Skip to content

Instantly share code, notes, and snippets.

$ pidgin -d
(10:10:41) prefs: Reading /home/federico/.purple/prefs.xml
(10:10:41) prefs: Finished reading /home/federico/.purple/prefs.xml
(10:10:41) prefs: purple_prefs_get_path: Unknown pref /pidgin/browsers/command
(10:10:41) dbus: okkk
(10:10:41) plugins: probing /usr/lib64/pidgin/timestamp_format.so
(10:10:41) plugins: probing /usr/lib64/pidgin/spellchk.so
(10:10:41) plugins: probing /usr/lib64/pidgin/sendbutton.so
(10:10:41) plugins: probing /usr/lib64/pidgin/vvconfig.so
(10:10:41) plugins: probing /usr/lib64/pidgin/timestamp.so
<html xmlns:xxt="http://www.jclark.com/xt/java/com.macromedia.airspeed.servlet.ui.XSLTExtensions">
<head>
<title>THA_250117</title>
<script type="text/javascript" src="/common/scripts/s_code.js?ver=9.5.3"></script><script type="text/javascript" src="/common/scripts/OmnitureTracker.js?ver=9.5.3"></script><script type="text/javascript" src="/common/scripts/modalDialog/jquery-1.7.1.js?ver=9.5.3" charset="utf-8"></script><script type="text/javascript">
var useUASniffing = false;
function setUASniffing(value) {
useUASniffing = value;
}
</script><script>
var isReview = 'false';
@nemobis
nemobis / xz-backdoor.md
Created April 1, 2024 10:16 — forked from thesamesam/xz-backdoor.md
xz-utils backdoor situation

FAQ on the xz-utils backdoor

This is still a new situation. There is a lot we don't know. We don't know if there are more possible exploit paths. We only know about this one path. Please update your systems regardless. Unknown unknowns are safer than known unknowns.

This is a living document. Everything in this document is made in good faith of being accurate, but like I just said; we don't know much about what's going on.