|
trønderen wrote: He was a Christian, wasn't he? So I guess he is up there.
You make a few unwarranted assumptions:
- That there is a single Deity that controls our destinies
- That the Deity is that of the Christians
- That "Heaven" and "Hell" actually exist
- That "Heaven" is physically above us, and "Hell" is below us
- That Hemingway ended up in heaven
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
Those are essential assumptions. Your summary is both correct and fairly complete.
I am not going to defend a single one of those assumptions. Most certainly not.
As my signature suggests.
Religious freedom is the freedom to say that two plus two make five.
|
|
|
|
|
I don't think science fiction authors could have written a more perfect "end of world" scenario that leaves astronauts stranded. On the other hand, it does sound like a possible start to Rebecca Kelly's "The Eta Chronicles" (The Station and The Surface).
|
|
|
|
|
Artificial intelligence-generated comedy still reportedly requires humans, as it remains a struggle to write comedic content independently, as revealed by a new Google Deepmind study. As I demonstrate daily
|
|
|
|
|
|
WeAreDevelopers have published the results of their survey on tech recruiting. And 100% would just like the cheque
|
|
|
|
|
If you are not using random, computer-generated passwords, or one of the best password generators, chances are your logins can be cracked within an hour, research has warned. So don't bother using a hard one - they'll never expect you to use an easy one!
|
|
|
|
|
Other bad news.
They were able to compile a list of "top passwords" in the first place, which means someone is sharing or storing them clear text or at least reversible.
Whoops.
Check out my IoT graphics library here:
https://honeythecodewitch.com/gfx
And my IoT UI/User Experience library here:
https://honeythecodewitch.com/uix
|
|
|
|
|
Probably came from data breach collections.
|
|
|
|
|
Well even then, if they were one way encrypted the only ones they should be able to find are the easy to brute ones, like snoopy1.
Check out my IoT graphics library here:
https://honeythecodewitch.com/gfx
And my IoT UI/User Experience library here:
https://honeythecodewitch.com/uix
|
|
|
|
|
As ye seek, so shall ye find? Heh.
|
|
|
|
|
So instead of passwords, let's all use 4-digit PINs to access our bank accounts. Yep, the stupidity never ceases.
|
|
|
|
|
The vulnerability could let hackers gain access to your PC on public Wi-Fi networks. WiFi? More like WiFuuuuuuuuu
It does read like they'd have to be on the same router (which would be the case in a coffee shop etc. anyway)
According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?
Exploiting this vulnerability requires an attacker to be within proximity of the target system to send and receive radio transmissions.
|
|
|
|
|
Recently, both .NET Upgrade Assistant and Azure Migrate application and code assessment for .NET have had updates improving privacy and security as well as adding some useful new features. Sadly, they don't modernize your privacy and security code
|
|
|
|
|
Kahn had a communications perspective, Cerf came with a computing perspective, and together they worked on connecting diverse computing networks — up to 256 of them. But what have they done for us lately?
|
|
|
|
|
A researcher has found a bug that allows anyone to impersonate Microsoft corporate email accounts, making phishing attempts look credible and more likely to trick their targets. Good thing they never email anyone
"The bug, according to Kokorin, only works when sending the email to Outlook accounts." <-- Oh, phew. Good thing no one uses those.
/sigh... Microsoft...
|
|
|
|
|
Did something change? I was of the impression you could forge email headers all you wanted so long as you controlled the SMTP sending the mail?
I've sent prank mail from Gates and such. From .NET it was as simple as changing the FROM: to whatever you want.
|
|
|
|
|
I suspect this bug allows you to spoof the entire header, including the routing and source mail server information. Changing the "FROM" information doesn't change the source email server information.
|
|
|
|
|
Huh. I thought most of them use GMail…
Time is the differentiation of eternity devised by man to measure the passage of human events.
- Manly P. Hall
Mark
Just another cog in the wheel
|
|
|
|
|
this is an oxymoron type of email, right? And the US Senate is upset with MS getting in bed with the CCP?
Charlie Gilley
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” BF, 1759
Has never been more appropriate.
|
|
|
|
|
The company has now confirmed an issue with the Photos app wherein the application would fail to start due to a conflict with a non-admin-based group policy or CSP (configuration service provider) policy. You don't own any software, Photos Edition
|
|
|
|
|
A colleague told a story of how he once broke the entire Office division’s ability to check in code because he accidentally checked in a syntax error to the script that is used to verify that your proposed change has satisfied all the pre-submit requirements such as passing static analysis and unit testing. Hoist on your own Autocorrect
|
|
|
|
|
Too bad they fixed it. We wouldn't have been subjected to "New Outlook" if they hadn't.
I’ve given up trying to be calm. However, I am open to feeling slightly less agitated.
I’m begging you for the benefit of everyone, don’t be STUPID.
|
|
|
|
|
That's what they get for writing their code in MS-Word.
|
|
|
|
|
1994’s Simon was the first rough draft of a device that would change the world. But it was also a dead end. It's just not like IBM to mess up and lose an early lead
|
|
|
|