[00:17] so, apparently the nsa.gov website still let people use telnet to send messages from it: http://www.ehackingnews.com/2013/12/nsa-server-vulnerable-to-smtp-spoofing.html [00:19] that has to be a honeypot, no way they are dumb enough to have an open SMTP relay [00:23] it could be, or it could actually be real- people make mistakes, and are lazy, and if a default config allows telnet, it could happen [00:30] home sweets home [00:30] dashcloud: the best part about that is that auditing OpenSSL for correctness is demonstrably infeasible :P [00:31] see e.g. the disaster in the 2008 Debian distribution of OpenSSL [00:33] was fun [00:33] i know one university where the internal ssh server are still unpatched [00:34] remember: this bug generated low entropy key _AND_ ruined your existing key [00:34] ugh, yes, that [00:35] some use one good DSA key and oops [00:35] can be compromised* [00:35] s/some/so/ [00:42] lol, nice typing [01:53] haha awesome [01:53] Coinye West [01:54] My Beautiful Dark Twisted Currency [03:00] looks like distrowatch is very slow when downloading there podcast [03:01] trying to grab them all so i can make a collection [09:07] for url in `ia search 'collection:afterhoursdjs_livesets'`; do ia download $url; done [09:07] that was much easier than I expected [09:07] * joepie91 claps for `ia` [11:17] i'm finally grabbing the distrowatch weekly podcast [11:18] the speed is not bad now [11:21] looks like speed maybe cause i was uploading to much [11:21] :-D