#exec

misryoum global news networkUs_Today
2026-03-04

Does it really matter who ends up owning Warner Bros.? Media exec Tom Rogers breaks it down

misryoum.com/us/economy/does-i

Paramount Skydance CEO, David Ellison and CEO of Warner Bros. Discovery, David Zaslav.David A. Grogan | US News Hub MISRYOUM| Patrick T. Fallon | AFP | Getty Images |It is extremely rare for a merger and acquisition story to break...

misryoum global news networkUs_Today
2026-02-26

UFC White House event to cost 'upwards of $60 million,' exec says

misryoum.com/us/sports/ufc-whi

NEWYou can now listen to US News Hub articles! This year is full of momentous sporting events in the United States, including the first-of-its-kind UFC card at the White House. However, the event, which is scheduled for June 14, will...

2026-02-24

@seulavecvous

On a joué avec #Exec et #LaSécurité il y a quelques mois
Bah c'était une trop chouette soirée !
Et les canadiens repassent en France en juin
lasecurite.bandcamp.com/music

@hiddenbayrec

2026-02-18

Я пишу свой терминал с нуля, чтобы понять как работает компьютер

Что происходит, когда вы вводите ls в терминале? Как 2 буквы превращаются в список файлов на экране? Я решил разобраться и написал свой терминал с нуля на C++. В этой статье я объясняю через метафору ресторана, как работают три магических системных вызова — fork() , exec() и wait() — которые лежат в основе любого терминала. Вы узнаете, почему cd нельзя сделать обычной программой, как работает перенаправление > , и какой коварный баг я поймал из-за непонимания процессов. Без сложной теории — только практика и понятные объяснения.

habr.com/ru/articles/1000766/

#shell #fork #exec #wait #системные_вызовы #процессы #linux #c++

Marcus "MajorLinux" Summersmajorlinux@toot.majorshouse.com
2025-12-16

Just because the ruling class is "technically" a part of a marginalized community, it doesn't absolve them of their shitty behavior.

Anthropic Exec Forces AI Chatbot on Gay Discord Community, Members Flee

404media.co/anthropic-exec-for

#Anthropic #Exec #AI #Chatbot #LGBTQIA #Discord #Community #Tech

Cybersecurity & cyberwarfarecybersecurity@poliverso.org
2025-12-05

Allarme Apache: falle SSRF e credenziali NTLM esposte. Admin, aggiornate subito!

Un aggiornamento significativo è stato distribuito dalla Apache Software Foundation per il diffuso Apache HTTP Server, correggendo un totale di cinque vulnerabilità di sicurezza distinte. È raccomandato che gli amministratori eseguano questo aggiornamento il prima possibile al fine di assicurare che la loro infrastruttura web sia protetta contro i vettori individuati.

La versione 2.4.66, appena rilasciata, rappresenta una correzione complessiva di problematiche che includono sia loop infiniti durante il rinnovo dei certificati sia possibili perdite di credenziali NTLM su sistemi operativi Windows.

Due delle vulnerabilità individuate, classificate come “moderate”, costituiscono rischi specifici per le configurazioni di hosting condiviso che impiegano suexec e per gli ambienti Windows, mentre le restanti tre sono etichettate come “bassa” gravità.

Tra le correzioni più significative di questo aggiornamento figura il CVE-2025-59775, una falla di sicurezza relativa alla falsificazione delle richieste lato server (SSRF) che interessa Apache HTTP Server in esecuzione su Windows. Questa vulnerabilità, considerata di gravità moderata, si verifica a causa dell’interazione tra le impostazioni AllowEncodedSlashes On e MergeSlashes Off.

Secondo quanto affermato nella nota, questa configurazione “consente di divulgare potenzialmente hash NTLM a un server dannoso tramite SSRF e richieste o contenuti dannosi”. Ciò potrebbe consentire agli aggressori di raccogliere credenziali dall’ambiente server, rendendola una patch prioritaria per gli amministratori Windows.

La seconda falla di gravità moderata, il CVE-2025-66200, riguarda l’interazione tra mod_userdir e suexec. Questa vulnerabilità consente di aggirarla tramite la direttiva AllowOverride FileInfo. Il report osserva che “gli utenti con accesso alla direttiva RequestHeader in htaccess possono causare l’esecuzione di alcuni script CGI con un ID utente inaspettato”. Ciò interrompe di fatto l’isolamento previsto della funzionalità suexec, fondamentale per la sicurezza in ambienti multiutente.

L’aggiornamento risolve ulteriori tre problemi di lieve gravità che, sebbene meno critici, potrebbero interrompere le operazioni o creare comportamenti imprevisti:

  • Ciclo infinito (CVE-2025-55753): un bug in mod_md (ACME) può causare un overflow durante i rinnovi di certificati non riusciti. Questo crea un potenziale scenario di esaurimento delle risorse.
  • Problema relativo alla stringa di query (CVE-2025-58098): riguarda i server che utilizzano Server Side Includes (SSI) con mod_cgid. L’avviso afferma che il server “passa la stringa di query con escape della shell alle direttive #exec cmd=’…'”.
  • Variable Override (CVE-2025-65082): questa falla riguarda “variabili impostate tramite la configurazione di Apache che sostituiscono inaspettatamente le variabili calcolate dal server per i programmi CGI”.

Si consiglia agli utenti di aggiornare alla versione 2.4.66 , che risolve il problema

L'articolo Allarme Apache: falle SSRF e credenziali NTLM esposte. Admin, aggiornate subito! proviene da Red Hot Cyber.

TechCrunch | Startup and Technology Newstechcrunch.com@web.brid.gy
2025-12-04
शून्यताwigalois@dresden.network
2025-11-10

#CMS lacks I/O redirection (Unix-like facilities have been added to #Theos); so CMS’s #EXEC has an unusual workaround that Theos retained: the #STACK and BEGSTACK keywords.

STACK (actually, &STACK, because all EXEC keywords and variables are prefixed with an ampersand) places a single line of text on a stack, which has precedence overthe keyboard puffer. When an EXEC script or other Theos program requests data from the keyboard, data placed by the STACK directive is read instead.

STACK, as its name suggests, is cumulative. For the really big jobs, a block of text can be surrounded by BEGSTACK and END keywords. An entire session with an application can be driven in this way. (t y)

2025-10-31

Kraków był nasz! Relacja z Mega Sekurak Hacking Party 2025

Mega Sekurak Hacking Party znów rozbiło bank! 20 października 2025 roku Centrum Kongresowe ICE w Krakowie ponownie stało się mekką dla pasjonatów cyberbezpieczeństwa. Rekordowa frekwencja onsite – ponad 1400 uczestników – oraz solidna reprezentacja online (400+) potwierdziła, że to nie jest zwykła konferencja, jakich wiele, a prawdziwa „rodzinna impreza” dla...

#Aktualności #Exec #Hackingparty #Konferencja #MegaSekurakHackingParty #Mshp #Sekurak

sekurak.pl/krakow-byl-nasz-rel

2025-10-25

[Перевод] Парадокс безопасности локальных LLM

Команда AI for Devs подготовила перевод исследования о парадоксе безопасности локальных LLM. Если вы запускаете модели на своём сервере ради приватности, эту статью стоит прочитать. Эксперименты показывают: локальные модели вроде gpt-oss-20b куда легче обмануть, чем облачные аналоги. Они чаще вставляют вредоносный код, не замечая подвоха, и превращаются в идеальную цель для атак.

habr.com/ru/articles/960132/

#LLM #безопасность #локальные_модели #атаки #бекдор #eval #exec #RedTeaming #приватность #разработка

Hoody.comHoody_AI
2025-10-23

Each subdomain is its own universe.

Hoody Exec isolates routing per subdomain. Separate scripts, cookies, storage.

Multi-tenant SaaS: customer-a.app.com → scripts/customer-a.app.com/. Zero config.

[id].ts captures parameters, [...slug].ts catches paths.

Proxy sites: techcrunch.com.{container}.hoody.com runs through your script. Inject AI, translate, transform.

pre.ts → main.ts → post.ts chain for clean middleware.

🔗 hoody.com

Marcus "MajorLinux" Summersmajorlinux@toot.majorshouse.com
2025-10-08

Seems not everyone at the top is in agreement.

Ex veteran Apple marketing exec challenges Tim Cook on ICEBlock

9to5mac.com/2025/10/08/former-

#Apple #Marketing #Exec #TimCook #CEO #ICEBlock #ICE #CPB #ACAB #Tech

Osna.FMosnafm
2025-07-09

Volkswagen has extended the contract of its China CEO, Ralf Brandstätter, by three years, according to reports from German business publication "Handelsblatt".... news.osna.fm/?p=7161 |

kxxtkxxt
2025-05-04

Upcoming features for

backtrace and jump to parent

In next release, the will support gathering the exec of any exec event, which will greatly simply debugging experience.

The exec backtrace shows the history of a specific event and indicates any ancestor spawns or directly tears itself down and becomes the new process.

Jump to parent is a lighter alternative to backtrace, where you just press `U` to jump to the parent exec evt.

kxxtkxxt
2025-04-28

tracexec 0.11.0 released with new timestamp feature and O_CLOEXEC file descriptors are now hidden by default.

github.com/kxxt/tracexec/relea

2025-04-23

Suite des vidéos de dev de modules kernel

Je présente ici un module Linux maison, REMOTEK, qui mixe du thread, de l'exécution et de la communication réseau avec des sockets, le tour évidemment en kernel land

youtu.be/-Is6B9nAFaI

Les codes et slides disponibles sur le serveur discord de l'association Kingdown : discord.gg/kingdown

Le projet : github.com/Gelules/remotek

#linux #kernel #module #reseau #network #socket #exec #thread #remotek #kingdown

2025-04-21

Suite des vidéos de dev de modules kernel, on voit ici comment utiliser exécuter du shell dans un module Linux

youtu.be/TGLWlKgbsSo

Les codes et slides disponibles sur le serveur discord de l'association Kingdown : discord.gg/kingdown

#linux #kernel #module #exec #shell #kingdown

Christian Brauner 🦊🐺brauner
2025-03-19

Honest question: What are use-cases for performing exec while multi-threaded? Seriously, if I were to add a patch that prevents calling exec while multi-threaded in the kernel what possible use-case would break?

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst