wwdevries | 10 years ago | on: Ask HN: Who is hiring? (September 2015)
wwdevries's comments
wwdevries | 11 years ago | on: Hosting Providers: Kill Malware and Fix Vulnerable Websites
Also, most malware is not executed right after uploading. They usually wait for the weekends.
wwdevries | 11 years ago | on: Hosting Providers: Kill Malware and Fix Vulnerable Websites
wwdevries | 11 years ago | on: Patchman – Hosting Providers: Kill Malware and Fix Vulnerable Websites
Would love to talk to you
wwdevries | 11 years ago | on: Patchman – Hosting Providers: Kill Malware and Fix Vulnerable Websites
wwdevries | 11 years ago | on: Patchman – Hosting Providers: Kill Malware and Fix Vulnerable Websites
Regarding security vulnerabilities, we specifically patch only those vulnerabilities. This way you can be rest assured that your customer's websites continue to function properly.
wwdevries | 11 years ago | on: Patchman – Hosting Providers: Kill Malware and Fix Vulnerable Websites
wwdevries | 11 years ago | on: Ask HN: Who is hiring? (March 2015)
Hosting providers suffer on a daily basis from the consequences of the many security vulnerabilities found in commonly used PHP applications such as WordPress, Drupal and Joomla. It is a frequently used entry point to deface customer’s websites and upload/execute malware. Besides this being a significant security risk, it also causes an unstable hosting platform and unhappy customers.
Patchman patches vulnerabilities before they get exploited. Best of all, customers won't even notice! Patchman helps hosting providers to achieve substantial savings in operational costs, increase customer happiness and reduce their churn rate. To support Patchman’s rapid growth, we’re looking to expand its team.
Read more: http://patchman.co/downloads/software_engineer.pdf
wwdevries | 11 years ago | on: 28 Days After Drupal Exploit
Approximately 30% of your hosting accounts run an outdated version of WordPress, Joomla or Drupal with serious security vulnerabilities. These vulnerabilities can be easily exploited to run malicious code. But you already know that, since you're getting sick of all the spam runs and DoS attacks that are continuously being launched this way from your platform. Not to mention the more serious attacks. Aren't you tired of cleaning up after your customers?
Patchman runs on your platform and automatically detects and patches vulnerabilities in WordPress, Joomla and Drupal core (without breaking the application!). It will also automatically remove malware. On top of that, it takes care of all communication with your customers. It integrates with all the popular control panels, such as cPanel, Plesk and DirectAdmin. Saves you a lot of headaches and puts you in control of this mess :)
wwdevries | 13 years ago | on: Hangouts for iOS
wwdevries | 13 years ago | on: Linux local privilege escalation 0day, 2.6.37 - 3.8.10
Compile like this and it works:
gcc -O2 semtex.c && ./a.outwwdevries | 13 years ago | on: Linux local privilege escalation 0day, 2.6.37 - 3.8.10
gcc -O2 sheep.c && ./a.outwwdevries | 13 years ago | on: Linux local privilege escalation 0day, 2.6.37 - 3.8.10
Linux 2.6.32-358.6.1.el6.x86_64 #1 SMP Tue Apr 23 19:29:00 UTC 2013 x86_64 x86_64 x86_64 GNU/Linux (latest CentOS kernel):
[user@centos ~]$ gcc -O2 exploit.c
[user@centos ~]$ ./a.out
2.6.37-3.x x86_64
[email protected] 2010
-sh-4.1#wwdevries | 13 years ago | on: Phusion Passenger 4.0 Release Candidate 2
wwdevries | 13 years ago | on: Show HN: iOS app. Snooze this alarm clock and it will humiliate you on Facebook
wwdevries | 13 years ago | on: You cannot read this, but you can tell how it appeals to you
(I'm a happy customer of MoneyBird)
wwdevries | 13 years ago | on: Nexus 4 available from Google today starting at noon PST
wwdevries | 13 years ago | on: Web hoster Antagonist automatically fixes vulnerabilities in customers' websites
wwdevries | 13 years ago | on: Web hoster Antagonist automatically fixes vulnerabilities in customers' websites
wwdevries | 13 years ago | on: Web hoster Antagonist automatically fixes vulnerabilities in customers' websites
Our customers comprise of large web hosting providers all around the globe. Security is – obviously – extremely important to them. However, there’s one layer of the security stack they have little or no control over: the code of their end users. Most websites use standard software as a foundation. Did you know that about 30% of the web is running on WordPress, Joomla or Drupal? Hackers continuously exploit security vulnerabilities in these foundations to upload and execute malware. Effectively, this allows hackers to run any malicious code they want. For example: to send spam, launch DDoS attacks or inflict far worse damage.
Patchman comes to the rescue! We offer web hosting providers a fully automated SaaS solution to index security vulnerabilities/risks and resolve them by automatically applying safe backported patches and by defusing malware. On top of that, we offer a web app that helps all stakeholders (including security officers, system administrators, helpdesk employees and end users) to operate Patchman and keep the web secure.
We're currently hiring for three positions:
### Software Engineer: Threat Analysis & Response (PHP) ###
Info & apply: http://jobs.patchman.co/software-engineer-threat-analysis-re...
### Software Engineer: Back-end (Python/Django) ###
Info & apply: http://jobs.patchman.co/software-engineer-back-end
### Software Engineer: Linux Security R&D (C/C++) ###
Info & apply: http://jobs.patchman.co/software-engineer-linux-security-rd