|
Kent Sharkey wrote: Be careful: it might be a setup
*GROAN*
What do you get when you cross a joke with a rhetorical question?
|
|
|
|
|
Thank you, thank you. I'll be here most of the week. Don't forget to tip your waitress.
TTFN - Kent
|
|
|
|
|
Kent Sharkey wrote: tip your waitress Is that like cow tipping?
If your actions inspire others to dream more, learn more, do more and become more, you are a leader.-John Q. Adams You must accept one of two basic premises: Either we are alone in the universe, or we are not alone in the universe. And either way, the implications are staggering.-Wernher von Braun Only two things are infinite, the universe and human stupidity, and I'm not sure about the former.-Albert Einstein
|
|
|
|
|
The Heartbleed bug crushed our faith in the secure web, but a world without the encryption software that Heartbleed exploited would be even worse. In fact, it’s time for the web to take a good hard look at a new idea: encryption everywhere. Hey NSA... na-na na-na boo-boo!
|
|
|
|
|
I recommend ROT-13.
You'll never get very far if all you do is follow instructions.
|
|
|
|
|
Particularly one that was just "Hi!" and a link?
Because I got one purporting to have come from your email, and it looks well dodgy - has your email been hacked?
Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952)
Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)
|
|
|
|
|
No, I did not send an email. And I wouldn't (knowingly) send a dodgy one.
OriginalGriff wrote: has your email been hacked?
Mayhap. I saw a bunch of bogus undeliverables in my email today.
You'll never get very far if all you do is follow instructions.
modified 18-Apr-14 10:56am.
|
|
|
|
|
PIEBALDconsult wrote: I recommend ROT-13.
Yeah, double encrypted (for extra security)...
I'm retired. There's a nap for that...
- Harvey
|
|
|
|
|
I think that the quality of Code Project is going down. Please grab a stone. Weigh in.
|
|
|
|
|
I second that, seems like an advertising board a lot of times when looking at posted articles. Luckily there still is quality content as well.
|
|
|
|
|
What do you mean? There are two ads, one at the top of the page and one on the bottom
Don't comment your code - it was hard to write, it should be hard to read!
|
|
|
|
|
Those I did not refer to, it is the amount of articles that are shallow and coming from, well, let's leave that aside, and are not really worth the read, regards
|
|
|
|
|
So: </div> is an invalid self-closing tag and is viewed as a new tag Plot twist: not actually about the 'joys' of HTML5 validation
|
|
|
|
|
Astronomers have discovered what they say is the most Earth-like planet yet detected — a distant, rocky world that’s similar in size to our own and exists in the Goldilocks zone where it’s not too hot and not too cold for life. "Starbucks: Opening Soon"
|
|
|
|
|
So, which code-base should I be reading about to improve myself? The Beginning Is the End Is the Beginning
|
|
|
|
|
A computer Trojan injects messages into Facebook to trick users into installing Android malware, researchers from ESET said Yet another reason to ignore all those annoying Facebook app invites.
|
|
|
|
|
The "kill switch," a system for remotely disabling smartphones and wiping their data, will become standard in 2015, according to a pledge backed by most of the mobile world's major players. While you're at it, please also include a "bacon switch"...
|
|
|
|
|
"mortality? longevity? incept dates?"
How about remote adding activated tracking so we can catch those who steal the phones in the first place?
|
|
|
|
|
Generations of responsible parents have protected their children from an excess of TV-watching, realizing that spending hours and hours of the day watching telly isn't the best way for them to spend their formative years. But TV isn't what it once was, and let's face it - the coolest kids of all ages have their own tablet these days. So the "uncool" kids just have desktops?
|
|
|
|
|
Computer science student is first arrest in relation to vulnerability. One down, who knows how many to go
|
|
|
|
|
Looks like someone who was just fooling around to see if the bug was real, I bet a lot of people did the same without realizing they were truly doing something illegal simply in the interests of seeing if it worked. I hope he learns a lesson without it ruining his life.
|
|
|
|
|
"Illegal" ? It's not that you gained access to the remote system, execing remote commands, and (optionally) profit from this. I brought down the city hall server testing the same vulnerability.
Imagine this conversation:
Client: 00 18 00 13 31 00
Server: here's my apache and PHP loader, take a handle to apache and maybe grab some url with user/pass in clear
Client: Ha?
What's next? Send a PNG with vulnerability and read memory of shell32.dll? Oh, it has been done already.
I think the term hacker is used every time one have XP installed with empty password and green grass as wallpaper.
It's not that the guy was pumping day and night fragments to the server in order to make the server bonk. Even so, it's the server's problem. At least, this is how I see things.
|
|
|
|
|
But the professional criminals of NSA & Co won't be arrested...
|
|
|
|
|
I hope they catch some serious flak for this one - ignoring a critical vulnerability like this for 2 years so they could exploit it put many individuals and business' data at risk.
I doubt it though, NSA/GHCQ seem to have carte blanche to do whatever they want in the interest of "National Security".
"If you don't fail at least 90 percent of the time, you're not aiming high enough."
Alan Kay.
|
|
|
|
|
Even though Google does not have a Heartbleed problem, a large number of Android users may still be at risk. And now 'reverse Heartbleed' triple-salchows itself into our hearts
|
|
|
|