ryannathans@aussie.zonetoLinux@lemmy.ml•Attacking UNIX Systems via CUPS, Part I | CUPS Remote Code Execution
0·
2 days agoTo be vulnerable to what?
To be vulnerable to what?
Firewall on everything gonna block that lol
Going to rely on security through obscurity instead?
Someone doesn’t like apple
Did it not before? I’m not seeing any issues
Unattended? I’d use a bios password and disk encryption
Checking the basics… You got a firewall right? It’s on? Ports closed?
Are you going to leave your pc unattended? At all?
Nice just look at the most worn buttons
I could similarly link you an internet search for http or tls vulnerability, I fail to see your point