|
Sorry. I got too many ideas at once; I can't choose.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Company announces new privacy policy following revelations that police gained special access to the social networks to track protesters That's their job
|
|
|
|
|
Only we may be evil (or just creepy) - you are not allowed to use us to be evil/creepy.
|
|
|
|
|
They might be evil/creepy as well... but not for free
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Their ban is to change their service agreement. It's like Ford announcing they are banning drivers from speeding by putting "Don't Speed" in their manual.
|
|
|
|
|
I'm tempted to get a job at fb, just so I can be the one to press the button to delete the NSA's account.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
The last I heard, protesting was a legal activity -- except in police states.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Called the Sideways Dictionary, the focus is on analogies rather than traditional definitions — for example, BitCoin is “like digital gold,” while a zero-day vulnerability is “like medics discovering a new virus.” It's like a dictionary, but like not
And very blank in my browser, but maybe I made the mistake of viewing it in Chrome
|
|
|
|
|
Kent Sharkey wrote: And very blank in my browser, but maybe I made the mistake of viewing it in Chrome
Apparently Firefox is a mistake as well. All I see is a blank page with a title and login at the bottom It's definitely sideways in that it's either the only dictionary with no content, or the only dictionary that requires a login.
|
|
|
|
|
|
A Ben-Gurion University of the Negev (BGU) researcher has developed a new technique that could provide virtually 100 percent protection against cyberattacks launched through internet videos or images, which are a growing threat. You mean my extensive collection of cat videos could be a problem?
|
|
|
|
|
Kent Sharkey wrote: You mean my extensive collection of cat videos could be a problem? No, they're just an indicator of a problem...
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Litter-ly yes. They can claws all sorts of problems - and that only scratches the surface.
Ravings en masse^ |
---|
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein | "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010 |
|
|
|
|
|
Phys.org wrote: "Hackers like videos and pictures because they bypass the regular data transfer systems of highly secure systems, and there is significant space in which to implant malicious code." ..might be due to the fact that an image is never executed.
..and then he goes on about steganography, where these malicious codes are hidden in an image. Which is only dangerous if there is an application on your computer that can actually decode that information and execute it.
Kent Sharkey wrote: Preliminary experimental results show that a method based on a combination of Coucou Project techniques results in virtually 100 percent protection against cyberattacks,
Read more at: any other place outside Phys.org Because all cyberattacks are done using images and video's? Come on, this is someone looking for money trying to sell a solution to a non-problem.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
|
|
The first one is a bug in the browser.
Technet wrote: An attacker could exploit the vulnerability by constructing a specially crafted WMF image that could potentially allow remote code execution if a user visited a malicious Web site or opened a specially crafted attachment in e-mail. [...] In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail or Instant Messenger request that takes users to the attacker's Web site. Viewing a JPG using MS Paint does not execute code.
So, these two cases are 100% of all cyberattacks?
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
modified 14-Mar-17 11:31am.
|
|
|
|
|
Preview of images in outlook?
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
100% of all cyberattacks?
With those kind of claims, I'd be selling miracle-water
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
If you don't mind... I prefer miracle whiskey
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Eddy Vluggen wrote: So, these two cases are 100% of all cyberattacks?
No.
I'm not trying to defend the cyber-security snake-oil salesman; I'm just pointing out that images can (sometimes) be used to execute code, if the conditions are right.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
Richard Deeming wrote: I'm not trying to defend the cyber-security snake-oil salesman; I'm just pointing out that images can (sometimes) be used to execute code, if the conditions are right. Yes, if the conditions are right. And in that case any stream of bytes is suspect, not just "images".
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
I thought everyone renamed entensions on downloaded files to '.exe' and looked for Easter eggs!
Sudden Sun Death Syndrome (SSDS) is a very real concern which we should be raising awareness of. 156 billion suns die every year before they're just 1 billion years old.
While the military are doing their part, it simply isn't enough to make the amount of nukes needed to save those poor stars. - TWI2T3D (Reddit)
|
|
|
|
|
IBM’s X-Force Threat Intelligence group said today that one of the key findings from its forthcoming Threat Intelligence Index for 2017 is that spam volume grew dramatically throughout 2016, bringing with its host of new malicious attachments harboring banking Trojans and ransomware. And no, present company is not included
|
|
|
|
|
Being someone who follows the apparently radical and unheard-of security method of not opening spam, this will make a huge difference to my lifestyle.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|