|
Other bad news.
They were able to compile a list of "top passwords" in the first place, which means someone is sharing or storing them clear text or at least reversible.
Whoops.
Check out my IoT graphics library here:
https://honeythecodewitch.com/gfx
And my IoT UI/User Experience library here:
https://honeythecodewitch.com/uix
|
|
|
|
|
Probably came from data breach collections.
|
|
|
|
|
Well even then, if they were one way encrypted the only ones they should be able to find are the easy to brute ones, like snoopy1.
Check out my IoT graphics library here:
https://honeythecodewitch.com/gfx
And my IoT UI/User Experience library here:
https://honeythecodewitch.com/uix
|
|
|
|
|
As ye seek, so shall ye find? Heh.
|
|
|
|
|
So instead of passwords, let's all use 4-digit PINs to access our bank accounts. Yep, the stupidity never ceases.
|
|
|
|
|
The vulnerability could let hackers gain access to your PC on public Wi-Fi networks. WiFi? More like WiFuuuuuuuuu
It does read like they'd have to be on the same router (which would be the case in a coffee shop etc. anyway)
According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?
Exploiting this vulnerability requires an attacker to be within proximity of the target system to send and receive radio transmissions.
|
|
|
|
|
Recently, both .NET Upgrade Assistant and Azure Migrate application and code assessment for .NET have had updates improving privacy and security as well as adding some useful new features. Sadly, they don't modernize your privacy and security code
|
|
|
|
|
Kahn had a communications perspective, Cerf came with a computing perspective, and together they worked on connecting diverse computing networks — up to 256 of them. But what have they done for us lately?
|
|
|
|
|
A researcher has found a bug that allows anyone to impersonate Microsoft corporate email accounts, making phishing attempts look credible and more likely to trick their targets. Good thing they never email anyone
"The bug, according to Kokorin, only works when sending the email to Outlook accounts." <-- Oh, phew. Good thing no one uses those.
/sigh... Microsoft...
|
|
|
|
|
Did something change? I was of the impression you could forge email headers all you wanted so long as you controlled the SMTP sending the mail?
I've sent prank mail from Gates and such. From .NET it was as simple as changing the FROM: to whatever you want.
|
|
|
|
|
I suspect this bug allows you to spoof the entire header, including the routing and source mail server information. Changing the "FROM" information doesn't change the source email server information.
|
|
|
|
|
Huh. I thought most of them use GMail…
Time is the differentiation of eternity devised by man to measure the passage of human events.
- Manly P. Hall
Mark
Just another cog in the wheel
|
|
|
|
|
this is an oxymoron type of email, right? And the US Senate is upset with MS getting in bed with the CCP?
Charlie Gilley
“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” BF, 1759
Has never been more appropriate.
|
|
|
|
|
The company has now confirmed an issue with the Photos app wherein the application would fail to start due to a conflict with a non-admin-based group policy or CSP (configuration service provider) policy. You don't own any software, Photos Edition
|
|
|
|
|
A colleague told a story of how he once broke the entire Office division’s ability to check in code because he accidentally checked in a syntax error to the script that is used to verify that your proposed change has satisfied all the pre-submit requirements such as passing static analysis and unit testing. Hoist on your own Autocorrect
|
|
|
|
|
Too bad they fixed it. We wouldn't have been subjected to "New Outlook" if they hadn't.
I’ve given up trying to be calm. However, I am open to feeling slightly less agitated.
I’m begging you for the benefit of everyone, don’t be STUPID.
|
|
|
|
|
That's what they get for writing their code in MS-Word.
|
|
|
|
|
1994’s Simon was the first rough draft of a device that would change the world. But it was also a dead end. It's just not like IBM to mess up and lose an early lead
|
|
|
|
|
A little more than ten years later Microsoft completely bungles the handheld market.
|
|
|
|
|
They did find two scenarios in which human-driven cars were safer: at dawn/dusk and when turning. Going forward and going in reverse?
But (more) seriously folks - hearing they're less safe when turning does not give me confidence in them.
I also would really like to see some numbers for autonomous driving when the road markings are not clearly visible (aka winter driving, or even spring with the sand on the side of the road)
|
|
|
|
|
Dawn/dusk - Autonomous vehicles need sunglasses and clean sensors. These are the two biggest problems when the sun is low in the sky.
I suspect Tesla's FSD, which is the only non-geofenced system on the road today, would pass the driving test in most jurisdictions.
|
|
|
|
|
A free & open-source OpenTelemetry dashboard for deep insights into your apps on your local development machine. Big You is always watching
No idea why that quote came to mind today... ;S
|
|
|
|
|
The proposal, which is aimed at preventing child sexual abuse material, would essentially break encryption. "Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers."
|
|
|
|
|
As long as it's the government and not a cooperation doing it, everything is fine
|
|
|
|
|
I suspect they'll drop it once they figure out that they are legislating Pi (Indiana Pi Bill).
Then we just have to teach the new lawmakers every 5 years the same basics of encryption so they don't try to do the same thing.
It just doesn't matter. Unless we really want to give up writing/installing any app we want, these people would just use a different app or some weird unknown homebrew/darkweb stuff.
Just push firmware/OS trojans to suspected specific devices (with warrants or judicial say-so).
And/or
Do like the FBI did with their ultimate drug dealer cellphones and spin-up some services purpose-built to snare these folks and target market those apps to suspects.
|
|
|
|