|
Kent Sharkey wrote: Cheap Fast Good pick two...
Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012
|
|
|
|
|
Roughly estimating, more than 20% of GitHub repositories that implement an attack tool / exploit PoC are written in Python. Script kiddies like scripting languages
|
|
|
|
|
In a study published by the Advanced Energy Materials journal, scientists from Surrey's Advanced Technology Institute (ATI) detail an innovative solution for powering the next generation of electronic devices by using Triboelectric Nanogenerators (TENGs). "The Matrix is a computer-generated dream world built to keep us under control in order to change a human being into batteries."
I wonder why they never created a sequel to that movie?
No. There. was. no. sequel.
|
|
|
|
|
Here’s a familiar scenario: You’re up to your ears in projects. Despite this, your boss comes up with a new initiative and is asking you to spearhead it, knowing full well you’re already overloaded. You somehow ignore the internal screaming inside your head and, to your own disbelief, you hear yourself saying yes to this request. Why? No? No!
|
|
|
|
|
Another hint to Robot Chris?
|
|
|
|
|
no
TTFN - Kent
|
|
|
|
|
Kent Sharkey wrote: no Ok.. you have passed your first test. Let's go to the second one.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
What do these words have in common? Ginger, Space Monkey, Coltrane, Longhorn. "Then I see you coming out of nowhere"
Sorry, it's just my favourite example of a great code name leading to a really bad product name (no extra points if you guess the company responsible)
|
|
|
|
|
I just had a flashback. The Izenda site renders correctly in Edge and Internet Explorer, and is unreadable garbage in Chrome.
Someone call the 90's, we've got another one...
Software Zen: delete this;
|
|
|
|
|
Gary Wheeler wrote: The Izenda site renders correctly in Edge and Internet Explorer, and is unreadable garbage in Chrome
That's a weird site, with a homegrown web tool I got the error:
Quote: The underlying connection was closed: An unexpected error occurred on a send.
|
|
|
|
|
you mean here[^]???
seems to be ok to me...
#SupportHeForShe
Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson
You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun
|
|
|
|
|
Works fine in Chrome for me.
- I would love to change the world, but they won’t give me the source code.
|
|
|
|
|
They apparently fixed it shortly after I posted my observation.
Software Zen: delete this;
|
|
|
|
|
Ah, Longhorn... Vista by any other name, how I love thee. Not.
/ravi
|
|
|
|
|
'Longhorn' was an appropriate name - given the amount of bullsh!t you had to deal with.
Software Zen: delete this;
|
|
|
|
|
Facebook CEO Mark Zuckerberg is off to a slow start in his mission to bring virtual reality to the masses, so perhaps it's appropriate his company's next VR headset will be called Quest. Just in case you need a case of motion sickness
|
|
|
|
|
I can see a new Privacy update being issued that allows FB to tap your brain so they can provide you with ads that are relevant to your interests...of course!
I may not be that good looking, or athletic, or funny, or talented, or smart
I forgot where I was going with this but I do know I love bacon!
|
|
|
|
|
VirusTotal Enterprise offers significantly faster and more customizable malware search, as well as a new feature called Private Graph, which allows enterprises to create their own private visualizations of their infrastructure and malware that affects their machines. Get all your viruses in a single bowl of VirusTotal
|
|
|
|
|
Oh VirusTotal. They are so great.
Sometimes I get curious and submit a link from an email I just received. Of course, VirusTotal always tells me that the thing is clean.
I am perfectly sure that I can detect malware far better than that crappy site.
Oh sanctissimi Wilhelmus, Theodorus, et Fredericus!
|
|
|
|
|
Project Zero accuses Linux distributions of leaving users exposed to known kernel vulnerabilities for weeks. See: Linux is the new Windows (and Windows is also the new Windows)
|
|
|
|
|
Not just kernel patching, many distros are amazingly behind in updates. The slowness of Debian versions is pretty astonishing, until you deal with RHEL and CentOS!
|
|
|
|
|
Joe Woodbury wrote: RHEL and CentOS Red Hat gets certified by some American authority. That takes time, but you can be sure that the NSA will then know how to deal with that OS. CentOS is just a re-branded Red Hat.
Oh sanctissimi Wilhelmus, Theodorus, et Fredericus!
|
|
|
|
|
Roslyn is the codename-that-stuck for the open-source compiler for C# and Visual Basic.NET. Here’s how it started in the deepest darkness of last decade’s corporate Microsoft, and became an open source, cross-platform, public language engine for all things C# (and VB) "Just sit right back and you'll hear a tale, a tale of a fateful trip"
|
|
|
|
|
Yes, this is new info although it sounds somewhat familiar.
Are long passphrases the answer to password problems? | CSO Online[^]
article said: Kevin Mitnick, chief hacking officer for KnowBe4, Inc. (my full-time employer) kills that supposed fact with his latest video. In it, he cracks a 17-character, complex password in 31 seconds. Because of this, Mitnick recommends using simple, long passphrases (also known as “PassSentences”) 25 characters or more, something like, “I like to go to the beach to get wet.” Kevin also recommends using a good password manager to manage your passphrases.
Quote: It’s good, sound advice. I agree with most of it. The only part I’m not sure about is the 25-character-minimum requirement. The reason is that while using 25-character or longer passwords might make password cracking (i.e., password hash cracking and password guessing) harder to pull off, it increases the risk that users will reuse the same password across different security domains, which is what NIST’s latest advice is trying to prevent.
Use a password manager (like cyapass.com) and creating 25 character or longer passwords is no problem.
I suppose we will always have passwords.
I like this solution that Microsoft is proposing with yubikey FIDO2 etc.
Watch the video -- it is very cool how it works:
Windows Hello and FIDO2 Security Keys enable secure and easy authentication for shared devices - Microsoft 365 Blog[^]
If it really worked that way.
|
|
|
|
|
DoD's been doing PKI with a similar system (smartcards instead of USB keys) for over a decade. It is very portable and works well, and for the life of me I cannot figure out why there aren't more commercial identity providers out there with a larger client base.
"Never attribute to malice that which can be explained by stupidity."
- Hanlon's Razor
|
|
|
|