Having some financial trouble and I’m unsure if the money will run out before the next paycheck.
Having some financial trouble and I’m unsure if the money will run out before the next paycheck.
It’s the Data Science craze all over again. Hope we’re done with this soon.
Same. I use it on desktop too
Tor itself was not breached. Rather, the suspects were using an outdated, long-retired app that did not employ some of the protections that are now available, and this, in turn, allowed investigators to carry out the attack.
I said it before and I’ll say it again: we need to work harder so that this asshole can buy his 2nd yacht. Have some compassion.
Hard drives (SSDs, etc) are not the only durable storage that can be written to
I am outraged, a plea deal to avoid life imprisonment? What the fuck did I just read?!
This guy trafficked, raped and tortured her, and other underage women. Police did jack shit. And she was supposed to be watching him just walk away? Grotesque.
Best of luck everyone!
I would love to win one of the keys for the Final Fantasy VII Remake.
Yes, I have been eyeing a soft switch into cybersecurity. Maybe not head-over-heels and maybe not entirely, but I do plan to have a significant part of my work to be in infosec.
For context, I am currently working as Tech Lead/Software Architect for a company that has a security-focused product (with an, as of today, 0 incident track record), but I work on design and scalability most days. When involved in security-related tasks, I mostly coordinate and sometimes implement security critical code under the guidance of our (small) security team.
I do have enough insight to have a positive impact on security related discussions on higher levels (think “lol, this proposed change opens up the endpoint to being exploited by x or y”) but not enough to discuss our cryptographic primitives.
In order to get my feet wet, I started doing THM (quite actively, yet I’ve hit a rut with the Windows-focused buffer overflow rooms), and I can say I enjoy it more than I expected.
However, I am unsure what concrete steps I should take after THM.
I’ve been thinking of working towards the OSCP exam, but honestly the certification landscape is quite confusing.
“It is difficult to get a man to understand something, when his salary depends on his not understanding it.”
― Upton Sinclair
Oh no, prices fell from 600k to 588k, disaster is looming.
People currently can’t afford food, bro.
Or how to fix your printer.
Doesn’t excuse violence
I am a happy backblaze user and generally I’ve only heard good things about them.
They do have multiple data centers and they are operating B2B products too.
Is there anything in particular that would make you think they could be unreliable?
Still doing lessons and challenges on THM, 2 months in.
Administrative access, in many cases, allows malicious apps to read and/or modify data, even memory and executables, of other apps. This is pretty much impossible with non-rooted phones out of the box. While the root detection feature is somewhat annoying, it is absolutely not a stupid measure.
As somebody with a degree in bioinformatics, I have never seen something more true in my whole life.
Some more lies from my time in academia: