Tin



Well, who doesn't?



Tin. I thought the team were better...


this is exactly some kind of banter :)


I do Not believe that a divorce of some kind.


In the code, according to communications analysts was discovered lines that allow to obtain root access simply by installing a cookie with a special name.


Like virus to draw attention to Superhero.


well, Yes, of course, they did it on purpose to dvacherov plant.


Apparently by accident, the developers of "Habrahabr" turn off PHP processing during the work on updating the code of the site (probably to the long-awaited "Supercobra"), so the code files began to surrender as ordinary binary files.


In fact, setting yourself in a browser cookie with the name 'habrahabr_11223' you can obtain the full rights of the project. Such a classic, uncomplicated by considerations of securoty hole.


a Thousand Internets. Downloaded all, although I do not know how to use it.


of course laid out, I will be glad when these badlocation gonna fuck after analyzing their bytecode


Worse. It's full of epikfeyl, even without a tach. Logan maybe XS.


where to enter on blogistan invite code?
also while I rocked someone managed to modify the file:
habrahabr.ru/super/etc/blogistan
adding the line
>^^^^^---- ostalnoe moe!!!


Dachau, potsy, how to log on to blogistan??? where invite code to drive it?


PR blogistan attempt to put invites to the masses. For me, the reputation chabry was shaken, and blogistan especially will not attend.


for a couple of days as the site of the hanging plug. It turned out, they broke, rather just entered in the browser directory super and saw that it was open for reading. It was the passwords, pictures, information for investors, etc.


what a banal — just funny to watch. Failure.
Article based on information from habrahabr.ru

Комментарии

Популярные сообщения из этого блога

March Habrameeting in Kiev

PostgreSQL load testing using JMeter, Yandex.Tank and Overload

Monitoring PostgreSQL with Zabbix