ROSSSSSSSXING
Posts by lintile
MARKDOWNMAXXING
Yes.
No. Upgrade to the high life. Nice.
Upgrade to the high life, my friend
Anyone wanna join a group chat where we don't talk about anything, just post pics of the places where we're drinking Millers? @r0wdy.sk33t.expert @lintile.lol @soitwent.bsky.social
OMG ARE YOU HUG DEPRIVED
Can’t argue with the chief.
I mean “Jeff-ay”
This is your periodic reminder that GitHub is properly pronounced “djit-hub”.
Never ask quicksort to advise your startup; it’ll immediately pivot
I am transitioning from tech to being an independent artist. My first collection, “Ceramic Companion Ghosts: Classic”, is ready for adoption! If one of these ghosts calls to you and you must have it, message me. Each one is available via private auction/sale until February 24th. Happy Haunting!
this “interaction” is being “recorded” for “quality” and “training” “purposes”
the lion does not concern itself with the opinions of the CEO who send a texted this morning from an unknown number, called the lion by the full exact name on its linkedin, and needs the lion to drive to CVS and buy Google Play gift cards with cash
Can it be mini tacos
phishing : botnet :: fishing : bought net
Shower thoughts: if your IP allowlist is too permissive, and the attacker comes at you from an allowlisted IP, does that make it an In-CIDR threat?
SLEEPY WINN
You probably didn’t know that the same Takeshi Kaga that was the chairman on the original Iron Chef alternated playing Jean Valjean *and* Javert in the 1987 Japanese run of productions of Les Miserables, but now you do! Allez cuisine!
Some of you haven’t thought about Gallagher in a long time, and it really shows.
. @east.burbsec.com afterparty with @lintile.lol is lit fam
Security maturity isn’t knowing more patterns… it’s knowing when to ignore them.
The flexible practitioner asks: “Given my actual threats, constraints, and context, what’s the simplest sufficient control?”
Sometimes that’s a novel approach your certs never mentioned.
One of the most limiting things any information security practitioner can do is assume that only way to secure something is through architectural patterns you are familiar with.
The ability to reliably derive conclusions from first principles is a superpower.
WELP
Excited to see @lintile.lol navigate the entirety of this in Quèbècois @hackfest.bsky.social
No.
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
ricksturbation | rik-stur-ˈbā-shən | noun
The act of inadvertently activating a Rick Roll link, video, or trap that one has personally created or deployed, typically after forgetting its location or nature; the ironic experience of becoming victim to one’s own prank.
Maybe possibly consider having you again as a contestant
Would