Henry Romero/Reuters An ongoing excavation in the heart of Mexico City, once the great Aztec capital Tenochtitlan, has revealed a legendary tower inlaid with hundreds of skulls. This tower was first described by Europeans in the early 16th century, when a Spanish soldier named Andres de Tapia came to the city with Hernan Cortez’ invading force. In his memoirs, de Tapia described an “ediface” covered in tens of thousands of skulls. Now his account is corroborated by this historic find. A tzompantli, illustrated in the 16th-century Aztec manuscript, the Durán Codex. (credit: Wikimedia) According to a report from Reuters , the tower is 6 meters in diameter, and once stood at the corner of a massive temple to Huitzilopochtli, an Aztec god associated with human sacrifice, war, and the sun. It’s likely the tower was part of a structure known as the Huey Tzompantli, which many of de Tapia’s contemporaries also described. Read 5 remaining paragraphs | Comments
Read more here:
Archaeologists uncover Tenochtitlan’s legendary tower of skulls
ITWire reports: A flaw in systemd, the init system used on many Linux systems, can be exploited using a malicious DNS query to either crash a system or to run code remotely. The vulnerability resides in the daemon systemd-resolved and can be triggered using a TCP payload, according to Ubuntu developer Chris Coulson. This component can be tricked into allocating less memory than needed for a look-up. When the reply is bigger it overflows the buffer allowing an attacker to overwrite memory. This would result in the process either crashing or it could allow for code execution remotely. “A malicious DNS server can exploit this by responding with a specially crafted TCP payload to trick systemd-resolved in to allocating a buffer that’s too small, and subsequently write arbitrary data beyond the end of it, ” is how Coulson put it. Affected Linux vendors have pushed out patches — but the bug has apparently been present in systemd code since June of 2015. And long-time Slashdot reader walterbyrd also reports a recently-discovered bug where systemd unit files that contain illegal usernames get defaulted to root. Read more of this story at Slashdot.