|
Kent Sharkey wrote: Look for...the union label. When you are...declaring that var labor war. FTFY
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Reminds me of an early SNL skit.
Marijuana Growers Union SNL - YouTube[^]
* not the greatest quality, but funny nevertheless.
"the debugger doesn't tell me anything because this code compiles just fine" - random QA comment
"Facebook is where you tell lies to your friends. Twitter is where you tell the truth to strangers." - chriselst
"I don't drink any more... then again, I don't drink any less." - Mike Mullikins uncle
|
|
|
|
|
Long explored but infrequently embraced, base 3 computing may yet find a home in cybersecurity. Well, it's one higher, innit?
|
|
|
|
|
Waltzing away the computing power...
|
|
|
|
|
Base 3: alive, dead, quantum leap?
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Microsoft has disclosed an unpatched zero-day in Office that, if successfully exploited, could result in unauthorized disclosure of sensitive information to malicious actors. Maybe they should save some time and warn us when Office isn't vulnerable?
|
|
|
|
|
Quote: However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file 1-in-3 Click Suspicious Links & 1-in-5 Email Attacks Succeed[^]
The 'convincing' part seems to be the easiest part.
"the debugger doesn't tell me anything because this code compiles just fine" - random QA comment
"Facebook is where you tell lies to your friends. Twitter is where you tell the truth to strangers." - chriselst
"I don't drink any more... then again, I don't drink any less." - Mike Mullikins uncle
|
|
|
|
|
jeron1 wrote: However, an attacker would have no way to force the user to visit the website. Maybe Copilot can be used for that? If AI can't make letting hackers in easier, what is it good for?
|
|
|
|
|
Indeed.
"the debugger doesn't tell me anything because this code compiles just fine" - random QA comment
"Facebook is where you tell lies to your friends. Twitter is where you tell the truth to strangers." - chriselst
"I don't drink any more... then again, I don't drink any less." - Mike Mullikins uncle
|
|
|
|
|
Given they've been adding exactly the same boilerplate text to virtually every security KB for at least the last two decades, I doubt they've paid any attention to studies that don't start with the assumption that the user is on a dial-up connection.
"If the computer starts screaming at you, pick up the handset of your land-line, and use the rotary dial to call the operator in order to disconnect the Internet."
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
Almost 2.7 billion records of personal information for people in the United States were leaked on a hacking forum, exposing names, social security numbers, all known physical addresses, and possible aliases. Database of mother's maiden name and favourite pet still unhacked
|
|
|
|
|
Kent Sharkey wrote: Database of mother's maiden name and favourite pet still unhacked Plain text deemed too difficult...
|
|
|
|
|
The conspiracy theorist in me thinks it was actually Equifax who did it in a scheme to boost subscriptions to their service.
"They have a consciousness, they have a life, they have a soul! Damn you! Let the rabbits wear glasses! Save our brothers! Can I get an amen?"
|
|
|
|
|
Vendors are already using private domains in a non-standardized way, and that's no good Bad news for those wanted to get rich by cybersquatting codeproject.internal
But somehow codeproject.farm is still available?
Edit: fixed url
modified 11-Aug-24 23:17pm.
|
|
|
|
|
Did you get the link wrong on that one?
Religious freedom is the freedom to say that two plus two make five.
|
|
|
|
|
I did. Thank you, fixed.
TTFN - Kent
|
|
|
|
|
Anyone besides me remember when .local was the TLD for private networks. My internal network is a .local.
|
|
|
|
|
At the recent Black Hat USA conference, security researcher Michael Bargury unveiled alarming vulnerabilities within Microsoft Copilot, demonstrating how hackers can potentially exploit this AI-powered tool for malicious purposes. "Every tool is a weapon if you hold it right"
|
|
|
|
|
|
The language has been kind of loose about initializing such local objects, for historical reasons that made sense at the time. Back to the very basics
And of course the answer is, "It depends(tm)"
|
|
|
|
|
Back in 2016, Microsoft was all about 3D. It revealed its HoloLens technology, and it wanted its software to offer 3D features as well. It will be missed?
By some (likely ex-)Product Manager who had it created
|
|
|
|
|
Poll: Have you ever used Paint 3D?
About 2 minutes when it came out. Never again, as it seemed worthless.
|
|
|
|
|
Same here. Switched to Paint.Net immediately.
|
|
|
|
|
I never have. I tried the newer version of their 2D Paint program with its ribbon interface and I couldn't stand it so I use an older version of it from 2008. I think that means it is from Windows 7 but it still works fine and I like it a lot better than their current one.
"They have a consciousness, they have a life, they have a soul! Damn you! Let the rabbits wear glasses! Save our brothers! Can I get an amen?"
|
|
|
|
|
Worse-case scenario: "You basically have to throw your computer away." They didn't want Intel to feel lonely
"Nissim and Okupski note that exploiting the bug would require hackers to already have obtained relatively deep access to an AMD-based PC or server, but that the Sinkclose flaw would then allow them to plant their malicious code far deeper still." <-- once again, if people have access to your machines, bad things happen. News at 11.
|
|
|
|