Comment Re:Or... (Score -1, Offtopic) 47
Neither does soapboxing on slashdot.
Neither does soapboxing on slashdot.
Tl; DR:
They used python and java. Sort of hard to develop a meaningful thesis on general programming when you're that far up the abstraction stack. Who knows, maybe python and Java suck at memory management (GASP).
Your existing m.2 SSD is on a slot with 1GB (8gb) of bandwidth. I really dont think you're going to be maxing that out with any non-enterprise SSD, so you're probably OK-- and even if you somehow did, I seriously doubt you would notice.
So I fail to care about which term is used, it is a security breach and one of the worst kind
Except it will only work in the most esoteric scenarios with laboratory conditions, sure. 2 PCs, with side-vent cooling and no cold aisle, and a distance of 15 inches?
Somehow I dont think this will threaten air-gapped secure networks. Those are going to have steady cold air coming in the front, and exhausting out the back; if theyre dumping significant heat through the side of the cases you're doing it wrong.
Showing a static page involves rendering what amounts to a specialized form of code. Even browsers without javascript like Lynx have code execution CVEs-- and thats a browser that isnt even being fuzzed that hard.
Its not NIX enough, according to the posts I've read, it doesnt count.
I love seeing history repeat itself.
Years ago, it was OSX that was impenetrable. "Find us an active exploit or virus", they said, "and dont give us any of that market share nonsense". All the while the clues were there, with OSX getting exploited in seconds at Pwn2Own when actual cash and computer swag was on the line.
Here again, we have an OS with a minute market share boasting about its impenetrability and lack of exploits. I might propose that a great deal of the lack of exploits is the lack of any real incentive to go after such a tiny group of OSes which are invariably set up by fairly skilled IT persons.
Develop a BSD distro with a desktop environment and a modern web browser, and set it out for a million end users to use with a $50k cash prize for the first exploit, and you'll be paying out in a day, tops.
The amount of arrogance in some of these "My *Nix is best" threads is staggering. There is NOT code out there that is significantly more complex than Hello World that is bug free.
Your post displays an astonishing level of both confidence and ignorance. Find me a piece of software half as complex as a browser (which has the unenviable task of running arbitrary code from untrusted sources in a secure manner) that doesnt have any CVEs and I'd happily retract my statement.
You just defended evil.
It seems to me he defended the idea that residents of a society obey its laws, which is a foundational block to a working society. He didnt say anything about whether the laws were actually good ones.
I know slashdot loves tout the wonders of anarchy, but lets not go labeling someone a "statist" because they think laws should be enforced and that people dont get to pick and choose which rules to follow.
Sometimes I have to wonder whether people believe the crap they post.
How exactly are the drivers being exploited? Theres no pressure to be an Uber driver, its 100% voluntary. People make their own decision to sign onto the service.
Its not "nuance", its "correcting blatantly false nonsense".
Theres no "debtors prison" anymore.
He is in fact correct. They make it somewhat difficult to avoid being sucked into a Microsoft account, though there are ways to force it to desist. SkyDrive (or whatever its called now) also tries pretty hard to pull you in, though again you CAN force it to back off somewhat.
WPAcrack isnt breaking mixed case alphanumerical 12-character passwords over lunch.
Heck it would take a rainbow table-based attack about that long to recover a 12 character password (l0phcrack, running from dvd).
he pulled an app off a public website, got it running on my computer in minutes and before we were done with dinner he had my wifi password.
Found your problem. Theres about a million approaches he could have taken from here, including an automated script hacking your router from the LAN side and pulling the key, to pulling the key off of your local computer out of protected storage.
This isnt a weakness in WPA2.
Feed into a small molten salt reservoir buried in the yard
Last I heard molten salt was still being worked on because it is insanely corrosive and generally nasty to work with.
That doesnt exactly scream "put a resevoir in every yard".
If A = B and B = C, then A = C, except where void or prohibited by law. -- Roy Santoro