Create new post
What is Yoors ?
Terms & Conditions
De eeuw van mijn moeder
2 years ago
Dit boek aan het lezen.
Comment and receive 25 YP
The survival of every day - tip 1
The first tip for the survival of every day is: dare to dream. The harsh reality of every day and the challenges it entails can make you lose your courage. Sometimes other people make our lives miserable; they laugh about your ambitions or warn you of disappointments. 'Dreams are cheating, 'they say. It can make you cynical, but don't fall for that trap! Tell me honestly, do you dare to dream? “Everyone dreams, but not everyone has the same dream. Whoever dreams at night, in the dusty pits of his head, wakes up to discover that that dream meant nothing. Those who dream during the day are dangerous, because they can pursue their dream with their eyes open, to make it come true.” - T.E. Lawrence - You have different kinds of dreams. They can be pure fantasy or very powerful in our reality; your life! Dreams that are not about anything or that inspire us. My encouragement is: go for the second kind. It's the art of dreaming the “dangerous dreams” of daytime. Think big. Think what makes you happy or happy. What if you never had to work again? What does your heart beat faster? What can be so real no longer? It helps me at least once a year to withdraw myself to a quiet place for 1 or 2 days and be busy with these questions. What do I dream of? Where do I want to be in 5 years? Someone once told me: “You overestimate what you can do in a year, but underestimate what you can do in five years.” That helps me not to dream too small, but at the same time be patient. So: write down your dream. Remind yourself, hang it somewhere where you see it every day. Share it with others, and let them remind you. Or share it in the comments below; what is your dream? #survival #tips The tips come from survival expert Bear Grills; the world's best-known survival expert, complemented by my own experiences.
- Yoors Security - Disclaimer: This post is intended for security researchers & testersScopeEligible domainsyoo.rsVulnerabilities that we accept:✅ Stored or reflected Cross-Site Scripting✅ CSRF/XSRF✅ SQL injection✅ S3 bucket uploads✅ Remote Code Execution✅ Authentication Bypass✅ Unauthorized data access✅ User enumerationVulnerabilities that we don't accept:❌ "Self" Cross-Site Scripting❌ Missing best practices in DNS configuration (DKIM/DMARC/SPF/TXT)❌ Denial of Service (DOS) attacks❌ Vulnerabilities in third party applications that integrate with Yoors❌ Rate limiting❌ Non-security-impacting UX issues❌ Social Engineering attacks❌ Insecure cookies❌ Only affecting outdated browsers/platforms/frameworks❌ Considered by the Yoors staff to be of low severityRulesTake responsibility and act with extreme care and caution. When investigating the matter, only use methods or techniques that are necessary in order to find or demonstrate the weaknesses.You must be the first one that reported the vulnerability Do not use weaknesses you discover for purposes other than your own investigation Do not use social engineering to gain access to a system or a Yoors account Do not install any backdoors – not even to demonstrate the vulnerability of a system Do not alter or delete any information in the system. If you need to copy information for your investigation, never copy more than you need. If one record is sufficient, do not go any further Do not alter the system in any way If you do manage to infiltrate a system, do not share access with others Do not use brute force techniques to gain access to systemsHow to reportProvide your IP address in the report. This will be kept private for tracking your testing activities and to review the logs from our sideYou can report weaknesses to us by email: email@example.comDescribe the found weakness as explicit and detailed as possible and provide any evidence you might have, so that we can reproduce itWe will not accept only automated scanners output as evidenceParticularly include the following in your e-mail:Which vulnerabilityThe steps you undertookThe entire URLObjects/files that were involvedVideos and/or screenshots of an attack are highly appreciated
Promote your post here
Report this post
Share on one of these networks
Shortened address for this post Warning: This gets refreshed every hour!
This is the unique QR code for this post. Tip: Download your QR code with the button below or print it. Share it however you want with your friends and connections!