101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

553
active users

#noname

0 posts0 participants0 posts today

GELÖST!

(#qrcode / #datamatrix) #scanner unter #linux #hilfe:

scheinbar egal welcher hersteller (#keyence, #zebra, #noname) an egal welcher #distribution (#mint, #manjaro, #nixos, thin clients, #android) können unsere scanner keine umlaute und sonderzeichen wie | pipes…

an windows stecken wir ein und alles tut out of the box, auch ohne treiber und config.

was ist das geheimnis korrekter erkennung und tastaturlayoutzuordnung bei #barcodescannen unter linux?

New configuration detected for DDosia. Hosts:
* www.bmi.bund.de
* www.balm.bund.de
* mdm01.grob-aircraft.com
* alurheinfelden.com
* www.bmj.de
* clientnext.bayernlb.de
* grob-aircraft.com
* sbahn.berlin
* api.sbahn.berlin
* www.nrwbank.de
* www.elbeflugzeugwerke.com
* rheinfelden-semis.eu
* www.baywa.com
* rheinfelden-carbon.eu
* www.cobus-industries.com
* www.man-es.com
* www.bayernlb.de #ThreatIntel #Ddosia #NoName
* witha.name/data/2025-01-14_07-
*

Continued thread

There's another variation of the NoName copycat shakedowns -

there's a group who aren't doing any DDoS, they're just getting the list of actual NoName victims, then emailing them as "NoName057" demanding Bitcoin for the attacks to stop.

Again, it's very unlikely it's actually NoName - the play appears to be, because NoName are super successful (by just doing layer 7), people are surfing off it for money from confused victims who don't even know what NoName is.

PSA for defenders, somebody appears to be copying NoName and doing shakedowns for Bitcoin payment.

They do a copycat layer 7 attack (the tooling real NoName use is basically lifted from Github), and then follow up with an email from "NoName057" for payment.

I'd strongly advise not paying and make sure your sites are behind a cloud WAF with rate limiting configured, and have origin IP not internet accessible

It's very unlikely the people doing this one are actually NoName

Continued thread

clientnext.bayernlb.de
* fnherstal.com
* grob-aircraft.com
* api.sbahn.berlin
* www.baywa.com
* www.vanhool.com
* www.televic.com
* www.bmj.de
* 1557.kyiv.ua
* www.dexia.com
* www.migremont.zp.ua
* narp.ua
* www.minfin.fgov.be
* idp.belgiantrain.be
* www.man-es.com
* www.nrwbank.de #ThreatIntel #Ddosia #NoName
* witha.name/data/2024-12-20_12-
* witha.name/data/2024-12-20_12-