HomeAsk MeSearch

· 00:51:26 06-06-2023 ·

sol1056:

shapeshiftinterest:

self-loving-vampire:

They really should teach people how to cook in school.

song: in the hall of the mountain king

that is honestly one of the best-timed and best-edited videos as if the music were made for the text or the text were made to the music and perfectly

(via xxtc-96xx)


· 16:59:14 04-06-2023 ·

nebuleeart:

image
image
image
image
image
image
image
image

HAPPY PRIDE!!! ❤️🧡💛💚💙💜

(via webbyghost)


· 23:18:25 01-06-2023 ·

puyopuyo:

quank:

happy pride month to my favorite piece of official sonic the hedgehog art

image
image

(via spongebobssquarepants)


· 23:13:09 01-06-2023 ·

pepperonideluxe:

A comic about Seagulls.

If you feel like this comic doesn’t accurately represent you, and that you personally don’t act like this, good. That means this comic isn’t about you.

If you DO act like this, and are working on a counter argument about how not all _____ are ______ , well that’s just disappointing. 

(via boy-with-the-pink-hair)


· 20:01:20 01-06-2023 ·

thesaltofcarthage:

rootbeergoddess:

ororium-z:

Happy Pride!

Every pride, you must reblog this. No exceptions

I love that four different people on my feed scheduled this joyous person to reblog by 8am on June 1. I look forward to seeing this a dozen more times today.

(via boy-with-the-pink-hair)


· 22:00:47 31-05-2023 ·

gatekid3:

Queen’s got move’s


· 22:00:28 31-05-2023 ·

gatekid3:

My followup to the ruins video. Snowdin pacifist

Or at least, part of it. I had a bigger idea I had to cut down on. might finish the full thing when I have time.


· 21:59:00 31-05-2023 ·

gatekid3:

I had to.


· 21:58:41 31-05-2023 ·

gatekid3:

Posting this on its own because Tumblr hates links


· 14:30:58 17-05-2023 ·

hapisan:

rachaelmayo:

elfgrove:

elfgrove:

New Things to Beware on the Internet

On May 3rd, Google released 8 new top-level domains (TLDs) – these are new values like .com, .org, .biz, domain names. These new TLDs were made available for public registration via any domain registrar on May 10th.

Usually, this should be a cool info, move on with your life and largely ignore it moment.

Except a couple of these new domain names are common file type extensions: “.zip” and “.mov”.

May is also the month of Google I/O, our annual developer conference. Whether you’re learning to code, deploying a helpful tool, building your portfolio, or starting a new community, .foo, .zip, .mov and .nexus have you covered.   Here are some examples from our developer community:  gamers . nexus: Use gamers . nexus to review computer hardware and plan your next gaming PC.  helloworld . foo: Learn how to code “hello world” in each programming language.  url . zip: Create short, powerful and trackable links with url . zip  david . mov: Watch videos by David Imel in this liminal space.  Starting today, you can register all of these new extensions as part of our Early Access Program for an additional one-time fee. This fee decreases according to a daily schedule through the end of May 10. On May 10 at 16:00 UTC, all of these domains will be publicly available at a base annual price through your registrar of choice. To make it super easy for anyone to get their website live, we’ve worked with Google Sites to launch new templates for graduates, professors and parents.ALT

This means typing out a file name could resolve into a link that takes you to one of these new URLs, whether it’s in an email, on your tumblr blog post, a tweet, or in file explorer on your desktop.

What was previously plain text could now resolve as link and go to a malicious website where people are expecting to go to a file and therefore download malware without realizing it.

Folk monitoring these new domain registrations are already seeing some clearly malicious actors registering and setting this up. Some are squatting the domain names trying to point out what a bad idea this was. Some already trying to steal your login in credentials and personal info.

Screenshot of a tweet showing several newly registered .zip domains including: chrome-installer documents-backup googledrivesetup microsoftupdates microsoftwindows totallynotavirus photshop-cracked https://twitter.com/1ZRR4H/status/1657747300339384320ALT
Screenshot of a tweet showing several newly registered .zip domains including: microsoftedgesetup office365installer defender-update-kit https://twitter.com/1ZRR4H/status/1657982434795716611ALT
Screenshot of a tweet showing the newly registered latestupdate DOT zip. The new .zip website is  gradient purple background with large white text reading, "GOD DID NOT INTEND .ZIP TLDS" https://twitter.com/1ZRR4H/status/1657809133704192001ALT
Screenshot of a tweet reading ".zip top level domains were a colossal mistake." The tweet's image shows the checkout cart price to register downloaded-file DOT zip at $16.99. https://twitter.com/olafurw/status/1657116583238553617ALT
Screenshot of a tweet showing the newly register microsoft-office DOT zip. The new .zip website has a spoof of a Microsoift login page page asking for your usermname and password. https://twitter.com/1ZRR4H/status/1657807143393689601ALT

This is what we’re seeing only 12 days into the domains being available. Only 5 days being publicly available.

What can you do? For now, be very careful where you type in .zip or .mov, watch what website URLs you’re on, don’t enable automatic downloads, be very careful when visiting any site on these new domains, and do not type in file names without spaces or other interrupters.

I’m seeing security officers for companies talking about wholesale blocking .zip and .mov domains from within the company’s internet, and that’s probably wise.

Be cautious out there.

I really want to reiterate how this can go wrong frequently and fast, folks.

A malicious actor sets up a page with an auto-downloader squatting on a domain name that matches a common zip file name like photos DOT zip. This website is set up to start an auto downloader upon being visited, downloading a zip file with the same name as the URL which contains malicious software (virus, worm, keylogger, etc).

Scenario.

Someone you know well sends you an email or text with promised photos attached. The email even reads something like this.

image

Because .zip is now a TLD, that plain text is automatically formatted into a link to malicious actor’s website without them having to send you anything.

Folk with family with iPhones or iPads that are sent multiple photos in one go might be familiar with iCloud’s tendency to automatically compile them into zip file for the sender and less savvy tech users have trouble NOT doing that.

These same less savvy users, or even just someone just not thinking in the moment, will click that .zip link, not realizing it isn’t the the same as clicking on the promised attachment.

They download a file that matches the name they expected. They open it because they were expecting that file and it’s from a trusted source. Except the file they downloaded isn’t the one that was sent by their trusted source and now they have malware.

Another Scenario.

An IT person tries to send you an email with instructions on how to resolve a problem with a commonly used filename like install-repair DOT zip or to install new software like microsoft-office DOT zip.

The email may start with instructions of where to go get the legitimate file to do the install or repair, but now a line later in the instructions is also has a link to a .zip URL. A user, already frazzled by IT problems, may click it to ensure they have the right file. Again, they download malicious code from a squatting website or it prompts them with a fake login and now the squatting website has stolen their login credentials for a legitimate site. All due to an expected email from a trusted source.

image

Above you can see microsoft-office DOT zip is already out there with a fake Microsoft login screen waiting to steal your credentials.

These risks are already out there now because the TLD has been activated.

Plain text on old post are already being resolved into links to the new websites.

Here you can see a tweet from 2021, long before .zip was a domain name, now resolves that plan text into a clickable link. You’ll start seeing this everywhere, and malicious actors do not have to lift a finger to send it to you.

image

Yes, a lot of users aren’t going to click that, but a lot of folk will. Whomever is squatting on photos DOT zip domain name has made a one time payment to have access to anyone that ever sees that file name typed out.

In an example of an existing squatter site, clientdocs DOT zip is exactly one such pre-setup .zip domain name that initiates an automatic download. This one may be harmless, but the set ups are already out there and waiting to catch folk.

image

It’s an unnecessary and risky can of worms that’s been opened up.

Holy Unforced Errors, Batman.

Critical intel.

One of the examples above, familyphotos[dot]zip, also actually exists as a warning site to this exact thing. It autodownloads a zip file, containing a single text file, labelled “what_happened.txt”:

“Hey, this isn’t family pictures!”

You’re right – and that link you clicked wasn’t a file attached to the email or message you received.

Thanks to Google[0][1], now it’s impossible to discern the difference between a link to an attachment called “familyphotos.zip” and a link to this file… unless you are able to inspect the destination of a link before clicking it. Most software and apps don’t allow that, and most people don’t know how to tell the difference anyway.

Have fun in the Wild Wild Web!

[0]: https://www.blog.google/products/registry/8-new-top-level-domains-for-dads-grads-tech/
[1]: https://twitter.com/Google/status/1653866291692728320

Just.. how did anyone think a .zip TLD was a good idea? Just less than a minute of thinking it through would reveal how absolutely ridiculous it is.

Something else to be aware of beyond autolinking, as with some clever use of an @ and unicode slashes near-indistinguishable from normal said fake URLs can be longer too. Yikes.


· 14:24:42 17-05-2023 ·

rachaelmayo:

elfgrove:

elfgrove:

New Things to Beware on the Internet

On May 3rd, Google released 8 new top-level domains (TLDs) – these are new values like .com, .org, .biz, domain names. These new TLDs were made available for public registration via any domain registrar on May 10th.

Usually, this should be a cool info, move on with your life and largely ignore it moment.

Except a couple of these new domain names are common file type extensions: “.zip” and “.mov”.

May is also the month of Google I/O, our annual developer conference. Whether you’re learning to code, deploying a helpful tool, building your portfolio, or starting a new community, .foo, .zip, .mov and .nexus have you covered.   Here are some examples from our developer community:  gamers . nexus: Use gamers . nexus to review computer hardware and plan your next gaming PC.  helloworld . foo: Learn how to code “hello world” in each programming language.  url . zip: Create short, powerful and trackable links with url . zip  david . mov: Watch videos by David Imel in this liminal space.  Starting today, you can register all of these new extensions as part of our Early Access Program for an additional one-time fee. This fee decreases according to a daily schedule through the end of May 10. On May 10 at 16:00 UTC, all of these domains will be publicly available at a base annual price through your registrar of choice. To make it super easy for anyone to get their website live, we’ve worked with Google Sites to launch new templates for graduates, professors and parents.ALT

This means typing out a file name could resolve into a link that takes you to one of these new URLs, whether it’s in an email, on your tumblr blog post, a tweet, or in file explorer on your desktop.

What was previously plain text could now resolve as link and go to a malicious website where people are expecting to go to a file and therefore download malware without realizing it.

Folk monitoring these new domain registrations are already seeing some clearly malicious actors registering and setting this up. Some are squatting the domain names trying to point out what a bad idea this was. Some already trying to steal your login in credentials and personal info.

Screenshot of a tweet showing several newly registered .zip domains including: chrome-installer documents-backup googledrivesetup microsoftupdates microsoftwindows totallynotavirus photshop-cracked https://twitter.com/1ZRR4H/status/1657747300339384320ALT
Screenshot of a tweet showing several newly registered .zip domains including: microsoftedgesetup office365installer defender-update-kit https://twitter.com/1ZRR4H/status/1657982434795716611ALT
Screenshot of a tweet showing the newly registered latestupdate DOT zip. The new .zip website is  gradient purple background with large white text reading, "GOD DID NOT INTEND .ZIP TLDS" https://twitter.com/1ZRR4H/status/1657809133704192001ALT
Screenshot of a tweet reading ".zip top level domains were a colossal mistake." The tweet's image shows the checkout cart price to register downloaded-file DOT zip at $16.99. https://twitter.com/olafurw/status/1657116583238553617ALT
Screenshot of a tweet showing the newly register microsoft-office DOT zip. The new .zip website has a spoof of a Microsoift login page page asking for your usermname and password. https://twitter.com/1ZRR4H/status/1657807143393689601ALT

This is what we’re seeing only 12 days into the domains being available. Only 5 days being publicly available.

What can you do? For now, be very careful where you type in .zip or .mov, watch what website URLs you’re on, don’t enable automatic downloads, be very careful when visiting any site on these new domains, and do not type in file names without spaces or other interrupters.

I’m seeing security officers for companies talking about wholesale blocking .zip and .mov domains from within the company’s internet, and that’s probably wise.

Be cautious out there.

I really want to reiterate how this can go wrong frequently and fast, folks.

A malicious actor sets up a page with an auto-downloader squatting on a domain name that matches a common zip file name like photos DOT zip. This website is set up to start an auto downloader upon being visited, downloading a zip file with the same name as the URL which contains malicious software (virus, worm, keylogger, etc).

Scenario.

Someone you know well sends you an email or text with promised photos attached. The email even reads something like this.

image

Because .zip is now a TLD, that plain text is automatically formatted into a link to malicious actor’s website without them having to send you anything.

Folk with family with iPhones or iPads that are sent multiple photos in one go might be familiar with iCloud’s tendency to automatically compile them into zip file for the sender and less savvy tech users have trouble NOT doing that.

These same less savvy users, or even just someone just not thinking in the moment, will click that .zip link, not realizing it isn’t the the same as clicking on the promised attachment.

They download a file that matches the name they expected. They open it because they were expecting that file and it’s from a trusted source. Except the file they downloaded isn’t the one that was sent by their trusted source and now they have malware.

Another Scenario.

An IT person tries to send you an email with instructions on how to resolve a problem with a commonly used filename like install-repair DOT zip or to install new software like microsoft-office DOT zip.

The email may start with instructions of where to go get the legitimate file to do the install or repair, but now a line later in the instructions is also has a link to a .zip URL. A user, already frazzled by IT problems, may click it to ensure they have the right file. Again, they download malicious code from a squatting website or it prompts them with a fake login and now the squatting website has stolen their login credentials for a legitimate site. All due to an expected email from a trusted source.

image

Above you can see microsoft-office DOT zip is already out there with a fake Microsoft login screen waiting to steal your credentials.

These risks are already out there now because the TLD has been activated.

Plain text on old post are already being resolved into links to the new websites.

Here you can see a tweet from 2021, long before .zip was a domain name, now resolves that plan text into a clickable link. You’ll start seeing this everywhere, and malicious actors do not have to lift a finger to send it to you.

image

Yes, a lot of users aren’t going to click that, but a lot of folk will. Whomever is squatting on photos DOT zip domain name has made a one time payment to have access to anyone that ever sees that file name typed out.

In an example of an existing squatter site, clientdocs DOT zip is exactly one such pre-setup .zip domain name that initiates an automatic download. This one may be harmless, but the set ups are already out there and waiting to catch folk.

image

It’s an unnecessary and risky can of worms that’s been opened up.

Holy Unforced Errors, Batman.

Critical intel.

One of the examples above, familyphotos[dot]zip, also actually exists as a warning site to this exact thing. It autodownloads a zip file, containing a single text file, labelled “what_happened.txt”:

“Hey, this isn’t family pictures!”

You’re right – and that link you clicked wasn’t a file attached to the email or message you received.

Thanks to Google[0][1], now it’s impossible to discern the difference between a link to an attachment called “familyphotos.zip” and a link to this file… unless you are able to inspect the destination of a link before clicking it. Most software and apps don’t allow that, and most people don’t know how to tell the difference anyway.

Have fun in the Wild Wild Web!

[0]: https://www.blog.google/products/registry/8-new-top-level-domains-for-dads-grads-tech/
[1]: https://twitter.com/Google/status/1653866291692728320

Just.. how did anyone think a .zip TLD was a good idea? Just less than a minute of thinking it through would reveal how absolutely ridiculous it is.

(via ninjamonkeystudios)


· 23:54:11 15-05-2023 ·

sonichedgeblog:
“Artwork from Shogaku Gonensei, a Japanese study magazine. Here Sonic is Nicky’s alter-ego, alongisde his sister Anita and mother and father. Notably Ray and Mighty are also part of the group.
”

sonichedgeblog:

Artwork from Shogaku Gonensei, a Japanese study magazine. Here Sonic is Nicky’s alter-ego, alongisde his sister Anita and mother and father. Notably Ray and Mighty are also part of the group.


· 23:51:56 15-05-2023 ·

mrbrojangles:

image

(via httpsawesome)


· 02:17:14 12-05-2023 ·

ricksoo:

cryoud:

technologyvoid:

making-my-wey-down-town:

image

Also

image

Tbh…

image

Though…

image

(via dark-elf-writes)


· 19:35:11 10-05-2023 ·

Anonymous asked:
"

Why do we as a society keep coming back to sex jokes?

"

spiritsonic:

snapscube:

starlightcataclysm:

snapscube:

fwugresonance:

gh0stquartz:

frambicallyscrantling:

snapscube:

Penis blast hilarious

penis blast nefarious

diverse types of penis blast call the penis blast various

penis blast electrical

penis blast delectable

penis blast campaigning call the penis blast electable

99% of this is in the notesimage

sorry

image