|
David O'Neil wrote: Only make commits in the name of your CTO. ... And watch the memos start to fly!
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Quote: Microsoft DeepCoder [^] is an AI project that uses deep learning to solve simple programming tasks
As soon as it learns to balance a binary search tree it will be able to gain entry to the US to start competing for our jobs
(Don't panic - it will be most likely an developer augmentation tool rather than a developer replacement tool)
|
|
|
|
|
My Impression is, that they are currently testing something like this on W10 and the latest VS2017
modified 19-Jan-21 21:04pm.
|
|
|
|
|
Lets just say, between GitHub and here they have a really large set of training data
|
|
|
|
|
It's made by ms, post 2005.
What could possibly go wrong?
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
A new technique named DoubleAgent, discovered by security researchers from Cybellum, allows an attacker to hijack security products and make them take malicious actions. Call Smiley, we have a mole!
|
|
|
|
|
What do you get when you cross a joke with a rhetorical question?
The metaphorical solid rear-end expulsions have impacted the metaphorical motorized bladed rotating air movement mechanism.
Do questions with multiple question marks annoy you???
|
|
|
|
|
It'd take a bloody good hacker to make Norton and McAfee more malicious!
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Quote: Cybellum recommends that security vendors use Microsoft's Protected Processes mechanism, which the company introduced with Windows 8.1.
Protected Processes is a security system that Microsoft specifically designed for anti-malware services, and which works by wrapping around their processes and not permitting other apps to inject unsigned code.
Of all security products, only Windows Defender currently uses Protected Processes.
Attacking anti-virus apps via code injection. After the recent tirades we've seen from former Mozilla and Google devs about AV companies code injection compromising security features in their browsers via injection of random crappy unsigned code that doesn't work if you turn security features like ASLR on in the browser I suppose turn about is fair play.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
The Department of Homeland Security cited the threat of terrorists smuggling explosive devices in various consumer items Paperbacks: saving me from in-flight boredom since forever
Oh wait a minute - check my laptop?! Well, fortunately Skype works some of the time.
|
|
|
|
|
|
I've seen how the baggage handlers throw stuff. Is this sponsored by Dell and Lenovo?
Hogan
|
|
|
|
|
They're quite right to do so.
A bomb in the luggage compartment won't do any damage at all.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
|
Encrypted Media Extensions (EME), a mechanism by which HTML5 video providers can discover and enable DRM providers offered by a browser, has taken the next step on its contentious road to standardization. Sorry, this blurb not available in your region
|
|
|
|
|
Maybe that will finally push the development community to some serious search to replace HTML...
Skipper: We'll fix it.
Alex: Fix it? How you gonna fix this?
Skipper: Grit, spit and a whole lotta duct tape.
|
|
|
|
|
|
|
Login over HTTP; SQL injection; passwords stored in plain text; detailed YSOD error messages open to the entire world.
Whatever his "own security system" is, the only reason it's "never been breached in more than 15 years" is clearly because nobody was using the site.
And the subscribers are right to be concerned. Just because nobody had taken the site down prior to this complaint, that doesn't mean it's never been breached. Someone could have quietly "exfiltrated" the subscribers' details at any time without being noticed.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
Is there a term for when a business publicly flaunts their online "security" only to be royally reamed by the various denizens of the internet? Just curious since this seems to happen every couple of months.
|
|
|
|
|
|
Message Closed
modified 21-Nov-20 21:01pm.
|
|
|
|
|
Haha, I was looking for something similar to what happened with the Streisand Effect[^] but "oblivious self-baiting" is a pretty good summation
|
|
|
|
|
Let's stick a flag in it, and call it "oiled & gassed".
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Jon McKee wrote: Is there a term for when a business publicly flaunts their online "security" only to be royally reamed by the various denizens of the internet? Just curious since this seems to happen every couple of months.
Bankrupt. Liquidated. Out of business. Doomed. Etc.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|