|
PIEBALDconsult wrote: Nor would I give them my CP ID
Well, my ID is public, it's easy enough to look up.
PIEBALDconsult wrote: but I wouldn't want them to see old and/or buggy code.
Personally, that's why what I post there has to meet a certain level of quality, otherwise it'll go into a private repo.
Marc
|
|
|
|
|
Do not ask what GitHub can do for you
Ask what you can do for GitHub
Life is too shor
|
|
|
|
|
What? That didn't even make sense...
My blog[ ^]
public class SanderRossel : Lazy<Person>
{
public void DoWork()
{
throw new NotSupportedException();
}
}
|
|
|
|
|
|
Yeah, I know. It just didn't make any sense
My blog[ ^]
public class SanderRossel : Lazy<Person>
{
public void DoWork()
{
throw new NotSupportedException();
}
}
|
|
|
|
|
Sander Rossel wrote: It seems like everybody is on GitHub nowadays.
I don't, and seeing no need in near future
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Most works for governments and banks is prohibited from Git! Directives from compliance. So *everyone* uses GIT is not even close.
dev
|
|
|
|
|
Sander Rossel wrote: I am kind of interested in what all the fuzz is about
If one develops code, anywhere, then one should consider how relevant source control and back up are. The two are not the same.
If one decides that either is prudent then one must then decide on a solution for that.
Github fulfills the need for one, and might fulfill the need for the second since one might presume that github backs up its own content. (One should however verify the second.)
In general from a professional point of view I wouldn't suggest relying only on a single business for a technical solution because businesses can and do run into trouble. But often it is sufficient to have ones content locally and then on an external source. However for a business (more that a couple of people) that probably isn't sufficient since there is data which is unlikely to be preserved on individual developer machines. That might be different when talking about a single individual however.
|
|
|
|
|
Why questions and discussions on these topics will be prevented in this forum?
Why not allow an open discussion about it also in the very details in this forum?
Why should we leave it to the underground?
My point is, the more I know about it the better I can protect myself.
Bruno
[Edit]
After 1.5h: I think all the so-called professionals do not know much about it and would like to wipe it comes under the carpet.
[/Edit]
modified 19-Jan-21 21:04pm.
|
|
|
|
|
You could always start a discussion.
|
|
|
|
|
If you are hinting about something like this:
A person asks how to create a key logger. This person is then criticised for asking how to create something that could be used to take information from a third party without that third party's awareness.
My reasoning as to why this criticism is valid is:
Most of us with a number of years behind us -
(1) Could quite easily create key logging software.
(2) Have a number of years behind us precisely because we have not created key logging software - we would soon be out of a job and probably worse if we created key logging software.
(3) Don't relish the thought of someone relatively new, to the world of software development, using our experience to create something that is ethically wrong.
So to those people wanting help in creating key logging, or any other 'dual use', software my message is:
If you want to create key logging software go and do the research yourself, don't ask people who have no desire to help you in your potentially unethical enterprise and expect them not to be critical of your request.
[edit] I spotted a grammatical error in my post, horror of horrors!
“That which can be asserted without evidence, can be dismissed without evidence.”
― Christopher Hitchens
modified 22-Feb-15 8:39am.
|
|
|
|
|
Good, good... It seems my keylogger is working.
You just typed:GuyThiebaut wrote: If you are hinting about something like this:
A person asks how to create a key logger. This person is then criticised for asking how to create something that could be used to take information from a third party without that third party's awareness.
My reasoning as to why this criticism is valid is:
Most of us with a number of years behind us -
(1) Could quite easily create key logging software.
(2) Have a number of years behind us precisely because we have not created key logging software - we would soon be out of a job and probably worse if we created key logging software.
(3) Don't relish the thought of someone relatively, new to the world of software development, using our experience to create something that is ethically wrong.
So to those people wanting help in creating key logging, or any other 'dual use', software my message is:
If you want to create key logging software go and do the research yourself, don't ask people who have no desire to help you in your potentially unethical enterprise and expect them not to be critical of your request. To make it go away deposit $1000 on my Swiss bank account
My blog[ ^]
public class SanderRossel : Lazy<Person>
{
public void DoWork()
{
throw new NotSupportedException();
}
}
|
|
|
|
|
I'll need your details first...
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
Sander Rossel wrote: To make it go away deposit $1000 on my Swiss bank account No probs I will just claim the 1 squillion dollars I won last week, in the Nigerian lottery, and use that to pay your small amount.
I just need to find the email... now where is it... there it is... now to click on the link... here goes...
“That which can be asserted without evidence, can be dismissed without evidence.”
― Christopher Hitchens
|
|
|
|
|
GuyThiebaut wrote: 1 squillion dollars ... in the Nigerian lottery The exchange rate isn't exactly favourable, so 1 squillion Nigerian naira actually translates to about $1000
Also, the mandatory Dilbert[^]
My blog[ ^]
public class SanderRossel : Lazy<Person>
{
public void DoWork()
{
throw new NotSupportedException();
}
}
|
|
|
|
|
I understand your mind, but again, it is better to know what mischief is driven to protect themselves from. And the more of the mischief is published the less dangerous it becomes....I think.
Thank you for your comment
Bruno
modified 19-Jan-21 21:04pm.
|
|
|
|
|
You may well be beyond reproach with the reasons you want the code or the information.
However as the site is open to all, not all people may be as ethical as you and anything that slows these sorts of people down is a good thing.
“That which can be asserted without evidence, can be dismissed without evidence.”
― Christopher Hitchens
|
|
|
|
|
|
Bruno Sprecher wrote: it is better to know what mischief is driven to protect themselves from
Yes - however the only way one learns that is by actively pursuing it. Thus although you might not pursue it you wouldn't learn anything unless you were reading posts by those that were doing it.
|
|
|
|
|
I agree, I'd like to see some articles on virusses and worms. How the hell do they make that stuff and why can't I simply remove them? I had a virus once that made me re-install my entire computer!
I'm not at all interested in ruining other peoples day (or even days, and if stuff like that happens on a work computer, well... best have some backups!), but just out of curiosity I'd like to know.
That said, when CP teaches people how to create stuff like that it may hurt CP's good name. Because there are people out there who will use such knowledge for baaaad stuff. And if the next person who hacks into the White House claims he "got some script off CP" CP may even be considered a dangerous website by governments and may be banned (worst case scenario, of course). In any case, lawsuits are likely to follow.
Now DEFENSE against the dark arts, that would be completely legal
And here is one defense tip: Don't use Norton, piece of #@$@&^*%) is worse than the malware it protects you from
My blog[ ^]
public class SanderRossel : Lazy<Person>
{
public void DoWork()
{
throw new NotSupportedException();
}
}
|
|
|
|
|
Quote: That said, when CP teaches people how to create...
No, CP does not teach how to do it CP would teach how to recognize. The more this stuff is open the more one can recognize and defend.
Thank you for your comment
Bruno
modified 19-Jan-21 21:04pm.
|
|
|
|
|
Bruno Sprecher wrote: CP would teach how to recognize Unfortunately, you can't recognise malicious code unless you know how to write it.
The 'signature' that malicious code leaves is by its very nature the code, or the calls the code makes, itself, if only code had a smell we could train dogs to sniff out malicious code.
“That which can be asserted without evidence, can be dismissed without evidence.”
― Christopher Hitchens
|
|
|
|
|
If your functions or variables have the word 'scam' or 'MUWHAHAHA' anywhere in the name it's a pretty good indication that the code is actually malicious.
Also, if after debugging your code you've lost some thousands of dollars on your bank account you may be dealing with malicious code.
My blog[ ^]
public class SanderRossel : Lazy<Person>
{
public void DoWork()
{
throw new NotSupportedException();
}
}
|
|
|
|
|
Please adjust the Quote and stay fair!
modified 19-Jan-21 21:04pm.
|
|
|
|
|
Bruno Sprecher wrote: Please adjust the Quote and stay fair! Okay sorry about that, here goes:Bruno Sprecher did not write: Plz give me codez to take over the world, mwahahahaha!
“That which can be asserted without evidence, can be dismissed without evidence.”
― Christopher Hitchens
modified 22-Feb-15 9:14am.
|
|
|
|