<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Internet on Teddy Ferdinand</title><link>https://tferdinand.net/en/tags/internet/</link><description>Recent content in Internet on Teddy Ferdinand</description><generator>Hugo</generator><language>en-US</language><lastBuildDate>Wed, 29 Apr 2026 13:19:30 +0000</lastBuildDate><atom:link href="https://tferdinand.net/en/tags/internet/index.xml" rel="self" type="application/rss+xml"/><item><title>Why `curl | bash` is a dangerous bad habit</title><link>https://tferdinand.net/en/why-curl-bash-is-a-dangerous-bad-habit/</link><pubDate>Wed, 29 Apr 2026 09:42:21 +0000</pubDate><guid>https://tferdinand.net/en/why-curl-bash-is-a-dangerous-bad-habit/</guid><description>&lt;p&gt;Recently, I stumbled again upon an old bad habit from the Linux/DevOps/Cloud world: installing a tool with a command like:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-fallback" data-lang="fallback"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;curl -sSL https://example.com/install.sh | bash
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Or worse:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-fallback" data-lang="fallback"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;curl -sSL https://example.com/install.sh | sudo bash
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;We have all seen it before.&lt;br&gt;
We have probably all used it at some point.&lt;/p&gt;
&lt;p&gt;And let’s be honest for a minute: in many official documentations, this is still presented as the “simple” way to install a tool.&lt;/p&gt;</description></item><item><title>Why and how I got rid of Disqus</title><link>https://tferdinand.net/en/why-and-how-i-got-rid-of-disqus/</link><pubDate>Mon, 20 Jul 2020 08:00:00 +0000</pubDate><guid>https://tferdinand.net/en/why-and-how-i-got-rid-of-disqus/</guid><description>&lt;p&gt;Lately, I&amp;rsquo;ve made some changes to this blog, discreetly. One of the main changes is the management of comments, goodbye Disqus, hello Commento. I&amp;rsquo;ll explain why&amp;hellip;&lt;/p&gt;
&lt;h2 id="a-bit-of-history-of-this-blog"&gt;A bit of history of this blog&lt;/h2&gt;
&lt;p&gt;At the beginning (I&amp;rsquo;m talking about February 2019, not old times) of this blog, my goal was rather simplistic: I wanted to share my knowledge, my vision on certain subjects and talk about anecdotes of all kinds. A year and a half and forty posts later, goal achieved!&lt;/p&gt;</description></item><item><title>What the Twitter hack teaches us (or reminds us of)</title><link>https://tferdinand.net/en/what-the-twitter-hack-teaches-us-or-reminds-us-of/</link><pubDate>Fri, 17 Jul 2020 22:00:00 +0000</pubDate><guid>https://tferdinand.net/en/what-the-twitter-hack-teaches-us-or-reminds-us-of/</guid><description>&lt;p&gt;A few days ago, Twitter was the target of a hack inviting, via &amp;ldquo;verified accounts&amp;rdquo;, users to send BitCoins to receive double the amount. I suggest a small post on what we can learn from this attack, from a computer security point of view.&lt;/p&gt;
&lt;h4 id="disclaimer"&gt;Disclaimer&lt;/h4&gt;
&lt;p&gt;The purpose of this article is not to make an umpteenth analysis of this attack, but rather to recall some basic rules of computer security that this attack reminds me of.&lt;/p&gt;</description></item><item><title>I got phished, but its for science!</title><link>https://tferdinand.net/en/got-phished-but-its-for-science/</link><pubDate>Mon, 30 Mar 2020 05:00:00 +0000</pubDate><guid>https://tferdinand.net/en/got-phished-but-its-for-science/</guid><description>&lt;p&gt;We often hear about scam, phising.&lt;/p&gt;
&lt;p&gt;Today, I have a special note for you: I was deliberately phished to show you the other side of the world!&lt;/p&gt;
&lt;h2 id="point-very-important"&gt;Point VERY important!&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;The manipulations that you will see below (and in particular the fact of voluntarily going on a phishing site) can be dangerous for your system and/or your personal data. They have been made in a sandbox environment and must not be reproduced without prior protection.&lt;/strong&gt;&lt;/p&gt;</description></item></channel></rss>