Rofl... I'm a patient person and even I don't have the patience for that
Edit: I take it back, as @schmidtgenetics suggested, I tried it in my current book, that was annoyingly closing itself all the time, at around 10 pages a go, and it does work really really well, and only toook 1 or 2 minutes.
So, thanks for the tip, I'll be doing this going forward!
I grew up playing a mud called discworldmud, it's an entire multiplayer world that's still really active and entirely text based and entirely free. You should check that out. Plus Tintin++ to connect from your terminal ;)
Though I read that study was skewed by the average age of people that can afford to live near a golf course. They didn't compare like for like in terms of health (as I recall anyway, open to correction!)
Unless I'm missing something here... The attacker needs to be running some sort of executable in your network with permissions to:
dig the records and assemble the strings
write the decoded result to a file
make that file executable
execute that file
You've got bigger problems than hexadecimal txt records in this scenario...
The only difference between this and a GitHub gist appears to be that security software doesn't scan traffic in port 53... It easily could be configured for that though surely... It's just UDP traffic like any other.
Haha, what a delight, my first wild spotting of the thorn (þ) character! I watched a YouTube video by a language nerd who'd love to see it resurrected :)
Rofl... I'm a patient person and even I don't have the patience for that
Edit: I take it back, as @schmidtgenetics suggested, I tried it in my current book, that was annoyingly closing itself all the time, at around 10 pages a go, and it does work really really well, and only toook 1 or 2 minutes.
So, thanks for the tip, I'll be doing this going forward!