4min chapter

The Changelog: Software Development, Open Source cover image

Efficient Linux at the CLI (Interview)

The Changelog: Software Development, Open Source

CHAPTER

The Importance of Job Control

The attacker uses the tool in order to force it to hallucinate something. And then it goes and puts something in that location and just waits for somebody else to hit it with the Zainlina questioning basically. Adam: What question would the MPM world have commonly that I can leverage as an attack vector? How would I left pad a string with a bunch of spaces? That's a little joke for those of us in the VIM world.

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode