Leaflet to [email protected]English • 2 months agoAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netexternal-linkmessage-square34fedilinkarrow-up1171arrow-down15file-textcross-posted to: hackernewsnetseclinuxblueteamseccybersecurity
arrow-up1166arrow-down1external-linkAttacking UNIX Systems via CUPS, Part I | CUPS Remote Code Executionwww.evilsocket.netLeaflet to [email protected]English • 2 months agomessage-square34fedilinkfile-textcross-posted to: hackernewsnetseclinuxblueteamseccybersecurity
minus-square@[email protected]linkfedilink13•2 months agoI mean I guess that’s sound advice if you don’t need to, I don’t know, print?
minus-squarekballinkfedilink4•2 months agoIndeed. But cups-browsed isn’t necessary in order to be able to print things, it’s for automatically discovering new printers on the network.
I mean I guess that’s sound advice if you don’t need to, I don’t know, print?
Indeed. But cups-browsed isn’t necessary in order to be able to print things, it’s for automatically discovering new printers on the network.