|
The Biden administration on Thursday will announce plans to bar the sale of antivirus software made by Russia's Kaspersky Labs in the United States, a person familiar with the matter said, citing the firm's large U.S. customers including critical infrastructure providers and state and local governments. Anti-anti-virus
|
|
|
|
|
|
The concern is valid given how paranoid Russia's government has become. The US DoD banned Kaspersky a few years ago from their systems and now it appears the ban will go government wide.
|
|
|
|
|
Really surprised this took so long.
|
|
|
|
|
Me too. Although it may have been a case of building the case against Kaspersky so when they take it to court the US Government has the documentation showing them to be under duress from Russian intelligence services.
|
|
|
|
|
Two veteran astronauts will extend their stay on the International Space Station as teams on the ground work to better understand issues with the Boeing-built spacecraft that carried them to orbit. What has trouble going up, has trouble coming down
|
|
|
|
|
The Old Men of Space? Where is Hemingway when we need him?
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
He was a Christian, wasn't he? So I guess he is up there.
Religious freedom is the freedom to say that two plus two make five.
|
|
|
|
|
trønderen wrote: He was a Christian, wasn't he? So I guess he is up there.
You make a few unwarranted assumptions:
- That there is a single Deity that controls our destinies
- That the Deity is that of the Christians
- That "Heaven" and "Hell" actually exist
- That "Heaven" is physically above us, and "Hell" is below us
- That Hemingway ended up in heaven
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
Those are essential assumptions. Your summary is both correct and fairly complete.
I am not going to defend a single one of those assumptions. Most certainly not.
As my signature suggests.
Religious freedom is the freedom to say that two plus two make five.
|
|
|
|
|
I don't think science fiction authors could have written a more perfect "end of world" scenario that leaves astronauts stranded. On the other hand, it does sound like a possible start to Rebecca Kelly's "The Eta Chronicles" (The Station and The Surface).
|
|
|
|
|
Artificial intelligence-generated comedy still reportedly requires humans, as it remains a struggle to write comedic content independently, as revealed by a new Google Deepmind study. As I demonstrate daily
|
|
|
|
|
|
WeAreDevelopers have published the results of their survey on tech recruiting. And 100% would just like the cheque
|
|
|
|
|
If you are not using random, computer-generated passwords, or one of the best password generators, chances are your logins can be cracked within an hour, research has warned. So don't bother using a hard one - they'll never expect you to use an easy one!
|
|
|
|
|
Other bad news.
They were able to compile a list of "top passwords" in the first place, which means someone is sharing or storing them clear text or at least reversible.
Whoops.
Check out my IoT graphics library here:
https://honeythecodewitch.com/gfx
And my IoT UI/User Experience library here:
https://honeythecodewitch.com/uix
|
|
|
|
|
Probably came from data breach collections.
|
|
|
|
|
Well even then, if they were one way encrypted the only ones they should be able to find are the easy to brute ones, like snoopy1.
Check out my IoT graphics library here:
https://honeythecodewitch.com/gfx
And my IoT UI/User Experience library here:
https://honeythecodewitch.com/uix
|
|
|
|
|
As ye seek, so shall ye find? Heh.
|
|
|
|
|
So instead of passwords, let's all use 4-digit PINs to access our bank accounts. Yep, the stupidity never ceases.
|
|
|
|
|
The vulnerability could let hackers gain access to your PC on public Wi-Fi networks. WiFi? More like WiFuuuuuuuuu
It does read like they'd have to be on the same router (which would be the case in a coffee shop etc. anyway)
According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?
Exploiting this vulnerability requires an attacker to be within proximity of the target system to send and receive radio transmissions.
|
|
|
|
|
Recently, both .NET Upgrade Assistant and Azure Migrate application and code assessment for .NET have had updates improving privacy and security as well as adding some useful new features. Sadly, they don't modernize your privacy and security code
|
|
|
|
|
Kahn had a communications perspective, Cerf came with a computing perspective, and together they worked on connecting diverse computing networks — up to 256 of them. But what have they done for us lately?
|
|
|
|
|
A researcher has found a bug that allows anyone to impersonate Microsoft corporate email accounts, making phishing attempts look credible and more likely to trick their targets. Good thing they never email anyone
"The bug, according to Kokorin, only works when sending the email to Outlook accounts." <-- Oh, phew. Good thing no one uses those.
/sigh... Microsoft...
|
|
|
|
|
Did something change? I was of the impression you could forge email headers all you wanted so long as you controlled the SMTP sending the mail?
I've sent prank mail from Gates and such. From .NET it was as simple as changing the FROM: to whatever you want.
|
|
|
|