Understand your Mac and iPhone more deeply by tracing the evolution of Mac OS X from prelease to Swift. John Siracusa delivers the details.
You've got two main options:
# 0. Use `crtl+h` and replace `{{HOST}}` with the IP address of a server you | |
# control and want to direct the traffic to. Or Just use `0.0.0.0` to block it. | |
# | |
# 1. Log into your Pi-hole device and move this file into the `/etc/dnsmasq.d/` | |
# directory. Feel free to rename it. | |
# | |
# 2. Run the command `pihole restartdns` | |
# Redirects Nintendo Landing Page Domains | |
address=/ctest.cdn.nintendo.net/{{HOST}} |
Hut3 Cardiac Arrest - A script to check OpenSSL servers for the Heartbleed bug (CVE-2014-0160).
Note: This code was originally a GitHub Gist but has been copied to a full GitHub Repository so issues can also be tracked. Both will be kept updated with the latest code revisions.
DISCLAIMER: There have been unconfirmed reports that this script can render HP iLO unresponsive. This script complies with the TLS specification, so responsitivity issues are likely the result of a bad implementation of TLS on the server side. CNS Hut3 and Adrian Hayter do not accept responsibility if this script crashes a server you test it against. USE IT AT YOUR OWN RISK. As always, the correct way to test for the vulnerability is to check the version of OpenSSL installed on the server in question. OpenSSL 1.0.1 through 1.0.1f are vulnerable.
This script has several advantages over similar scripts that have been re