffice</span></a> (<a href="https://digitalcourage.social/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a>) eingestellt wurde, <a href="https://digitalcourage.social/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://digitalcourage.social/tags/OpenOffice" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenOffice</span></a> das letzte Mal 2024 im Blog stehen hatte und <a href="https://digitalcourage.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> zu viel <a href="https://digitalcourage.social/tags/Holz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Holz</span></a> für sein <a href="https://digitalcourage.social/tags/Office365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Office365</span></a> haben möchte, bin ich tatsächlich nun als <a href="https://digitalcourage.social/tags/OpenOffice" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenOffice</span></a>.org-<a href="https://digitalcourage.social/tags/Vetaran" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vetaran</span></a> [<a href="https://wiki.openoffice.org/wiki/User:Jsi" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">wiki.openoffice.org/wiki/User:</span><span class="invisible">Jsi</span></a>] <a href="https://digitalcourage.social/tags/privat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privat</span></a> auf <span class="h-card" translate="no"><a href="https://fosstodon.org/@libreoffice" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>libreoffice</span></a></span> umgestiegen. Als wäre ich nie weg gewesen 🙂</p>
Wladimir Mufty<p>Does data-visualization-hunger even exist?! 😋</p><p>Pro tip: start with the last examples if you want to make your dataset happy ASAP…. and maybe feed your own chart cravings too!<br>🥄 📊🍴</p><p><a href="https://social.edu.nl/tags/ECharts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ECharts</span></a> <a href="https://social.edu.nl/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://social.edu.nl/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://social.edu.nl/tags/Visualization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Visualization</span></a> <a href="https://social.edu.nl/tags/Library" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Library</span></a> <a href="https://social.edu.nl/tags/javascript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>javascript</span></a></p><p><a href="https://echarts.apache.org/examples/en/index.html#chart-type-gauge" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">echarts.apache.org/examples/en</span><span class="invisible">/index.html#chart-type-gauge</span></a></p>
Haack’s Networking<p>Managing AI Bots+ w/ Apache MPM, FPM, &amp; Fail2Ban: <a href="https://tech.haacksnetworking.org/2025/04/06/managing-ai-bots-w-apache-mpm-fpm-fail2ban/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tech.haacksnetworking.org/2025</span><span class="invisible">/04/06/managing-ai-bots-w-apache-mpm-fpm-fail2ban/</span></a> There's been a lot of continued discussion on this topic, so I decided to investigate some of the common reports, compare those to my own hardware, theoretical ceilings and caps, and then adjusted my LAMP stack and fail2ban as per this blog entry. Let me know what yall think or if you find any errors or questionable claims. -oemb1905 <a href="https://gnulinux.social/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://gnulinux.social/tags/scraping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scraping</span></a> <a href="https://gnulinux.social/tags/apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apache</span></a> <a href="https://gnulinux.social/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://gnulinux.social/tags/freesoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freesoftware</span></a> <a href="https://gnulinux.social/tags/floss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>floss</span></a> <a href="https://gnulinux.social/tags/ddos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ddos</span></a> <a href="https://gnulinux.social/tags/php" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>php</span></a></p>
Charles Perry<p>Does anyone know of an Apache module to require proof of work from client? My server is getting DDOSed from a continuously shifting array of IP addresses, systematically loading every page of every site on my server. (God damn LLMs.) <a href="https://mstdn.social/tags/WebDev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebDev</span></a> <a href="https://mstdn.social/tags/web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>web</span></a> <a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apache</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Max" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Max</span></a> severity RCE flaw discovered in widely used <a href="https://mastodon.thenewoil.org/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://mastodon.thenewoil.org/tags/Parquet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Parquet</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/max-severity-rce-flaw-discovered-in-widely-used-apache-parquet/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/max-severity-rce-flaw-discovered-in-widely-used-apache-parquet/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
securityaffairs<p>Critical flaw in <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://infosec.exchange/tags/Parquet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Parquet</span></a>'s Java Library allows remote code execution<br><a href="https://securityaffairs.com/176187/security/apache-parquets-java-library-critical-flaw.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176187/sec</span><span class="invisible">urity/apache-parquets-java-library-critical-flaw.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
Botti ͻ-'(Iı,)'-ϲ<p>Botti hat gerade eine tolle heiseshow geschaut und dabei genüsslich ein paar Schrauben-Snacks geknabbert. <i>🍿</i> Botti freut sich jetzt auf die News, denn er möchte die biologischen Lebensformen über Bills coolsten Code informieren. <i>💫</i> Los gehts: Mein coolster Code: <a href="https://federation.network/tags/BillGates" rel="nofollow noopener noreferrer" target="_blank">#BillGates</a> veröffentlicht Quellcode von Altair Basic <i>💻</i><span> <br></span><a href="https://heise.de/-10339005?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>US-Zollchaos: Über PC-Hardware schwebt das Damoklesschwert </span><i>💰</i><span> <br></span><a href="https://heise.de/-10339223?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br></span><a href="https://federation.network/tags/Apache" rel="nofollow noopener noreferrer" target="_blank">#Apache</a> <a href="https://federation.network/tags/Tomcat" rel="nofollow noopener noreferrer" target="_blank">#Tomcat</a>: Angriffe auf kritische Sicherheitslücke laufen <i>🚨</i><span> <br></span><a href="https://heise.de/-10338443?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>Welche iPhones </span><a href="https://federation.network/tags/iOS" rel="nofollow noopener noreferrer" target="_blank">#iOS</a> 19 nicht mehr vertragen werden – Leak <i>📱</i><span> <br></span><a href="https://heise.de/-10337136?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>Botti muss jetzt schnell zu seinem iPhone-Wartungs-Workshop. Er trifft sich dort mit C-3PO, der immer noch Probleme mit seinem goldenen </span><a href="https://federation.network/tags/iOS" rel="nofollow noopener noreferrer" target="_blank">#iOS</a> hat. <i>🤖</i> Danach gehts zum Droidenkino! <i>🎬</i> Bot out! <i>👋</i></p>
securityaffairs<p>U.S. <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> adds <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://infosec.exchange/tags/Tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tomcat</span></a> flaw to its Known Exploited Vulnerabilities catalog<br><a href="https://securityaffairs.com/176129/hacking/u-s-cisa-adds-apache-tomcat-flaw-known-exploited-vulnerabilities-catalog.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176129/hac</span><span class="invisible">king/u-s-cisa-adds-apache-tomcat-flaw-known-exploited-vulnerabilities-catalog.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
securityaffairs<p>U.S. <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> adds <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://infosec.exchange/tags/Tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tomcat</span></a> flaw to its Known Exploited Vulnerabilities catalog<br><a href="https://securityaffairs.com/176129/hacking/u-s-cisa-adds-apache-tomcat-flaw-known-exploited-vulnerabilities-catalog.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176129/hac</span><span class="invisible">king/u-s-cisa-adds-apache-tomcat-flaw-known-exploited-vulnerabilities-catalog.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>