writing.exchange is one of the many independent Mastodon servers you can use to participate in the fediverse.
A small, intentional community for poets, authors, and every kind of writer.

Administered by:

Server stats:

339
active users

#techtuesday

2 posts2 participants0 posts today

Web Monetization makes it easier than ever to offer new payment solutions, and getting started is simple:

1️⃣ Download the Web Monetization beta extension:
👉 Chrome | Firefox | Edge

2️⃣ Sign up for an Interledger Wallet to start supporting and engaging with content in a whole new way!

3️⃣ Connect your wallet and explore flexible payment options for your consumers.

Want to get started? Learn more at: webmonetization.org/

Announcement: Beta Launch of Web Monetization!

Web Monetization is here to offer more content support for owners and publishers, while consumers can access content on their own terms.

Today, we announce the beta release of the Web Monetization extension, allowing for seamless micropayments powered by Interledger Wallets.

Read all the details in our blog: interledger.org/news/announcin

#TechTuesday
This #Lemmy post programming.dev/post/22672085 links to the recording of the talk I gave earlier in the year, about how #dotNet #dotNetMAUI and other #programmers #developers can get the most out of #Mastodon and the #Fediverse in general. Show to people you want to come here, or watch yourself if you feel like you could learn more about it.

CC @andypiper @evanprodromou@evanp.me @evanprodromou@socialwebfoundation.org @Gargron @mapache @alvinashcraft @alvinashcraft.com @jamesmontemagno

programming.dev"Finding your way around the Fediverse" recording - programming.devEarlier this year I gave this talk which is about how programmers can get the most of the Fediverse, particularly for dotnet/MAUI developers - some of the killer features which are available and how to use them. The focus of the examples are with dotnet/MAUI, but these things would undoubtedly also be available for other languages/ecosystems, I was just using dotnet/MAUI to illustrate the underlying functionality available to us here. This recording would be good for anyone who isn’t familiar with these features (maybe anyone you want to convince to come here, or just if you feel you don’t know everything that is available). The first part of the recording is a different talk about MAUI, and the first link below will be where my talk starts, and then some more links for other key points, if you just want to see the parts you don’t already know about. Following these recording links will be links to resources that I talked about… 30:06 start/MAUI Lemmy community [https://youtu.be/hCzYawTqnT4?si=sDQXhygjxDBQPitL&t=1806] 31:31 overview of talk [https://youtu.be/hCzYawTqnT4?si=izcKF3v1mtdqu3FZ&t=1891] 33:20 what is the Fediverse? [https://youtu.be/hCzYawTqnT4?si=qkcwJq1LZ0IgdGbv&t=2000] 38:15 Lemmy [https://youtu.be/hCzYawTqnT4?si=cUdRxzt-zbtSZsCW&t=2295] 42:08 Mastodon [https://youtu.be/hCzYawTqnT4?si=02oTLWHQ9IsZSFAq&t=2528] 43:40 Mastodon dotnet.social [https://youtu.be/hCzYawTqnT4?si=alg3HYcUZNagjHac&t=2620] 46:33 Mastodon Local timeline [https://youtu.be/hCzYawTqnT4?si=WIpFq8h1Oh7ooYua&t=2793] 48:01 Mastodon Federated timeline [https://youtu.be/hCzYawTqnT4?si=9Gh1Dz8FYigBv3qR&t=2881] 60:11 Mastodon Lists [https://youtu.be/hCzYawTqnT4?si=zoIl6VtHiCEBZnDs&t=3011] 56:28 Mastodon hashtags [https://youtu.be/hCzYawTqnT4?si=njy2vmPxeTSm8YYC&t=3388] 56:25 Mastodon pinned posts [https://youtu.be/hCzYawTqnT4?si=3nAWOpnG95W8rQHZ&t=3566] 1:00:20 follow Twitter accounts from Mastodon [https://youtu.be/hCzYawTqnT4?si=23Dwa58JrSHNssm2&t=3620] 1:01:51 how to use Lemmy from Mastodon [https://youtu.be/hCzYawTqnT4?si=JxBjpdeoMasVhGpt&t=3711] 1:07:25 Mastodon’s killer feature for dev’s - github bots [https://youtu.be/hCzYawTqnT4?si=i3JsdK39Ffehx9ep&t=4045] 1:10:47 Guide to Mastodon for .NET and MAUI people [https://youtu.be/hCzYawTqnT4?si=VZps5Df6oljHcVBr&t=4247] 1:13:15 Pixelfed, UI comparison [https://youtu.be/hCzYawTqnT4?si=Q3_cba-A-cAdN_KM&t=4430] 1:15:41 Maho Pacheco’s repo (federate static website, etc.) [https://youtu.be/hCzYawTqnT4?si=lbmmpMTf7nESMjxo&t=4541] 1:17:52 Microsoft DevBlogs [https://youtu.be/hCzYawTqnT4?si=Y61LToQMQ_Utnas_&t=4672] Links to resources from this talk Creating MAUI UI’s in C# [https://dev.to/smartmanapps/creating-maui-uis-in-c-1adf] fediverse.party [https://fediverse.party/] .NET MAUI @ programming.dev [https://programming.dev/c/dotnetmaui] .NET MAUI Mastodon bot [https://dotnet.social/@dotnetmaui@programming.dev] .NET Mastodon bot [https://dotnet.social/@bot] @SmartmanApps@dotnet.social [https://dotnet.social/@SmartmanApps] Join dotnet.social [https://dotnet.social/invite/q8pzN9rL] Join dotnet.social and auto-follow @SmartmanApps@dotnet.social [https://dotnet.social/invite/JntHpwzG] How to follow multiple hashtags in a column [https://dotnet.social/@SmartmanApps/110858924945208556] @Microsoft@bird.makeup [https://bird.makeup/users/microsoft] Github bots by Carlos Sanchez of Microsoft [https://dotnet.social/@foo_fighter]… Dotnet github bot [https://dotnet.social/@dotnetbot] MAUI github bot [https://dotnet.social/@mauibot] MastodonGitHubBot repo [https://github.com/ChayoteJarocho/MastodonGitHubBot] Guide to Mastodon for dotNetMAUI and dotNet peeps [https://dotnet.social/@SmartmanApps/110648925352232498] Github repo [https://github.com/mahomedalid] of Maho Paheco of Microsoft [https://dotnet.social/@mapache@hachyderm.io] Maho’s guide to implement ActivityPub in a static site (or any website) [https://maho.dev/2024/02/a-guide-to-implement-activitypub-in-a-static-site-or-any-website/] Follow Maho’s blog [https://dotnet.social/@blog@maho.dev] from Mastodon (or almost any Fediverse service!) Follow Microsoft DevBlogs [https://dotnet.social/@msftdevblogs] (federated thanks to Maho)

Solar energy is a clean, renewable power source. It’s harnessed using solar panels which are made up of solar cells.

Solar energy is sustainable, reduces carbon footprints, and is an important step towards a greener future. This new factory, bringing jobs and training to Albuquerque, was make possible by the Inflation Reduction Act. #DemocratsDeliver #TechTuesday #GreenTech #RenewableEnergy #Solar

New solar cell manufacturing factory will bring 900 jobs to Albuquerque:
nmpoliticalreport.com/quick-re

Calling #sysadmins using PKP software!

Want to upgrade to 3.4 but not sure if your server environment is ready? Read our Release Notebook for everything your sysadmin will need.

✔ Minimum PHP version bump
✔ Changes to config options
✔ Recommendations for processing jobs
✔ Breaking changes for custom plugins and themes

docs.pkp.sfu.ca/dev/release-no

1/5
This week I have a #MathsMonday #TechTuesday cross-over event. 🙂 I'm going to use #Mathematics topics as my examples, but the tip can be applied to any kind of #hashtags you're following on #Mastodon, not just #Maths, that tip being how you can follow multiple #Math (or other) hashtags in a List! This means you can now exclude your followed hashtags from your Home timeline! With thanks to @jasdemi for the original post about this - jasdemi.com/@jasdemi/statuses/

Here are the steps...

Thanks to a world-wide community of users & contributors, PKP's free open source software for #ScholarlyPublishing, Open Journal Systems (#OJS), has more than 44,000 installations globally!

Wondering about key features, documentation, user guides, downloads, world-wide usage, how it works, or trying a demo?

Control your publishing with workflow & production by scholars, for scholars: pkp.sfu.ca/software/ojs/

#TechTuesday #OpenJournalSystems #ScholComm #AcademicChatter @academicchatter

Active Directory Certificate Services (AD CS) is Microsoft's way to establish and manage a public key infrastructure in Active Directory. It can be used to manage certificate templates, issue certificates or revoke them. And because those certificates can be used for client authentication, AD CS is a very appealing target for attackers.

We have already looked at the escalation primitive "ESC1" before (infosec.exchange/@lutrasecurit). Today we will have a look at ESC4. Just like ESC1, an attacker can abuse this misconfiguration to escalate their privileges from a regular domain user to Domain Admin.

This time, the misconfiguration is that a regular domain user can modify a certificate template. This means, that an attacker can simply modify the template and configure it to be vulnerable to ESC1. Then, the attacker can easily exploit the ESC1 misconfiguration they added and escalate their privileges.

The tool "Certify" can be used to identify and perform almost all AD CS attacks. In case of ESC4, an attacker only needs to change the certificate template to allow the enrollee to supply a subject (CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT). Then, an attacker can request a certificate using the modified template and provide the username that they want to impersonate as an argument. That’s it. They can now impersonate the user and take over the entire domain.

So how can you detect and defend against it?

First and foremost: CA servers are Tier 0 assets. This means that they are as important as your Domain Controller and should be hardened as such. To fix the misconfiguration, you need to review the permissions for the certificate template in question. For this, open “Certificate Authority”, right-click on “Certificate Templates” and choose “Manage”. There you can view the “Security” tab within the properties and manage the permissions (see screenshot). In this case, remove the dangerous permissions of the Domain Users group (Full Control, Write).

For detection, monitor requests (EID 4886) and issuing (EID 4887) of certificates as well as the modification of CA settings, such as certificate template modifications. And of course: Search for these types of misconfigurations to find them before the real attackers do.

I'm working on a use case to detect unusual increases in interactive logins to Windows machines, indicating potential lateral movement (MITRE T1021). To achieve this, I’m using a tstats search on the authentication data model, leveraging standard deviation to calculate dynamic thresholds by user and asset. If these thresholds are breached, an alert is triggered. 🚨

Here’s a more detailed look at the SPL I’m using:

| tstats summariesonly=true dc(Authentication.dest) as device_count from datamodel=Authentication where Authentication.action=success AND source=WinEventLog:Security AND NOT Authentication.user IN ("DWM-*" "UMFD-*") by _time span=1d Authentication.user
| eventstats avg(device_count) as avg_devices stdev(device_count) as stdev_devices by Authentication.user
| eval threshold=avg_devices + 2.5*stdev_devices
| where device_count > threshold AND stdev_devices > 1

This approach helps in identifying potential security threats by dynamically adjusting thresholds based on user and asset behavior.

Interested in the SPL or need it for another SIEM system? Drop a comment or DM me! 💬

Ever since the iPad came out, a tablet has been an integral part of my tech setup, both for personal and work purposes.. Whether it’s been an iPad itself, an Android tablet, or a Chromebook running Android apps, a tablet has put the “product” in my “productivity”. A couple recent YouTube videos have had me start to question whether I truly need a tablet in my technology rotation.

#Technology #TechTuesday

medi-nerd.com/2024/06/04/tech-

Attackers typically use masquerading to either trick users into running a malicious file, confuse defenders, or attempt to blend into a target environment. Today, we will take a look at the MITRE TTP "Masquerading: Right-to-Left Override" (T1036.002) and will see, how an attacker can use this feature to their advantage.

First things first: What is "Right-to-Left Override" (RTLO) anyway? As we all know, there are languages that are written from left to right and others that are written from right to left. In computers, the RTLO Unicode character U+202E makes this possible. This character can be used to force a right-to-left direction for text. As an example, let's look at the string "LutraSecurity" and see what happens when we insert the RTLO character in the middle: "Lutra[U+202E]Security" (where [U+202E] is the RTLO character). This string will then be displayed as "LutraytiruceS", because the RTLO character reverts everything after it, in this case the "Security".

So what can an attacker do with this? In filenames, they can abuse RTLO to conceal the true extension of a file. For example, let's say you find the following file somewhere on a network drive:

Salaries-And-Benefits-Annexe.pdf

You know that a PDF is mostly harmless, so you double-click it to see what's inside. But your PDF viewer will not open. This is because you have actually just run an .exe file.

Why? Because the filename of the file is not really "Salaries-And-Benefits-Annexe.pdf". The attacker has added the RTLO character to reverse the last characters of the filename to make it look like a PDF ("exe.pdf" instead of "fdp.exe"). So the actual filename is "Salaries-And-Benefits-Ann[U+202E]fdp.exe".

Bad news is: There isn’t much that can be done about that. The only thing possible is to look out for files that have the inherently benign RTLO character within their filename. This can be done with a filesystem minifilter. But of course, this only works if right-to-left languages are rarely used in your organization. Otherwise there will be too many false positives.

🚀 Today's Tip is for the #Excel Enthusiasts! 📊✨

Tired of images floating on top of your Excel sheet? Say goodbye to the struggle! 🖼️ With the revolutionary IMAGE formula, you can seamlessly insert images into your worksheet cells.

👉 Learn how to use the IMAGE formula to keep your images neatly within cells, maintaining that perfect aspect ratio. 📏💡Explore sizing options, from fitting to the cell to creating custom dimensions with a breeze! 💻📐

No more copy-pasting woes! 🔄 Watch my video to discover the ultimate way to insert those images into your worksheets!
🎥 buff.ly/3GhMCll