Let Larry Wall throw some regexs at it. It will become the greatest Perl script ever. It might just be the origin of sky net.
Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
They aren't investing in the company because it's open source, they are investing in a company that just happens to release their product as open source.
Gnash works with youtube. Gnash development has picked up since Adobe dropped the 64bit support. And once you switch there is no reason to go back unless you enjoy your cpu melting and state of the art 0-days
dpkg --purge canonical-census
Remove the virus with fire.
Ya my first reaction was to look at the date, nope not Apr 1.
Email addresses aren't considered personal information.
thats the first thought I had. Add even a little logic to the lights and we wouldn't have to idle so much.
And in the case of SQL injections it's usually not the fault of the underlying database, it's stupid coders who don't validate their inputs.
"Microsoft has not and will not put "backdoors" into Windows"
Ahh the good old says of popping open cd trays remotely and watching people's ICQ conversations as they reacted.
And you didn't have to reboot.
Local means that you have to have shell access to the machine in order to run the exploit. SSH allows you to have shell access "remotely" but that is not a remote exploit. This still requires shell access and that is not something that should be given to users unless absolutely necessary, if you are enabling sftp access and not locking down the shell then you've already failed.
In the South they may refer to it as cursing, in the North we just call them words.
bots brute forcing logins != hackers