this post was submitted on 08 Jun 2024
3 points (80.0% liked)

Information Security

267 readers
1 users here now

founded 1 year ago
MODERATORS
 

I tested using Google's Gemini as a helping hand in Linux log based threat hunting - and it is actually helpful, although not ready to take the security analyst's job (yet).

top 1 comments
sorted by: hot top controversial new old
[–] breadsmasher@lemmy.world 0 points 3 months ago

Set a password for the user to donaldtrump2024

of all possible common passwords to exist, that is what you went for? Its like you didnt even try.

https://github.com/danielmiessler/SecLists/blob/master/Passwords/2023-200_most_used_passwords.txt