mds_stores high cpu usage because of “extensions”-preferences

jan_opo provided the answer!
discussions.apple.com/thread/250148717 mds_stores high cpu usage because of “extensions”-preferences
I watched the cpu% jumping up for the process mds_stores, always when I was on facebook. Accidentally I found a solution! Just fyi, unchecking “facebook” in the sharing-menu on the “Extensions” panel in system preferences kicked the related cpu usage for the process mds_stores back to zero! Didn’t try it yet, but obviously it could also affect other checkboxes on the “Extensions”-panel, like twitter, flickr etc. in conjunct with the related browser-activity.

Plugin Tools WP DSGVO (shapepress-dsgvo) Umleitung und Sicherheitslücke

26. September 2021
das WordPress Plugin Tools WP DSGVO (shapepress-dsgvo) hat eine Sicherheitslücke, und leitet die Seite auf irgendwelche Spam-/Malware-/Pornoseiten um. Nach Deaktivierung des Plugins funktioniert die Seite wie gewohnt. Leider hat der ‚quick fix‘, den der Anbieter nun nach 3 Tagen bereitgestellt hat auch ein Problem, die Datei legalweb.io/spdsgvo-bin/shapepress-dsgvo.zip entpackt sich, wenn manuell installiert, in das falsche Verzeichnis.

Pegasus Test – is your mobile phone affected? Do the test.

Deutsch:

Das Mobile Verification Toolkit (MVT) von Amnesty International scannt Android- und iOS-Geräte auf Spuren von Spyware, wie z. B. Pegasus von NSO. Es gibt zwar eine Schritt-für-Schritt-Beschreibung, aber das ist nur die halbe Wahrheit. Forensische Arbeit erfordert Erfahrung und Vorsicht! Also, seien Sie bitte vorsichtig, schließen Sie niemals ein unbekanntes Handy an Ihren Firmencomputer an, wenn es wirklich infiziert ist, wird es höchstwahrscheinlich versuchen, alles zu infizieren, was zugänglich ist, Ihren Computer, Netzwerkkomponenten, andere Computer usw.

Englisch

Amnesty International’s Mobile Verification Toolkit (MVT) scans Android and iOS devices for traces of spyware, such as NSO’s Pegasus. There is a step-by-step description, but that is only half the truth. Forensic work requires experience and caution! So, please be careful, never connect an unknown cell phone to your company computer, if it is really infected, it will most likely try to infect everything that is accessible, your computer, network components, other computers, etc.

Link

https://docs.mvt.re/en/latest/index.html

 

 

Why is SSH tunnelling a security risk?

Many of us use ssh tunnelling. It is very convenient, to establish secure connections ever when you are on a unsecured network or environment, like in a hotel or internet cafe. However, ssh tunnelling can be an ENORMOUS security risk. This article explains it very well in an easy understandable way (and it has some comments worth reading, too):
community.infosecinstitute.com/discussion/67117/circumventing-network-security-via-ssh-tunneling

Rsync and large files

Even almost 30 years old, rsync ist still the tool of choice when it comes to (remote) copying. Everything is easy when may small files need to be exchanged, however when it comes to large files (like disk-images) there are some points which must be considered.
Here is a nice article how to get to: rsync -av –partial –inplace –append –progress vmdk_file syncuser@host1:/destination
fedoramagazine.org/copying-large-files-with-rsync-and-some-misconceptions/