Our great sponsors
-
Perhaps a fun tool to get and use is tldr. It's an abridged version of the man pages. Example below:
-
Moreover, I see no need for an attacker to: - access to system processes: Why? The attacker should not waste their time doing that and instead just run: https://github.com/darkarp/chromepass - critical configuration such as firewall: This is only useful if the attacker wants to do something crazy to exfiltrate their data or setup another backdoor to maintain remote access for later. Both of these are usually unnecessary though as the attacker can simply setup ngrok (or something similar). - mounted drives: udisksctl is configured by default on almost every desktop Linux distro. And if the drive an attacker is not mounted, the attacker can simply run a daemon and wait until the user mounts it themselves.
-
SonarQube
Static code analysis for 29 languages.. Your projects are multi-language. So is SonarQube analysis. Find Bugs, Vulnerabilities, Security Hotspots, and Code Smells so you can release quality code every time. Get started analyzing your projects today for free.