|
"Unhackable internet"
But is that really the issue? There may be some high tech hackers who tap into the backbones or even the last mile, but phishing seems much easier and more productive.
|
|
|
|
|
Joe Woodbury wrote: but phishing seems much easier and more productive. Yes, I agree with you.
The weakest part of the security chain in technology is mostly the same... the person using it.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Absolutely.
It's only "researchers" and the US government who do any actual hacking; everything else is phishing bait.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Believe it or not, Microsoft is readying its Microsoft Defender Advanced Threat Protection for Linux servers. Yes, you read that right: Linux servers. I'm sure all those Linux users will love to install software from Microsoft
|
|
|
|
|
I'm holding out for facebook security services.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Mark_Wallace wrote: I'm holding out for facebook security services. I think they would try really hard to do a good product. After all, they do want to secure your data as much as possible, so they are the only ones having access to it and this is good for their business.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
So it will be secure from everyone but them and those whom they sell it to (i.e. anyone and everyone)?
Privacy doesn't get more private than that.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
We were speaking about security, not privacy
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
A study of the re-use of code from over twenty thousand Java projects on GitHub discovered that almost 30% of them might be involved in potential code borrowing and almost 10% of them could potentially violate original licenses. I was going to give it back!
|
|
|
|
|
So how does this affect my plan to put every permutation of every possible line of code on a hard drive, and release it into the public domain?
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Kent Sharkey wrote: almost 30% of them might be involved in potential code borrowing and almost 10% of them could potentially violate original licenses. Only?
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Google's TCMalloc can be used as a replacement for C and C++ default memory allocators to provide greater efficiency at scale and better support for parallelism, says Google. Does it automatically insert ads into your heap?
|
|
|
|
|
All your register are belong to us.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Since the Google coding standard forbids using exceptions, I wonder what it does when the heap runs out of memory...
|
|
|
|
|
Two programmer-musicians wrote every possible MIDI melody in existence to a hard drive, copyrighted the whole thing, and then released it all to the public in an attempt to stop musicians from getting sued. Finally, I can hum Greensleeves without paying royalties (to royalty)
|
|
|
|
|
Quote: this algorithm works at a rate of 300,000 melodies per second. Indeed, I'm particularly fond of melody 1,547,689,403, that one always makes me cry.
"the debugger doesn't tell me anything because this code compiles just fine" - random QA comment
"Facebook is where you tell lies to your friends. Twitter is where you tell the truth to strangers." - chriselst
"I don't drink any more... then again, I don't drink any less." - Mike Mullikins uncle
|
|
|
|
|
Update: they're being sued by everyone who ever wrote a song.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Now train an AI with the most popular songs ever released (maybe a list of 10,000 or so) to find all the melodies with a similar pattern - voila, you got a hit writing machine.
|
|
|
|
|
Or the perfect tool for the copyright troll-lawyers.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
That's pretty much what happens now, without AI.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Losing data to an intruder is not a great look for a law enforcement partner. Good to know that security is so important for them
|
|
|
|
|
|
ESET researchers uncover a previously unknown security flaw allowing an adversary to decrypt some wireless network packets transmitted by vulnerable devices Time to patch (or it's bork, bork, bork)
|
|
|
|
|
I wondered why there were so many vans with huge, directional antennae parked outside my house.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
McAfee’s chief technology officer warned that it’s time for companies to start worrying about quantum computing attacks that can break common forms of encryption available today, even if quantum computing isn’t going to be practical for a while. Coming soon: McAfee Quantum Edition
|
|
|
|