Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)A

Areldyb [he/him]

@ Areldyb @beehaw.org

Posts
0
Comments
4
Joined
3 yr. ago

  • a glance at their artist image and bio should be enough to persuade even the least skeptical observer.

    At least we know the article was written by a human.

  • I mostly rely on built-in "scheduled send" features these days, but in the past (and possibly future, can't remember!) I've used Time Cave and been happy with it.

  • If your router isn't even a Linksys router, then it's most likely a false positive result and can be safely ignored. If you want to be extra sure, you could attempt to actually exploit the vulnerability with routersploit and see whether you get anywhere.

    In general, the fix for a vulnerability in an end-user network device is some combination of "update the firmware" and "disable the vulnerable feature".