Isn't this the most innocent looking creature you have ever seen? There is absolutely not mischief going on here, only innocent raccoons to be found here.
#Wildlife #WildlifePhotography #Raccoon #Raccoons #SpookyKittiesRaccoons
Tech Generalist, currently titled Principal Engineer, Sysadmin and InfoSec background. Really, I'm just here for the pet pics, though.
Old Twitter bio: Tech generalist and auto enthusiast. I also like food and pets.
Isn't this the most innocent looking creature you have ever seen? There is absolutely not mischief going on here, only innocent raccoons to be found here.
#Wildlife #WildlifePhotography #Raccoon #Raccoons #SpookyKittiesRaccoons
#PatchTuesday 2026-02
Patching experience in my test lab (#homelab).
Windows 11 - No issues on any test machines / VMs.
Windows 10 - No issues on any test machines / VMs.
Windows Server 2016 - Normal, uneventful. KB5075902 - Servicing Stack Update.
Windows Server 2019 - Normal, uneventful.
Windows Server 2022 - Normal, uneventful.
Windows Server 2025 - Normal, uneventful.
Note: Notably intense malware scans after the latest Malicious Software Removal Tool installation.
Microsoft has released Windows 11 KB5077181 and KB5075941 cumulative updates for versions 25H2/24H2 and 23H2 to fix security vulnerabilities, bugs, and add new features.
The ancient 2012 MacBook Air (edit it's actually a 2019 i5 model) is stuck in an internet recovery/activation (recovery assistant) loop as it is linked to my friend's account. Can't get into disk utils or anything. He can no longer find it in his list and won't give me his password. Tried the verification code and it then asked for his password again.
Is it worth taking the disk out and zapping any partitions? Would this remove the ability to reinstall it? Or could I recreate a new local (or internet) installer?
I know absolutely nothing about Macs and really need someone authoritative to guide me through this as I don't have the bandwidth at the moment to dive into the guts of this.
Boosts welcome (I'm trying to set it up for my neighbour's daughter).
@da_667 I figured you'd be more along the lines of STOP CARRYING OUT YOUR INTENTIONS.
@da_667 I AM ON FIRE; KEEP CLEAR OF ME
@Jirikiha @_elena @cwicseolfor @skinnylatte IIRC they didn't appropriately winterize the supporting infrastructure in that plant and a few others. ERCOT had a few ok-ish writeups on it.
@Viss Man, I learned my lesson about nightly builds of shit years ago. Your rec has me thinking about it, though.
@SwiftOnSecurity By Mac terminal do you mean a Mac Mini doing work for you or something else?
I have a setup something like this, but more complicated - 2 desktops, 1 laptop, using Deskflow / Barrier on a non-routed network to link to 1 mouse / kb. The windows laptop has a full data sync of the important data so I can grab and go, if necessary, and not be worried.
@Viss I'm currently looking for a new mastodon / fedi app and Tusky is probably next on my list to try. Most are decent, few seem great.
@samuraiplumber The web seems to mention a Sunbeam, which should fit. Seems to be the smaller, later Sunbeam Alpine (Tiger) mark 4 version, maybe.
I can't quite make the beltline work in photos, but the proportions fit.
someone was bewailing the difficulty of implementing text rendering
@drahardja Could this have been a situation of 2 rich people bidding against each other more than a market indication? I feel like there's a lot of money looking for places to go right now and it winds up causing auction results like this fairly often recently.
lol https://seclists.org/oss-sec/2026/q1/89
telnetd server invokes /usr/bin/login (normally running as root) passing the value of the USER environment variable received from the client as the last parameter.
If the client supply a carefully crafted USER environment value being the string "-f root", and passes the telnet(1) -a or --login parameter to send this USER environment to the server, the client will be automatically logged in as root bypassing normal authentication processes
In telnetd for a decade đź’€
#PatchTuesday 2026-01
Patching experience in my test lab (#homelab).
Windows 11 - No issues on any test machines / VMs. OneDrive backup continues to be very persistent.
Windows 10 - No issues on any test machines / VMs.
Windows Server 2016 - Normal, uneventful. KB5073447 - Servicing Stack Update.
Windows Server 2019 - Normal, uneventful.
Windows Server 2022 - Normal, uneventful.
Windows Server 2025 - Normal, uneventful.
Today is Microsoft's January 2026 Patch Tuesday with security updates for 114 flaws, including one actively exploited and two publicly disclosed zero-day vulnerabilities.
Can you believe it's been a month already, Windows (ab)users? Yes, that's right, it's Patch Tuesday, or depending on when you're reading this Reboot Wednesday!
Microsoft today issued patches to plug at least 113 security holes in its various Windows operating systems and supported software. Eight of the vulnerabilities earned Microsoft’s most-dire “critical” rating, and the company warns that attackers are already exploiting one of the bugs fixed today.
https://krebsonsecurity.com/2026/01/patch-tuesday-january-2026-edition/