view paste/paste.18986 @ 12086:ef5ba4348bf2 draft

<fizzie> ` for w in benvenuto bienvenido bienvenue bonvenon tervetuloa v\xc3\xa4lkommen velkomin velkommen welcome welkom wercome willkommen \xd0\xb4\xd0\xbe\xd0\xb1\xd1\x80\xd0\xbe-\xd0\xbf\xd0\xbe\xd0\xb6\xd0\xb0\xd0\xbb\xd0\xbe\xd0\xb2\xd0\xb0\xd1\x82\xd1\x8c; do sed -i -e \'s|bin/[@?]|$HACKENV/&|g\' /hackenv/bin/$w; done
author HackEso <hackeso@esolangs.org>
date Sat, 16 Nov 2019 22:13:34 +0000
parents a0fae3865040
children
line wrap: on
line source

2009-08-03.txt:20:25:28: <fizzie> AnMaster: I'm using a private SSH key; it's the decrypting of that which takes the 30 seconds, I think, since it hangs up immediately after giving it a passphrase, and then unhangs at the moment it starts sending packets out (sez tcpdump) to the SSH server.
2012-04-10.txt:16:33:01: <kmc> "Unlike SSH, mosh's UDP-based protocol handles packet loss gracefully, and sets the frame rate based on network conditions. Mosh doesn't fill up network buffers, so Control-C always works to halt a runaway process."
2012-09-01.txt:22:51:50: <shachaf> kmc: "For example, an attacker can abort an SSH connection or an HTTPS connection by forging a single TCP Reset packet."
2012-11-09.txt:23:51:50: <kmc> which is that, an attacker can terminate a SSH connection by sending a single RST packet
2012-11-09.txt:23:54:20: <shachaf> `pastelogs SSH.*packet
2012-11-09.txt:23:54:32: <shachaf> `pastelog SSH.*packet