Hacker Newsnew | past | comments | ask | show | jobs | submit | jwarren116's commentslogin

It’s very literally the second bullet point on my enumeration list for web apps, right behind looking at the DNS records for the domain.


It’s my understanding that the Hana offering is run entirely by CBRE, much in the way CBRE will manage buildings as a service. I would assume it’s an offering for the owner/landlord where they (landlord/owner) would be hands off and there would be a split with CBRE.

https://www.cbre.com/real-estate-services/directory/flexible...

Disclosure: I work for CBRE, but in a different line of business with no knowledge of Hana outside of what is explained by the above link.


+1 for Lightweight Django. I had the pleasure of working with one of the authors. The book is well laid out and covers some really great topics that aren't always covered well elsewhere in the context of Django (i.e. Websocket services with Django). It's a great companion for Two Scoops of Django.


In my opinion that book should be the starting point. The official tutorials have you way deep in the weeds with database migrations and stuff before you even have a basic understanding of where you're at and why. Worst "hello world" ever.


A group called New World Hackers have claimed responsibility[1]. I read a bit that they stopped their attacks by 2pm EST, and that another group picked up some of the minor attacks later in the day. Anonymous was mentioned, but didn't claim it. I can't seem to track down that article at the moment... I'll keep looking.

[1] https://twitter.com/fbajak/status/789611472280178688 and http://www.anonintelgroup.com/2016/10/21/twitter-down-its-no...


Same. I use OpenDNS and I had no idea there was an attack happening until I asked a co-worker to review something on GitHub and they couldn't access it. SmartCache saved me a lot of hours that could have been lost Friday.


In addition to all the really great advice already submitted, I really like using Lynis[0] for scanning my servers to get an idea of obvious vulnerabilities and a baseline for hardening ssh. It's absolutely not a substitute for a security expert, but in about 10 minutes of setup you can get an idea of what action items you need to add to the top of your queue.

[0] https://cisofy.com/lynis/


I find Holder's remarks to be ironic. After Operation Fast and Furious [0], I would be tempted to say there's more blood on Holder's hands than on Snowden's hands.

[0] https://en.m.wikipedia.org/wiki/Operation_Fast_and_Furious


This is outrageous. Thanks for the link.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: