Hacker Newsnew | past | comments | ask | show | jobs | submit | obisw4n's commentslogin

I'm not surprised in the least, they have a Bugcrowd program and I've submitted atleast one P2 that took months to fix, and best of all - they don't pay bounties! what a joke if you ask me.


Doh.. this guy recently came to me and swooped an up .io I owned. I gave it to him for what I paid for it thinking it was just an individual, should of asked for more lol.

/me facepalms


He paid me $500 for a two letter .io I owned. I hope you got market value!


Migrated a complex Jenkins setup to Deploybot in 2015, saves our company a ton of time managing deploys. I'd highly recommend deploybot to anyone.

If I could critique even just one thing it would probably be its pricing structure for personal use, I can't justify $15/m just for deployments. I'd love if they had some kind of personal "developer" tier with support for more repos. On the business side, $15/m is ridiculously cheap for what service we're getting.


I think more cloud providers should do something like what Google Compute Cloud does, they have SSHGuard on their images by default so IPs get blocked after too many failed attempts.


Does anyone know how the MySQL migration & replication works under the hood? How is Amazon doing all this remotely via just a DB connector?


Typical MySQL replication works when slave is listening to changes on master's binlog. Which, essentially, is a log of all operations performed on the dataset. I did some quick googling and apparently it can be accessed quite easily: http://dev.mysql.com/doc/refman/5.7/en/mysqlbinlog.html so I'd assume that this is how they are doing the replication, or something very similar.

As for migration, don't know, you could export the database and listen to binlog but that will lock table for a bit, depending on the database size. But maybe that's acceptable.

Would be curious to hear from folks with more DBA experience :)


Its funny the author mentions all the Google Play stuff about installing apps to users phones without them ever even knowing.. I actually found a company exploiting this in the wild using browser extensions, I wrote about it on this blog:

http://extensiondefender.com/blog/

I'm not sure if the news I released had any effect, but they rapidly pivoted from a "desktop to mobile" ad network: https://web.archive.org/web/20141209085229/http://vulcun.com...

To some kind of e-Sports betting site: https://vulcun.com/

Oddly enough I submitted a bug report to google telling them they should set a content-security-policy on play.google.com, and was basically told "wont-fix" so the vulnerability to play store still exists.


Thanks. Btw, you forgot to put any link from your blog to the main site.


I've created an anti-adware/malware extension called Extension Defender which has a free and paid offering, the paid offering has made around ~$750

https://www.extensiondefender.com/

https://chrome.google.com/webstore/detail/extension-defender...

I've had a few emails about our Enterprise offering but I have not had to the time to really land the sales. I know there are alot of people on HN looking to acquire projects, if someone is interested in the project, you can contact me at contact@extensiondefender.com


Would it be possible to constantly scan the DOM for new iframes and add the attribute with JS? Seems like there might be a small window of opportunity though for bad things to happen, if it would even work.


Thats an aweful lot of work to roll out your own router. What does this have over, say installing pfsense to a box?


First thing that comes to mind is having more control of which version of *BSD you want to be based on. With pfsense you're on whichever version of FreeBSD they've worked up to.

That said I roll pfsense on a thin mini-itx intel board and its great.


Save money on power cost for one! If you installing pfSense consider small booksize or itx case.


Neither one will be much different if the hardware is the same.


"we also had one of his passwords."

Sorry, but you should not have your customers plaintext passwords, so very unprofessional.

Time to submit Empireflippers to plaintext offenders list?


They are directly involved in facilitating the site transfer... Of course they have access to the passwords.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: