techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.9K
active users

#http

10 posts9 participants0 posts today
OTX Bot<p>Security Incident Response Team</p><p>A critical vulnerability in various Fortinet products allows remote attackers to execute arbitrary code via crafted HTTP requests. Observed exploitation on FortiVoice involved network scanning, erasing system logs, and enabling fcgi debugging to capture credentials. Affected products include FortiVoice, FortiMail, FortiNDR, FortiRecorder, and FortiCamera across multiple versions. The threat actor used specific IP addresses and modified system files and settings. Indicators of compromise include added malicious files, modified cron jobs, and altered configuration files. Fortinet recommends upgrading to patched versions or disabling the HTTP/HTTPS administrative interface as a workaround.</p><p>Pulse ID: 6824e782b9b3cd96d2f35db3<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/6824e782b9b3cd96d2f35db3" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/6824e</span><span class="invisible">782b9b3cd96d2f35db3</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-05-14 18:57:06</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a> <a href="https://social.raytec.co/tags/HTTPS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTPS</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
OTX Bot<p>Technical Analysis of TransferLoader</p><p>TransferLoader is a newly identified malware loader active since February 2025. It comprises multiple components including a downloader, backdoor, and specialized loader. The malware employs various anti-analysis techniques and code obfuscation to hinder reverse engineering. TransferLoader has been observed delivering Morpheus ransomware. Its backdoor module enables execution of arbitrary commands on compromised systems and uses the InterPlanetary File System as a fallback for C2 server updates. The malware utilizes both HTTPS and raw TCP communication methods, with a unique encryption process for network packets. TransferLoader's consistent use in deploying additional payloads suggests it will continue to be a threat in future attacks.</p><p>Pulse ID: 682549c464fc8d3ea6a57b4d<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/682549c464fc8d3ea6a57b4d" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/68254</span><span class="invisible">9c464fc8d3ea6a57b4d</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-05-15 01:56:20</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/BackDoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BackDoor</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://social.raytec.co/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a> <a href="https://social.raytec.co/tags/HTTPS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTPS</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/RansomWare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RansomWare</span></a> <a href="https://social.raytec.co/tags/TCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TCP</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
Crypto News<p>Coinbase’s x402: Crypto payments over HTTP for AI and APIs - What is HTTP 402, and why does it matter? ... - <a href="https://cointelegraph.com/explained/coinbases-x402-crypto-payments-over-http-for-ai-and-apis" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cointelegraph.com/explained/co</span><span class="invisible">inbases-x402-crypto-payments-over-http-for-ai-and-apis</span></a> <a href="https://schleuss.online/tags/cryptopayments" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptopayments</span></a> <a href="https://schleuss.online/tags/coinbase" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coinbase</span></a> <a href="https://schleuss.online/tags/http" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>http</span></a> <a href="https://schleuss.online/tags/api" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>api</span></a> <a href="https://schleuss.online/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a></p>
KSev AArch64🌻🚲🇳🇴 :donor:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@404mediaco" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>404mediaco</span></a></span> Found a genuine 404 moment! <br>But “Not found” <a href="https://infosec.exchange/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a></p>
Pyrzout :vm:<p>New HTTPBot Botnet Rapidly Expands to Target Windows Machines <a href="https://gbhackers.com/new-httpbot-botnet-rapidly-expands/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gbhackers.com/new-httpbot-botn</span><span class="invisible">et-rapidly-expands/</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://social.skynetcloud.site/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://social.skynetcloud.site/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a></p>
Nordnick 🐘<p><span class="h-card"><a href="https://mastodon.social/@pfefferle" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>pfefferle@mastodon.social</span></a></span></p><p>How do you have implemented <a href="https://hhmx.de/tags/activitypub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ActivityPub</span></a> and <a href="https://hhmx.de/tags/http" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a> Signatures so far? Own code or related to some libraries?</p>
OTX Bot<p>A New Breed of Infostealer</p><p>A newly discovered .NET-based infostealer, Chihuahua Stealer, combines common malware techniques with advanced features. The infection begins with an obfuscated PowerShell script shared via Google Drive, initiating a multi-stage payload chain. Persistence is achieved through scheduled tasks, and the main payload targets browser data and crypto wallet extensions. Stolen data is compressed, encrypted using AES-GCM via Windows CNG APIs, and exfiltrated over HTTPS. The malware employs stealth techniques, including multi-stage execution, Base64 encoding, hex-string obfuscation, and scheduled jobs. It targets browser data, crypto wallets, and uses unique identifiers for each infected machine. The stealer's sophistication is evident in its use of Windows Cryptography API for encryption and its thorough cleanup process.</p><p>Pulse ID: 682345233e3c2b7479bfdf61<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/682345233e3c2b7479bfdf61" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/68234</span><span class="invisible">5233e3c2b7479bfdf61</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-05-13 13:12:03</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/Browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Browser</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://social.raytec.co/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://social.raytec.co/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a> <a href="https://social.raytec.co/tags/HTTPS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTPS</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/InfoStealer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoStealer</span></a> <a href="https://social.raytec.co/tags/Mac" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mac</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/NET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NET</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/PowerShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerShell</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
codeDude :archlinux: :neovim:<p>Send files between both computer in the same network is really easy, you don't need fancy stuff like kdeConnect or samba if you need to do it once. For sure your computer already has <a href="https://floss.social/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a> installed so you can use `python -m http.server &lt;port&gt;` to start a simple <a href="https://floss.social/tags/http" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>http</span></a> server and check the ip with `ip addr` Then from the other computer do `wget &lt;ip&gt;:&lt;port&gt;/&lt;file&gt;` to download the files from the server computer, and That's it!! simple, clean and without install other packages <a href="https://floss.social/tags/gnu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gnu</span></a> <a href="https://floss.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a></p>
Wilda Software<p>Krótki i przyjemny artykuł dla adminów i osób zajmujących się ustawianiem NGINX na serwerze, przy czym z porad mogą skorzystać pewnie też osoby mające do czynienia z innymi serwerami HTTP.</p><p><a href="https://mastodon.social/tags/CyberSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSec</span></a> <a href="https://mastodon.social/tags/Cyberbezpiecze%C5%84stwo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberbezpieczeństwo</span></a> <a href="https://mastodon.social/tags/NGINX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NGINX</span></a> <a href="https://mastodon.social/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a></p><p><a href="https://medium.com/@js_9757/advanced-nginx-hardening-15bf96058327" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@js_9757/advanced-n</span><span class="invisible">ginx-hardening-15bf96058327</span></a></p>
Gareth Lloyd (He/him)<p>Today I learned:</p><p>HTTP 451 Unavailable For Legal Reasons has a direct reference to Ray Bradbury's 1953 dystopian novel Fahrenheit 451, in which books are outlawed.</p><p><a href="https://fosstodon.org/tags/http" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>http</span></a> <a href="https://fosstodon.org/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a></p>
Tim (Wadhwa-)Brown :donor:<p>RFCs you should probably read if you're bug hunting modern stacks:</p><p>* RFC 8820: URI Design and Ownership<br>* RFC 8725: JSON Web Token Best Current Practices<br>* RFC 9110: HTTP Semantics<br>* RFC 9111: HTTP Caching<br>* RFC 9112: HTTP/1.1<br>* RFC 9113: HTTP/2<br>* RFC 9114: HTTP/3</p><p>Also worth a read:</p><p>* RFC 7230: Message Syntax and Routing<br>* RFC 7231: Semantics and Content<br>* RFC 7232: Conditional Requests<br>* RFC 7233: Range Requests<br>* RFC 7234: Caching<br>* RFC 7235: Authentication</p><p><a href="https://infosec.exchange/tags/research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>research</span></a>, <a href="https://infosec.exchange/tags/exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitation</span></a>, <a href="https://infosec.exchange/tags/http" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>http</span></a></p>
randomMDN<p>🦖 CSP: script-src-attr<br>☑️ Newly available (from Dec 2022)</p><p><a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Content-Security-Policy/script-src-attr" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">developer.mozilla.org/en-US/do</span><span class="invisible">cs/Web/HTTP/Reference/Headers/Content-Security-Policy/script-src-attr</span></a></p><p>The HTTP Content-Security-Policy (CSP) script-src-attr directive specifies valid sources for JavaScript inline event handlers.</p><p><a href="https://front-end.social/tags/webdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webdev</span></a> <a href="https://front-end.social/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a></p>
randomMDN<p>🦖 Sec-CH-UA-WoW64<br>🟧 Limited availability</p><p><a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Sec-CH-UA-WoW64" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">developer.mozilla.org/en-US/do</span><span class="invisible">cs/Web/HTTP/Reference/Headers/Sec-CH-UA-WoW64</span></a></p><p>The HTTP Sec-CH-UA-WoW64 request header is a user agent client hint indicating if a 32-bit user-agent application is running on a 64-bit Windows machine.</p><p><a href="https://front-end.social/tags/webdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webdev</span></a> <a href="https://front-end.social/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a></p>
randomMDN<p>🦖 CORS errors 🦖</p><p><a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/CORS/Errors" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">developer.mozilla.org/en-US/do</span><span class="invisible">cs/Web/HTTP/Guides/CORS/Errors</span></a></p><p>Cross-Origin Resource Sharing (CORS) is a standard that allows a server to relax the same-origin policy. This is used to explicitly allow some cross-origin requests while rejecting others. For example, if a site offers an embeddable service, it may be necessary to relax certain restrictions. Setting up such a CORS configuration isn't necessarily easy and may present some challenges. In these…</p><p><a href="https://front-end.social/tags/webdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webdev</span></a> <a href="https://front-end.social/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a></p>
Blender Dumbass ( J.Y.Amihud )<p>From: blenderdumbass . org</p><p>The multiplayer, or the lack there of, at the moment is so utterly broken and so lacking of being properly made that for a long time, I was just not bothering with it. Seeing it as something unnecessary. Something that does not need to be touched, because other things, like the...</p><p>Read or listen: <a href="https://blenderdumbass.org/articles/a_rant_about_making_a_multiplayer_game" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blenderdumbass.org/articles/a_</span><span class="invisible">rant_about_making_a_multiplayer_game</span></a></p><p><a href="https://mastodon.online/tags/Gamedev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gamedev</span></a> <a href="https://mastodon.online/tags/DanisRace" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DanisRace</span></a> <a href="https://mastodon.online/tags/Networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Networking</span></a> <a href="https://mastodon.online/tags/Multiplayer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Multiplayer</span></a> <a href="https://mastodon.online/tags/TCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TCP</span></a> <a href="https://mastodon.online/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a> <a href="https://mastodon.online/tags/Programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Programming</span></a> <a href="https://mastodon.online/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> <a href="https://mastodon.online/tags/UPBGE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UPBGE</span></a> <a href="https://mastodon.online/tags/Blender3d" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blender3d</span></a> <a href="https://mastodon.online/tags/GNU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GNU</span></a> <a href="https://mastodon.online/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.online/tags/GamingOnLinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GamingOnLinux</span></a> <a href="https://mastodon.online/tags/FreeSoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeSoftware</span></a> <a href="https://mastodon.online/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a></p>
st1nger :unverified: 🏴‍☠️ :linux: :freebsd:<p><a href="https://infosec.exchange/tags/aria2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aria2</span></a> is a lightweight multi-protocol &amp; multi-source, cross platform download utility operated in command-line. It supports <a href="https://infosec.exchange/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a> <a href="https://infosec.exchange/tags/HTTPS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTPS</span></a> <a href="https://infosec.exchange/tags/FTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FTP</span></a> <a href="https://infosec.exchange/tags/SFTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SFTP</span></a> <a href="https://infosec.exchange/tags/BitTorrent" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BitTorrent</span></a> and <a href="https://infosec.exchange/tags/Metalink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Metalink</span></a> <a href="https://github.com/aria2/aria2" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/aria2/aria2</span><span class="invisible"></span></a></p>
Amit Kamalbhai Dhanani<p>Can we generate Shared Secrete dynimically during web session intialization during each request-response?</p><p>Please check below link and all suggestions are welcome</p><p><a href="https://mastodon.social/tags/AJAX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AJAX</span></a> <a href="https://mastodon.social/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://mastodon.social/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a> <a href="https://mastodon.social/tags/javascript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>javascript</span></a> <a href="https://mastodon.social/tags/protection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>protection</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://mastodon.social/tags/webattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webattack</span></a> <a href="https://mastodon.social/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://mastodon.social/tags/Website" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Website</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a></p><p><a href="https://amitdhanani.in/2025/05/06/can-we-generate-shared-secrete-dynimically-during-web-session-intialization-during-each-request-response/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">amitdhanani.in/2025/05/06/can-</span><span class="invisible">we-generate-shared-secrete-dynimically-during-web-session-intialization-during-each-request-response/</span></a></p>
Marcos Dione<p><a href="https://en.osm.town/tags/til" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>til</span></a></p><p>* URLs' paths might or might not be case sensitive; it all depends on the actual system serving the resource.</p><p>In any case (!!!), consider them case sensitive.</p><p><a href="https://en.osm.town/tags/http" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>http</span></a> <a href="https://en.osm.town/tags/development" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>development</span></a></p>
:rss: Qiita - 人気の記事<p>【エンジニア初学者向け】HTTP リクエストの Query と Body を正しく理解する<br><a href="https://qiita.com/satokenichi/items/d102673d9677398a2e00?utm_campaign=popular_items&amp;utm_medium=feed&amp;utm_source=popular_items" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">qiita.com/satokenichi/items/d1</span><span class="invisible">02673d9677398a2e00?utm_campaign=popular_items&amp;utm_medium=feed&amp;utm_source=popular_items</span></a></p><p><a href="https://rss-mstdn.studiofreesia.com/tags/qiita" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>qiita</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/Web%E3%83%97%E3%83%AD%E3%82%B0%E3%83%A9%E3%83%9F%E3%83%B3%E3%82%B0" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Webプログラミング</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/api%E3%83%86%E3%82%B9%E3%83%88" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apiテスト</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/%E3%83%90%E3%83%83%E3%82%AF%E3%82%A8%E3%83%B3%E3%83%89%E9%96%8B%E7%99%BA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>バックエンド開発</span></a></p>
Helix :unverified:<p><a href="https://layer8.space/tags/FrageF%C3%BCrEinenFreund" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FrageFürEinenFreund</span></a> gibt es einen modernen Rewrite von <a href="https://layer8.space/tags/LOIC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LOIC</span></a> für Lasttests von Internetseiten? Wäre cool wenn man einfach ein paar Leuten eine Liste von URLs geben könnte die sich dann beteiligen um eine gewisse Uhrzeit, damit die Seiten getestet werden können. <a href="https://layer8.space/tags/highAvailability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>highAvailability</span></a> <a href="https://layer8.space/tags/distributedTesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>distributedTesting</span></a> <a href="https://layer8.space/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a> <a href="https://layer8.space/tags/Verf%C3%BCgbarkeit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Verfügbarkeit</span></a></p><p><a href="https://de.m.wikipedia.org/wiki/Low_Orbit_Ion_Cannon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">de.m.wikipedia.org/wiki/Low_Or</span><span class="invisible">bit_Ion_Cannon</span></a></p>