|
*something*something* scientists, can not should.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Is the tech industry ethical? Does it have to be? And the consumer demand for features is more important than security. And millennials don’t even care about privacy anyway. Especially the legally part (asking for a friend)
|
|
|
|
|
... hypothetically; of course.
I believe the business bears responsibility for the code.
I also believe the business should enforce policies on the IT staff to ensure the software that meets these needs.
The problem is that the business does not know how to review software for potential security/ethical concerns; furthermore, the developers don't have a clue as to how half of the stuff works that they bring via GIT, NuGet, or any other imported frameworks etc. Not to mention the copy/pasting what we see here and on S/O
Director of Transmogrification Services
Shinobi of Query Language
Master of Yoda Conditional
|
|
|
|
|
The term “Modern C++” is often used interchangeably with “Code using the new C++ standard”. "What kind of fool do you think I am? You think I know nothing of the modern world"
|
|
|
|
|
...like the new spaceship operator?
|
|
|
|
|
You don't focus as well as you think you do. That's the fundamental finding of a team of researchers from Princeton University and the University of California-Berkeley who studied monkeys and humans and discovered that attention pulses in and out four times per second. "Squirrel!"
|
|
|
|
|
"You don't focus as well as you think you do."
Ha! I never thought I focused well. My teachers agreed.
|
|
|
|
|
It’s the programming equivalent of the circle of life: programming languages are created, gain popularity, hit their peak, and slowly degrade until nobody uses them anymore. COBOL makes the list (for the last 58 or so years)!
|
|
|
|
|
Quote: In the TIOBE Index, R has tumbled from 18th to 15th place over the past year All languages wish they could 'tumble' like that.
"the debugger doesn't tell me anything because this code compiles just fine" - random QA comment
"Facebook is where you tell lies to your friends. Twitter is where you tell the truth to strangers." - chriselst
"I don't drink any more... then again, I don't drink any less." - Mike Mullikins uncle
|
|
|
|
|
Does asking questions about a language mean it is more popular, or that there are more problems with trying to maintain obsolete code?
Director of Transmogrification Services
Shinobi of Query Language
Master of Yoda Conditional
|
|
|
|
|
Here's hoping that Javascript gets on that list sooner, rather than later. Python too.
|
|
|
|
|
COBOL has been doomed to extinction for decades, but will likely never die as far too many business critical applications are entirely dependant upon it (banks, financial institutions etc).
"There are two ways of constructing a software design: One way is to make it so simple that there are obviously no deficiencies, and the other way is to make it so complicated that there are no obvious deficiencies. The first method is far more difficult." - C.A.R. Hoare
Home | LinkedIn | Google+ | Twitter
|
|
|
|
|
What does it mean to be passionate about programming? And is it really desirable? "Baby, all I’ve got to give to you is passion "
|
|
|
|
|
Google has been improving its Android anti-malware protections for years, but that doesn’t mean its built-in tool to handle and prevent malware attacks is your best choice for staying protected. In fact, the exact opposite is true: The Play Protect malware protection that’s built into Android ranked last yet again in recent antivirus rankings. Fortunately, hardly anyone has an Android device
|
|
|
|
|
Interpreter for Abode PostScript and PDF page description languages is used by large numbers of vendors - and in enterprises around the world. For those not afraid of no ghosts
|
|
|
|
|
Steam Play uses a modified version of WINE and a new DirectX compatibility layer. But Linux already has so many great games!
|
|
|
|
|
A vulnerability affects all versions of the OpenSSH client released in the past two decades, ever since the application was released in 1999. Open right there in the name
|
|
|
|
|
The simple addition of silica could help eliminate fire hazards. Explosive, and now with shrapnel!
|
|
|
|
|
It took a lot less than you'd think for myself and my fellow teens to steal the midterms. Fortunately the good hackers wouldn't bother
Yeah, a duplicate, but I'm sucking up to the boss here. Send all Leslies to his attention.
Plus, it has more details on the vulnerabilities, like:
"By inputting a command into the search bar to see all the website’s tables, I could then see all of its data, including vote tallies, candidate names and tables of basic website functions."
Thank you lowest bidder website developers!
|
|
|
|
|
The details are sparse, but it appears that they basically reconstructed a server with no security. That isn't to say there's sloppy work out there--Experian and many other come to mine--but I think the article is misleading.
|
|
|
|
|
Yea, DEFCON is a conference, and in this particular one they stood up a cyber range that kids were taught to use SQL injection on.
I've been to events like this before, and there are always built-in vulnerabilities: such as direct user input interpolation into SQL queries. These are meant to be teaching tools for people that are interested in hacking, not a model of the current system.
Disingenuous at best.
"Never attribute to malice that which can be explained by stupidity."
- Hanlon's Razor
|
|
|
|
|
How to stop people changing the url? Plz send codes, its urgent!
|
|
|
|
|
You will have a hard time convincing me that this is not a fabricated story. Or that the program that was hacked is actually used in production.
I have a really hard time believing that in 2018, programmers are still not protecting their programs and databases from SQL injection or making sure that the permissions to alter tables are not locked down.
Brent
|
|
|
|
|
I'll give you the first two points, but on programmers not protecting their programs and databases? Na-uh
See: Q&A, SO, and many of the sites listed on Have I Been Pwned[^]
TTFN - Kent
|
|
|
|
|
Do you go to Quick Answers[^] from time to time?
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|