Author: Andreas

  • Wear Helmets!

    Ad from the Danish Road Safety Council

    Well, I guess, the message is you better wear helmets when going to England. Helmets have always been a great idea.

    Great Ad, otherwise.

  • Fastly Global CDN Disruption

    Fastly is one of the major CDN vendors globally. As a regular consumer you wouldn’t be aware of their service, until a failure hits. Today the service faced a configuration issue, that apparently hit global pages like NYTimes and Bloomberg, but also Amazon, Reddit and Twitter, as reported in multiple sources. The issue is reported resolved by the vendor as of this writing. Details on their status page:

    Fastly’s Status Page – Global CDN Disruption.

    Source: Fastly Status – Global CDN Disruption

  • Pack Four

    Pack Four
    Lego Saturn V – Pack Four

  • For the VMware users here.

    VMWare’s vCenter Server is vulnerable to a remote code execution (RCE) vulnerability. That means, an attacker would be able to execute code on any machine with that software reachable from the internet. Executing arbitrary code would also allow malware to replicate, AKA worm. The vulnerability is tracked as CVE-2021-21985.

    Code execution flaw in vCenter is exploited to install web shell on unpatched machines.

    From the article

    Source: This is not a drill: VMware vuln with 9.8 severity rating is under attack | Ars Technica

  • Pack Three

    Highrise
    Highrise

    An der dritten Stufe sind nun auch die Flaggen zu sehen. Man bekommt langsam einen Eindruck davon, wie groß das Modell werden wird.

  • Pack Two

    Pack Two
    Pack Two

    USA! ist als nun als Schriftzug auf der Saturn V des Lego Ideas Bausatzes zu lesen.

  • Pack One

    Pack One
    Pack One

    Der erste Teil der Lego Saturn V. Man gewinnt einen Eindruck, wie groß das fertige Modell sein wird. Das Modell wird immer noch nicht zum Mond fliegen können.

  • Is anyone here using Azure?

    Are you using Azure? A newly published Hyper-V bug could possibly crash ‘big portions of Azure cloud infrastructure’.

    Security researchers have posted proof of concept code that exploits a recently patched vulnerability in Microsoft’s Hyper-V hypervisor. The bug enables code in the guest to crash the host, and in some circumstances compromise the host’s security.

    The Register

    Source: Hyper-V bug that could crash ‘big portions of Azure cloud infrastructure’: Code published