|
4) McAfee antivirus will still be utter cr@p.
DURA LEX, SED LEX
GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- ++>+++ y+++* Weapons extension: ma- k++ F+2 X
If you think 'goto' is evil, try writing an Assembly program without JMP. -- TNCaver
When I was six, there were no ones and zeroes - only zeroes. And not all of them worked. -- Ravi Bhavnani
|
|
|
|
|
True, but in his defense I don't think he's been associated with McAfee AV for a very long time.
In this present crisis, government is not the solution to our problem; government is the problem. ~ Ronald Reagan
|
|
|
|
|
Yes I think the same. Still...
DURA LEX, SED LEX
GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- ++>+++ y+++* Weapons extension: ma- k++ F+2 X
If you think 'goto' is evil, try writing an Assembly program without JMP. -- TNCaver
When I was six, there were no ones and zeroes - only zeroes. And not all of them worked. -- Ravi Bhavnani
|
|
|
|
|
I'm surprised he was sober enough to pen an article
If it's not broken, fix it until it is.
Everything makes sense in someone's mind.
Ya can't fix stupid.
|
|
|
|
|
Hack attribution - I've been saying it's impossible for years. If you can hack a system, you can misdirect attempts to identify the perpetrators of said hack.
".45 ACP - because shooting twice is just silly" - JSOP, 2010
- You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010
- When you pry the gun from my cold dead hands, be careful - the barrel will be very hot. - JSOP, 2013
|
|
|
|
|
Unfortunately our media believes the Hollywood version where the NSA/CIA/FBI/DOD are anti-hacking Gods so when Trump says it's impossible to really know who hacked someone - they call him an idiot.
*Trump can be idiotic at times but in this case he was spot on.
In this present crisis, government is not the solution to our problem; government is the problem. ~ Ronald Reagan
|
|
|
|
|
A new report, Accelerating Velocity and Customer Value with Agile and DevOps, from CA Technologies revealed businesses experienced greater customer satisfaction and brand loyalty when integrating agile with DevOops. "On our own we're fine but united we're dynamite"
|
|
|
|
|
I believe the applicable phrase is "confirmation bias".
|
|
|
|
|
Wait, a website that makes money by writing about Agile and DevOps says that more people should use Agile and DevOps...?
Color me stunned!!
The United States invariably does the right thing, after having exhausted every other alternative. -Winston Churchill
America is the only country that went from barbarism to decadence without civilization in between. -Oscar Wilde
Wow, even the French showed a little more spine than that before they got their sh*t pushed in.[^] -Colin Mullikin
|
|
|
|
|
Twice nothing is still nothing.
Marc
|
|
|
|
|
Two Microsoft employees claim the company made them look at photos and videos "designed to entertain some of the most twisted and sick minded people in the world." Now they're suing. For ... let's just say non-kid sister safe reasons
Then again, what about the VB team?
|
|
|
|
|
Translation... we want free money.
Jeremy Falcon
|
|
|
|
|
The VB team did a great job not leaving this mess alone
BTW: you should overstress this language for complex software
Press F1 for help or google it.
Greetings from Germany
|
|
|
|
|
Well, there's no point trying to get free money from the people who made the videos, because they're all in prison, so who else should they try to get it from?
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Of companies that use two-factor authentication, 74 percent admit that they receive complaints about it from their users -- and nearly 10 percent of them just ‘hate it.’ Would you rather have complaints, or hacks?
|
|
|
|
|
The article is rather an ad for "adaptive authentication".
But to get back to your question: how much business do you lose in case of a hack in comparison to the business lost by perceived inconvenience of authentication?
|
|
|
|
|
The others aren't even close. One time market-leader Microsoft Windows' Internet Explorer is a distant third. Queue the "Hacking Chrome" stories
|
|
|
|
|
It's what you get with Android, so what do they expect?
|
|
|
|
|
You don't, actually. You get a browser called "Browser".
If you want chrome (not that I can understand why anyone would), you have to download it from the play store.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
From my Android phone using "Browser", user agent is reported as:
Mozilla/5.0 (Linux; Android 5.1;...) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Mobile Safari/537.36
From my desktop, the chrome user agent is reported as:
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36
|
|
|
|
|
Ah, good point, if the user agent is what is used to compile the numbers.
I don't use chrome at all (and will not install it on my machines), but I use a version of it as my primary user agent, because it's good security practice -- don't ask how, why, or which version -- so I'm actually contributing several to the chrome figure.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
A new report out by enterprise software company 1E, however, finds that half of Windows 10 business migrations could be leaving machines at risk So says a company that would be glad to help you fix it
|
|
|
|
|
With the power to drive technology, comes great responsibility. What should developers do when faced with ethical dilemmas? With great power comes great fun
|
|
|
|
|
First, do no harm.
So, does that mean we can get stop using Ruby and Javascript?
Marc
|
|
|
|
|
and perl
TTFN - Kent
|
|
|
|