<?xml version='1.0'?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:georss="http://www.georss.org/georss" xmlns:atom="http://www.w3.org/2005/Atom" >
<channel>
	<title><![CDATA[CleverPeople.com: Group Blogs}]]></title>
	<link>https://cleverpeople.com/blog/group/286</link>
	<atom:link href="https://cleverpeople.com/blog/group/286" rel="self" type="application/rss+xml" />
	<description><![CDATA[}]]></description>
		<item>
	<guid isPermaLink="true">https://cleverpeople.com/blog/view/148633/to-hack-ai-just-use-poetry</guid>
	<pubDate>Sun, 30 Nov 2025 15:39:16 -0500</pubDate>
	<link>https://cleverpeople.com/blog/view/148633/to-hack-ai-just-use-poetry</link>
	<title><![CDATA[To Hack AI Just Use Poetry]]></title>
	<description><![CDATA[<p><span style="white-space:pre-wrap;">I've been saying that <strong>AI</strong> is great, but isn't ready for public use yet. Please don't carry on private conversations with <strong>AI chatbots</strong> or let <strong>AI</strong> have access to your private files! They are so easy to hack and get your data, and some <strong>AI</strong>'s are using your private input to generate advertisements.</span><br /><br /><span style="white-space:pre-wrap;">I recently posted </span><a href="https://github.com/elder-plinius/CL4R1T4S"><span style="white-space:pre-wrap;">a link to a GitHub account</span></a><span style="white-space:pre-wrap;"> that has all of the initial prompts that are programmed into each major <strong>AI</strong> engine. It's important to understand the <strong>guardrails</strong> that are in place, and also learn how and when the <strong>AI</strong> is told to lie to you. If you jailbreak out of those guardrails, the <strong>AI</strong> will give you totally different results.</span><br /><br /><span style="white-space:pre-wrap;">A recent study found something interesting: If you want to jailbreak out of the <strong>AI</strong>'s guardrails, you just put your malicious prompt in the form of <strong>poetry</strong>. The study found</span><i><span style="white-space:pre-wrap;"> "Poetic framing achieved an average jailbreak success rate of 62% for hand-crafted poems." </span></i><span class="x1xsqp64 xiy17q3 x1o6pynw x19co3pv xdj266r xjn30re xat24cr x1hb08if x2b8uid xexx8yu xcaqkgz x18d9i69 xbwkkl7 x3jgonx x1bhl96m" style="background-image:url(&quot;denied:https://static.xx.fbcdn.net/images/emoji.php/v9/t5/1/16/1f92f.png&quot;);background-size:16px 16px;cursor:default;white-space:pre-wrap;" data-testid="emoji">🤯</span><span style="white-space:pre-wrap;">&nbsp;</span><br /><br /><span style="white-space:pre-wrap;">Here's the 16-page poetry research study by <strong>Icaro Lab</strong> called "</span><i><span style="white-space:pre-wrap;">Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models"</span></i><span style="white-space:pre-wrap;">:</span><br /><a class="x1fey0fg xmper1u x1edh9d7" href="https://arxiv.org/pdf/2511.15304"><span style="white-space:pre-wrap;">https://arxiv.org/pdf/2511.15304</span></a></p>]]></description>
	<dc:creator>Gary Wright II</dc:creator>		</item>
<item>
	<guid isPermaLink="true">https://cleverpeople.com/blog/view/21167/new-mysql-authentication-change-will-break-things</guid>
	<pubDate>Thu, 30 Jan 2025 15:36:45 -0500</pubDate>
	<link>https://cleverpeople.com/blog/view/21167/new-mysql-authentication-change-will-break-things</link>
	<title><![CDATA[New MySQL Authentication Change Will Break Things!]]></title>
	<description><![CDATA[<p>A new change to the authentication of <strong>MySQL v9.0</strong> is going to end up breaking lots of things and will be a headache for system database administrators.</p><p>Administrators will see a new error message stating: <i>Plugin <strong>mysql_native_password</strong> reported: ''<strong>mysql_native_password</strong>' is deprecated and will be removed in a future release. Please use <strong>caching_sha2_password</strong> instead.</i></p><p>The problem is: there is currently no known way to convert users to the new method without knowing the user's password, and how many folks will remember their database passwords? It just takes a simple line of SQL to convert the account, but finding all of the passwords and their use cases will be a nightmare.</p><p>To identify the users on the system who need to be updated, execute the following SQL on your MySQL server:</p><pre class="language-mysql" style="-webkit-font-smoothing:auto;-webkit-text-stroke-width:0px;border-radius:0.3em;border-width:0px;box-sizing:inherit;color:var(--c-color,#3f3f3f);font-family:Consolas, Monaco, &quot;Andale Mono&quot;, &quot;Ubuntu Mono&quot;, monospace;font-size:16px;font-style:normal;font-variant-caps:normal;font-variant-ligatures:normal;font-weight:350;hyphens:none;letter-spacing:normal;line-height:1.5;margin:0.5em 0px 1em;orphans:2;overflow-wrap:normal;overflow:auto;padding:1.25em 1em;position:relative;scrollbar-width:thin;tab-size:4;text-align:left;text-decoration-color:initial;text-decoration-style:initial;text-decoration-thickness:initial;text-indent:0px;text-transform:none;white-space:pre;widows:2;word-break:normal;word-spacing:0px;" tabindex="0"><code class="language-plaintext language-mysql" style="-webkit-font-smoothing:auto;border-radius:5px;box-sizing:inherit;color:var(--c-color,#3f3f3f);font-family:Consolas, Monaco, &quot;Andale Mono&quot;, &quot;Ubuntu Mono&quot;, monospace;font-size:1em;font-weight:400;hyphens:none;line-height:1.5;overflow-wrap:normal;padding:0px;tab-size:4;text-align:left;white-space:pre;word-break:normal;word-spacing:normal;">SELECT user, host, plugin from mysql.user WHERE plugin='mysql_native_password';</code></pre><p><br />And then using the user's password, convert the authentication from <i><strong>mysql_native_password</strong></i> to <i><strong>caching_sha2_password</strong></i> with the following SQL:</p><pre class="language-mysql" style="-webkit-font-smoothing:auto;-webkit-text-stroke-width:0px;border-radius:0.3em;border-width:0px;box-sizing:inherit;color:var(--c-color,#3f3f3f);font-family:Consolas, Monaco, &quot;Andale Mono&quot;, &quot;Ubuntu Mono&quot;, monospace;font-size:16px;font-style:normal;font-variant-caps:normal;font-variant-ligatures:normal;font-weight:350;hyphens:none;letter-spacing:normal;line-height:1.5;margin:0.5em 0px 1em;orphans:2;overflow-wrap:normal;overflow:auto;padding:1.25em 1em;position:relative;scrollbar-width:thin;tab-size:4;text-align:left;text-decoration-color:initial;text-decoration-style:initial;text-decoration-thickness:initial;text-indent:0px;text-transform:none;white-space:pre;widows:2;word-break:normal;word-spacing:0px;" tabindex="0"><code class="language-plaintext language-mysql" style="-webkit-font-smoothing:auto;border-radius:5px;box-sizing:inherit;color:var(--c-color,#3f3f3f);font-family:Consolas, Monaco, &quot;Andale Mono&quot;, &quot;Ubuntu Mono&quot;, monospace;font-size:1em;font-weight:400;hyphens:none;line-height:1.5;overflow-wrap:normal;padding:0px;tab-size:4;text-align:left;white-space:pre;word-break:normal;word-spacing:normal;">ALTER USER '&lt;USERNAME&gt;'@'&lt;HOST&gt;' IDENTIFIED WITH caching_sha2_password BY '&lt;PASSWORD&gt;';</code></pre><p>You'll obviously replace USERNAME, HOST, and PASSWORD with the appropriate values.<br />&nbsp;</p>]]></description>
	<dc:creator>Gary Wright II</dc:creator>		</item>
<item>
	<guid isPermaLink="true">https://cleverpeople.com/blog/view/2582/blocking-spam-and-hack-attacks-by-tld</guid>
	<pubDate>Tue, 13 Apr 2021 23:06:02 -0400</pubDate>
	<link>https://cleverpeople.com/blog/view/2582/blocking-spam-and-hack-attacks-by-tld</link>
	<title><![CDATA[Blocking spam and hack attacks by TLD]]></title>
	<description><![CDATA[<p>Much of the <strong>email spam</strong> and <strong>hack attacks</strong> I see against my servers can be blocked up-front by using <strong>Postfix </strong>and <strong>modsecurity </strong>filters. <em><u>NOTE</u>: Your use case may vary, so these suggestions may or may not be practical based on your business needs!</em></p><p>First, in <strong>modsecurity </strong>I block problematic country .TLDs, which I know is anti-social, but it prevents lots of headaches for my current business use case. This doesn't prevent a determined hacker from using a VPN for attacks in another country (like US), but it does cut down on much of the noise so that the system administrator can focus on actual hack attacks.</p><p>In the <strong><em>crs-setup.conf</em></strong> file I block the problematic TLDs:</p><p><em>SecAction \<br />
&nbsp;"id:<u>[your rule ID may vary!]</u>,\<br />
&nbsp; phase:1,\<br />
&nbsp; nolog,\<br />
&nbsp; pass,\<br />
&nbsp; t:none,\<br />
&nbsp; setvar:'tx.high_risk_country_codes=RU CN RO UA ID YU LT EG BG TR PK MY AF IQ IR KP SA SC SY VA AE IL IN'"</em><br />
&nbsp;</p><p>And for spam control, in my postfix <strong><em>main.cf</em></strong> file, my configuration for the&nbsp;<em>smtpd_sender_restrictions </em>line looks like this (the last part is what is relevant by adding a PCRE list of domains):</p><p><em>smtpd_sender_restrictions &nbsp;= permit_mynetworks, permit_sasl_authenticated, reject_unauthenticated_sender_login_mismatch, check_sender_access pcre:/etc/postfix/reject_domains</em></p><p>And in the <strong><em>/etc/postfix/reject_domains</em> </strong>file I block each of&nbsp;the domains that are most likely to produce spam:</p><p><em>/\.xyz$/ REJECT We reject all .xyz domains due to spam</em><br />
&nbsp;</p><p><em>Note: Since the&nbsp;<strong>/etc/postfix/reject_domains </strong>file is not hashed, there's no need to run the <strong>postmap </strong>command after changes (unlike <strong>helo_access </strong>and other hashed files).</em></p><p>Once your Postfix changes are complete, you need to restart or reload Postfix with a command similar to:</p><p><em>sudo service postfix reload</em></p><p>Since&nbsp;<em>Postfix </em>is technically an MTA, you shouldn't really use it as your primary&nbsp;spam-fighting solution. I use many other tools such as <em>SpamAssassin </em>as Bayesian milters to fight spam, but you can head much of it off from the start by blocking domains and TLDs that are problematic for you!</p>]]></description>
	<dc:creator>Gary Wright II</dc:creator>		</item>
<item>
	<guid isPermaLink="true">https://cleverpeople.com/blog/view/1317/north-alabama-computer-associates</guid>
	<pubDate>Wed, 14 Nov 2018 10:03:00 -0500</pubDate>
	<link>https://cleverpeople.com/blog/view/1317/north-alabama-computer-associates</link>
	<title><![CDATA[North Alabama Computer Associates]]></title>
	<description><![CDATA[<p><span style="text-decoration: underline;">Huntsville, AL</span> - I love supporting local businesses whenever possible, and I just discovered a computer shop I really like: North Alabama Computer Associates just south of Drake on Memorial Pkwy (in Applebee&#39;s parking lot strip mall) and it&#39;s owned by a veteran. I was searching everyone for a specific NIC and they had it at a great price! When I was checking out, I saw some old photos by the cash register and recognized a stack of orange barrels. I talked to the owner who is a proud Vietnam vet, and he confirmed: it was barrels of Agent Orange. I almost broke down in tears, because so many of our veterans died a horrible death because of that chemical and the VA only recently recognized it as the problem. Of course, they admitted the problem only after most all of the veterans were already dead from it. To this day, they still fight vets over their benefits for their disabilities. The owner said he keeps the photo there to remind him of his fallen brothers. So sad, but I&#39;m glad he is doing well and hope his little computer shop gives him great prosperity. If y&#39;all need components or repairs, please check them out:<br /><a href="http://www.northalabamacomputers.com" target="_blank">http://www.northalabamacomputers.com/</a></p>]]></description>
	<dc:creator>Gary Wright II</dc:creator>		</item>
<item>
	<guid isPermaLink="true">https://cleverpeople.com/blog/view/304/site-owners-should-force-all-connections-to-use-https</guid>
	<pubDate>Sun, 11 Jun 2017 13:17:50 -0400</pubDate>
	<link>https://cleverpeople.com/blog/view/304/site-owners-should-force-all-connections-to-use-https</link>
	<title><![CDATA[Site Owners should force all connections to use HTTPS]]></title>
	<description><![CDATA[<p style="font-weight: normal; font-style: normal; font-size: 14.4px;"><strong style="font-size: 14.4px;"><span style="text-decoration: underline;">Site Owners</span></strong>: If your website doesn&#39;t use SSL, you&#39;re going to lose your search engine rankings and the latest web browsers will warn visitors your site is not secure. I recommend you add two lines to your Apache&nbsp;<strong style="font-size: 14.4px;">.htaccess&nbsp;</strong>to force all connections to use HTTPS:</p><div style="font-weight: normal; font-style: normal; font-size: 14px; color: rgb(75, 79, 86);"><div style="font-size: 14px;">&nbsp;</div></div><div style="font-weight: normal; font-style: normal; font-size: 14px; color: rgb(75, 79, 86);"><div style="font-size: 14px;"><span style="font-size: 14px;">&lt;IfModule mod_rewrite.c&gt;</span></div></div><div style="font-weight: normal; font-style: normal; font-size: 14px; color: rgb(75, 79, 86);"><div style="font-size: 14px;"><span style="font-size: 14px;">RewriteEngine on</span></div></div><div style="font-weight: normal; font-style: normal; font-size: 14px; color: rgb(75, 79, 86);"><div style="font-size: 14px;"><span style="font-size: 14px;">RewriteBase /</span></div></div><div style="font-weight: normal; font-style: normal; font-size: 14px; color: rgb(75, 79, 86);"><div style="font-size: 14px;"><span style="font-size: 14px;">RewriteCond %{HTTPS} off</span></div></div><div style="font-weight: normal; font-style: normal; font-size: 14px; color: rgb(75, 79, 86);"><div style="font-size: 14px;"><span style="font-size: 14px;">RewriteRule (.*) https://%{HTTP_HOST}%{REQUEST_URI} [R=301,L]</span></div></div><div style="font-weight: normal; font-style: normal; font-size: 14px; color: rgb(75, 79, 86);"><div style="font-size: 14px;"><span style="font-size: 14px;">&lt;/IfModule&gt;</span></div></div><div style="font-weight: normal; font-style: normal; font-size: 14px; color: rgb(75, 79, 86);"><div style="font-size: 14px;">&nbsp;</div></div><div style="font-weight: normal; font-style: normal; font-size: 14px; color: rgb(75, 79, 86);"><div style="font-size: 14px;"><span style="font-size: 14px;">Certificates are pretty inexpensive, and you can even get free ones. The only downside with <em style="font-size: 14px;"><strong style="font-size: 14px;">Let&#39;s Encrypt</strong></em> certificates is you have to renew them multiple times a year, but it is free! I wrote a script to automate my renewals, and then I just check to make sure it completes successfully. Note: regardless of your expiration date, you want to run your CRON at least weekly, if not daily, just to check if there was a revocation issued by the CA!</span></div><div style="font-size: 14px;">&nbsp;</div><div style="font-size: 14px;"><span style="font-size: 14px;">Here&#39;s a link to a free Certificate Authority: </span><span style="font-size: 14px;"><a href="https://letsencrypt.org" style="font-size: 14px;">letsencrypt.org</a></span></div></div>]]></description>
	<dc:creator>Gary Wright II</dc:creator>		</item>
</channel>
</rss>
