Skip to main content

小白观察:Firefox 推出密码泄露检测服务 | Linux 中国

Big News
Firefox 推出密码泄露检测服务:Firefox 上线了新的服务 Firefox Monitor ,该服务能够查询你的密码是否出现在数据外泄事件中。
Firefox Monitor 不仅提供了已有密码泄露事件的追踪,还提供了新外泄事件的警报,不妨订阅一份,保证自己的密码安全尽在掌控。下面还为你推荐了一篇文章 —— 网络安全 101,教你如何保护自己的安全。
Firefox Monitor 地址:https://monitor.firefox.com/
网络安全 101:https://www.zdnet.com/article/online-security-101-how-to-protect-your-privacy-from-hackers-spies-and-the-government/
Quick News
SUSE 即将替代 RedHat,成为最大的独立 Linux 公司
由于 Red Hat 被 IBM 收购和 SUSE 的连续增长,SUSE 将成为最大的独立 Linux 公司。【ZDNet】[3]
WinRAR 使得 Windows 可能被黑客控制
微软透露,WinRAR 的安全漏洞 CVE-2018-20250 可能导致 Windows 被黑客所控制。 【ZDNet】[4]
免费好用的 7-Zip 了解一下?
Amazon 员工可能在窃听 Alexa 用户的隐私
一份新的报告显示,Alexa 的录音会被 Amazon 雇员听到并用于分析和优化 Alexa 的识别率。【ZDNet】[5]
你猜国内这些语音助手是怎么优化识别率的?

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...