ashar

joined 2 years ago
MODERATOR OF
[–] ashar 2 points 9 months ago

The last civil war didn't quite totally destroy the country. Let us try again.

[–] ashar 35 points 9 months ago (1 children)

The 40,000 killed statistic is reliable in that the killed persons name, identity number etc are reported to MoH officials and recorded by them, and the dead are seen by the officials. However the figure is a small subset of the actual number dead. 200,000 to 300,000 dead in Gaza in the past year is a conservative estimate.

[–] ashar 2 points 9 months ago

The Economist had a good (probably unintentional) illustration of this.

[–] ashar 1 points 9 months ago (1 children)

The killing according to the Gaza Ministry of Health statistics seems to be slowing down, but this is because the MoH is maintaining a very high bar for recording the deaths. The attacks on the population is continuing at what seems to be the same rate.

from: https://www.dropsitenews.com/p/how-gaza-health-ministry-counts-dead "The Ministry of Health is committed to registering only those who reach its hospitals or other emergency medical care facilities in the Gaza Strip. Consequently, the number of martyrs announced by the ministry does not necessarily represent the total number of casualties but only those that have been officially documented."

Given that state of the hospitals is dire (they have all been bombed and attacked), the slow down in recording of deaths correlates with and is due to the destruction of the MoH and general civilian infrastructure. The reduction in rate of killing recorded does not align with the rate of actual killing.

[–] ashar 1 points 9 months ago (1 children)

Also, have you ever wondered why South Africa of all countries brought the case to the ICJ? Probably because they are deeply offended by the Israeli apartheid and they are even more against genocide?

Do you think it has anything to do with the fact that they entertained Hamas leaders as visiting dignitaries a month before they submitted the case? Um, yes. Why would they not do this?

Ah, you classify Hamas as a terrorist organisation.... Since South Africa regards Hamas to be a resistance movement (and this is the position of most of the world), coordinating with them would be sensible.

[–] ashar 4 points 9 months ago (3 children)

Sir, your president is quoted in the genocide case (South Africa vs Israel) as one of the inciters to genocide.

[–] ashar 10 points 9 months ago (2 children)

I wonder why Israel does not allow journalists into Gaza and has killed more than 170 Palestinian journalists?

[–] ashar 13 points 9 months ago

See Brexit. That was to leave but same principle.

[–] ashar 3 points 9 months ago

Are you actually saying that Sinwar's strategy paid off?

[–] ashar 1 points 9 months ago

No, it would be war squared.

Or maybe war(war());

[–] ashar 8 points 10 months ago

This is sort of report you get from a reporter under military censorship.

[–] ashar 3 points 10 months ago

What sort of army does not fight against an invading force? Is this why Hezbollah exists?

2
submitted 11 months ago* (last edited 11 months ago) by ashar to c/security_cpe
 

Free and Open Source Software Conference.

Free Software and Open Source - these are the topics of FrOSCon (Free and Open Source Software Conference). Every year in August the computer science department of the University of Applied Sciences Bonn-Rhein-Sieg, supported by FrOSCon e.V., will organize an exciting program with talks and workshops for visitors of all ages

Schedule

Videos

2
submitted 11 months ago by ashar to c/security_cpe
2
submitted 11 months ago by ashar to c/security_cpe
 

Will Machine Learning Replace The WAF? - John Graham-Cumming

Based on 20 years of experience using machine learning and keyword/pattern based systems this talk will look at the impact of machine learning on WAFs and how it can be used to effectively block malicious HTTP traffic.

John Graham-Cumming is CTO of Cloudflare and is a computer programmer and author. He studied mathematics and computation at Oxford and stayed for a doctorate in computer security. As a programmer, he has worked in Silicon Valley and New York, the UK, Germany, and France. His open source POPFile program won a Jolt Productivity Award in 2004

1
Global AppSec 2024 Lisbon (lisbon.globalappsec.org)
submitted 11 months ago by ashar to c/security_cpe
 

SLEUTHCON is a forum for identifying and exploring cybercrime and financially-motivated threats. This conference will highlight the work done by cybersecurity researchers, defenders, academics, law enforcement, and others.

Speakers on the website

Sleuthcon 2023 videos

2
submitted 1 year ago* (last edited 1 year ago) by ashar to c/security_cpe
0
submitted 1 year ago* (last edited 1 year ago) by ashar to c/security_cpe
 

Hacking a Satellite for Fun and Profit

Mario Polino @ mhackeroni

A light-hearted and entertaining dive into our victorious adventure at Hack-A-Sat! Our presentation takes you on a ride through the challenges and triumphs of hacking into an orbiting satellite, the Moonlighter. What is a Capture The Flag What is Hack-A-Sat How Qualification works How to Organize a CTF Team The competition The preparation of the team for the competition Same challenge example and solution.

Mario Polino has been a hacker and CTF player since 2008. He has a PhD in Computer Security from Politecnico di Milano. Mario worked as a researcher at Politecnico, publishing scientific papers on binary and malware analysis and ML for cybersecurity.

Mario has been the captain of Politecnico's team, Tower of Hanoi (https://toh.necst.it/about/, winner of ruCTF 2019), and is the captain of the Italian team mhackeroni (https://mhackeroni.it/ 5 times DEF CON CTF Finalist). Mario coaches Team Italy (https://teamitaly.eu/), the national Italian hacking team, and Team Europe (https://teameurope.site/), the hacking team selected among all European nations.

0
BSides Joburg 2024 (bsidesjoburg.co.za)
submitted 1 year ago by ashar to c/security_cpe
 

Born in 2009, BSides Security Conferences are community-driven events for cybersecurity professionals. They offer a welcoming space for individuals to present research, ideas, and experiences, fostering dialogue and collaboration beyond the limitations of larger conferences.

Schedule

Videos on YouTube

view more: ‹ prev next ›