|
Technology users who receive guidance when setting passwords -- including how likely it is that hackers could break into their accounts -- are significantly more likely to make their choices secure. Colour me unconvinced
|
|
|
|
|
Kent Sharkey wrote: are significantly more likely to make their choices secure. and that is supposing the site allows you to type a secure password.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
When functional programming started to become a “thing” in the software industry, I had a lot of difficulty understanding the fundamentals. Coming soon: when do-loops don't loop, and when functions are funky
|
|
|
|
|
The most successful people are not the most talented, just the luckiest, a new computer model of wealth creation confirms. Taking that into account can maximize return on many kinds of investment. Because I rolled boxcars when I wanted a seven
|
|
|
|
|
Popular ad-blocking browser extension AdBlock has added a new feature that will cache popular JavaScript libraries locally on the users' computers. Fewer ads, faster pages. How could I lose?
Other than having 23 cached versions of jQuery on my machine, that is
|
|
|
|
|
I use my hosts file to block ads. It works amazingly well, it's free, and it can't be turned off or hacked. I wish I could do the same thing on my iPad.
".45 ACP - because shooting twice is just silly" - JSOP, 2010 ----- You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010 ----- When you pry the gun from my cold dead hands, be careful - the barrel will be very hot. - JSOP, 2013
|
|
|
|
|
As technology trends changed, Mono's Windows.Forms platform has not been actively developed, but does remain a common dependency for various third party libraries and applications making its support important beyond those writings WinForms applications directly. Just in time for no one to care
|
|
|
|
|
A major dust-up on an Internet discussion forum is touching off troubling questions about the security of some browser-trusted HTTPS certificates when it revealed the CEO of a certificate reseller emailed a partner the sensitive private keys for 23,000 TLS certificates. What if he asked that person (nicely) to delete the email?
|
|
|
|
|
Could be a chain letter deal where the letter told the Trustico CEO he had to email 23,000 private keys to people he knew or he would encounter bad luck. I give him props, he tried to avoid the bad luck, but it was probably supposed to be 1 private key to 23,000 people. Instead he did 23,000 private keys to 1 person. Minor oversight, but if you don't do it right, the letter clearly states get the bad juju.
|
|
|
|
|
It looks like a few heads will roll for this f***-up.
What do you get when you cross a joke with a rhetorical question?
The metaphorical solid rear-end expulsions have impacted the metaphorical motorized bladed rotating air movement mechanism.
Do questions with multiple question marks annoy you???
|
|
|
|
|
Their names and partial driver’s license information was stolen. Don't worry, it's just your credit history
|
|
|
|
|
The vulnerability resides in the UDP protocol implementation of Memcached servers that amplify incoming packets with a factor of over 50,000 times. For example, an incoming Memcached request of 203 bytes results in a response weighing around 100 megabytes. For those who think there's no benefit to caching
Also: patch your Memcached servers
|
|
|
|
|
A new survey reveals that 52 percent of companies admit to cutting back on security measures to meet a business deadline or objective. With all the security issues going around, I never would have guessed
|
|
|
|
|
A follow up to "How Developers Can Take a More Proactive Approach to Security", explaining why it didn't happen
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
And part of the issue for DevOps is getting SecOps to understand their own environment.
For example, a need exists to connect to a corporate database server through firewalls. Ask the SecOps to open the firewall and you get asked, "Which one? We have over 400." and "What type of firewall is it?" DevOps shouldn't have to provide that information.. simply the source and end point and required port.
Then, when it takes a month to complete a simple task which delays the entire project and all of the people working on it for that same month, they wonder why DevOps wants to bypass SecOps, install a local DB to get it off the ground and move forward.
Is this the right approach? No. But frustration leads to bypassing snail-pace SecOps.
|
|
|
|
|
Stochastic computing may improve retinal implants, neural networks, and more Here's your best chance for a "well, actually..." point today
Me, I didn't get past stork aspic. Or whatever it was they were talking about.
|
|
|
|
|
AI research and video games are a match made in heaven. Researchers get a ready-made virtual environment with predefined goals they can control completely, and the AI agent gets to romp around without doing any damage. Sometimes, though, they do break things. Now the AI are coming for our arcade high scores
|
|
|
|
|
The Universe cooled faster than we thought, possibly due to weird form of dark matter. And the award for "Most Forced Acronym" goes to...
|
|
|
|
|
It's official: the new name for the technology formerly known as Java Enterprise Edition (and Project EE4J) is Jakarta EE. I was really hoping for "The Language Formerly Known as Java", with a cool symbol
Or Java McJavaface, of course
|
|
|
|
|
The .NET Core 2.1 release, across .NET Core, ASP.NET Core and EF Core is intended to improve the product across the following themes: Faster Build Performance, Close gaps in ASP.NET Core and EF Core, Improve compatibility with .NET Framework, GDPR and Security, Microservices and Azure, More capable Engineering System For those who prefer their edge a little bloody
|
|
|
|
|
“Augmented programming” refers to both established and emerging approaches for boosting developer productivity. "More human than human"
|
|
|
|
|
The percentage of daily Chrome users who've loaded at least one page containing Flash content per day has gone down from around 80% in 2014 to under 8% in early 2018. And that 8% is mostly people running the new version installer after getting an upgrade notice
|
|
|
|
|
Hangouts Chat, Google’s take on modern workplace communication, is now generally available and is becoming a core part of G Suite. Try it, before they cancel it
Slack competitors seem to be this year's "Excel killer"
|
|
|
|
|
We've been using this for three years now. It's mostly usable, but there are enough quirks that I'd hesitate to bring it out of beta.
If you think 'goto' is evil, try writing an Assembly program without JMP.
|
|
|
|
|
Bill Gates does not seem to be a fan of cryptocurrencies. I guess he didn't buy into bitcoin at the bottom?
|
|
|
|