Operations

2/6/2018
10:00 AM
John Klossner
John Klossner
Cartoon Contest

Name That Toon: Disappearing Act

We provide the cartoon. You provide the caption.
We provide the cartoon. You provide the caption.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 7 / 9   >   >>
THowcroft
100%
0%
THowcroft,
User Rank: Apprentice
2/16/2018 | 10:27:35 AM
Caption
Efforts to encourage the use of "active desks" have yet to prove effective.
mwrightinmt
40%
60%
mwrightinmt,
User Rank: Apprentice
2/15/2018 | 11:53:33 AM
Caption
Turns out Bob's job really does suck.
Samtheseagull
0%
100%
Samtheseagull,
User Rank: Guru
2/14/2018 | 6:43:25 PM
name that toon
Think Clark has slliiped out for a while, can you email site service, Bob.
broganj23
100%
0%
broganj23,
User Rank: Apprentice
2/14/2018 | 3:32:22 PM
Dark Web
I guess Bob was serious when he said he was going to join an underground network of criminals on the dark web
jehall6
100%
0%
jehall6,
User Rank: Strategist
2/14/2018 | 1:58:10 PM
Name that Toon: Disappearing Act
See management has completed the annual cyber security budget review and apparently has made some cuts!
NCAdmin
60%
40%
NCAdmin,
User Rank: Apprentice
2/14/2018 | 10:55:13 AM
Name that toon caption
I warned him that his programming was code heavy!
ankavosk
75%
25%
ankavosk,
User Rank: Apprentice
2/14/2018 | 9:17:22 AM
Cartoon Contest Application
When you take mining seriously. 
ankavosk
0%
100%
ankavosk,
User Rank: Apprentice
2/14/2018 | 9:14:55 AM
Cartoon Contest Application
And I totally forgot that the Automation Policy has been approved.
StephenP787
0%
100%
StephenP787,
User Rank: Apprentice
2/13/2018 | 2:21:36 PM
cartoon contest
Thats a heavy workload...
thuddome
0%
100%
thuddome,
User Rank: Apprentice
2/13/2018 | 10:06:18 AM
Cartoon
The new content filtering system seems a little harsh...
<<   <   Page 7 / 9   >   >>
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Google to Delete 'Secure' Label from HTTPS Sites
Kelly Sheridan, Staff Editor, Dark Reading,  5/21/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "The one you have not seen, won't be remembered".
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-9317
PUBLISHED: 2018-05-23
Privilege escalation vulnerability found in some Dahua IP devices. Attacker in possession of low privilege account can gain access to credential information of high privilege account and further obtain device information or attack the device.
CVE-2018-1193
PUBLISHED: 2018-05-23
Cloud Foundry routing-release, versions prior to 0.175.0, lacks sanitization for user-provided X-Forwarded-Proto headers. A remote user can set the X-Forwarded-Proto header in a request to potentially bypass an application requirement to only respond over secure connections.
CVE-2018-1122
PUBLISHED: 2018-05-23
procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.
CVE-2018-1123
PUBLISHED: 2018-05-23
procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).
CVE-2018-1125
PUBLISHED: 2018-05-23
procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.