Keep in mind that all his script actually accessed was the login page itself, that the user agent string can be set to anything on any browser, and the request itself was no different from trying to access "http://the.site.com/p?000001" then "/p?000002"... etc. It didn't actually get to the *protected* data itself, and there isn't really any privacy interest or expectation in an email address itself, either.
Case sensitivity is the one big turn-off to using C-syntax to me. If I am going to deal with it, then I want my damn pointers back, so I'd just as soon work in C++ and have some actual power to go with the inconvenience. Otherwise, for just business-logic and general DB stuff, VB.NET is quite nice to work in.
Uh, a Tesla doesn't have valves to time... just saying.
I am in the gearhead category. I'm just waiting for my little 328i to go out of warranty so I can start playing with some go-faster mods.
This looks like a great sign that Microsoft may finally be recovering from the terrible case of recto-cranial inversion that Ballmer had inflicted on the company for so long. At least we can have some hope of it.
Wouldn't it make more sense to locate these labs in an incredibly isolated area like an island in the middle of the ocean or the Moon? Someplace that CAN be quarantined 100% in the event of a mishap?
This is an interesting variation of the camera lens bayonet mount that includes a "breakaway mode" if it is dropped that allows the lens to snap out without damaging the device or the mount. With a normal DSLR lens mount, that doesn't happen and the lens will remain firmly attached until one of the mounts breaks, whereas this one will release instead of breaking.
Garbage in, garbage out.
No, a Bimmer!
Various social engineers have been trying for decades to change human nature. It hasn't worked in the past and it won't work in the future any better than attempting to change cats into vegans would. Even if they manage to suppress the expression of the thoughts in one place, it just pops up elsewhere, or worse, festers into a sudden explosion of rage.
Consider the source - FTS: "Scott Corley, the Executive Director of immigration-reform group Compete America"
This isn't coming from a CEO, it's coming from a political activist. And of course, he is dead wrong about "The further you get away from your education the less knowledge you have of the new technologies...". Someone just out of school hasn't actually worked with the new technologies as they have trickled into existence as someone who has been in the field for years has.
This looks like they were just incompetent and stupid rather than evil. Still, their credibility is now zero.
There is really no way for any code running on top of another layer to verify that lower layer's integrity - it has to rely on what is reported and a malicious BIOS or UEFI layer can simply just lie to it. Hell, it's possible for a low-level hypervisor to run another, clean, BIOS/UEFI and simply virtualize every piece of hardware in the box. Likewise, it can block visibility of any traffic going in and out that it desires. This type of security has to happen at the network level instead - something outside of the device has to detect the suspicious traffic that such an attack must generate in order to be useful. That in turn requires that the networking gear has to be trustworthy and not itself owned by the attacker or have any backdoors installed at the factory (or chip maker, or etc etc).
China is the only one in that group that has any actual chance. The other two would not last a month in a ground war against the US military when it is in full-blown combat mode. One nuclear attack, even an EMP strike, would not defeat the USA, though it would be badly wounded for a period of time, and the attacker would most certainly be cluster-nuked into oblivion in retaliation.
Fulminate of Mercury hasn't been used as a priming compound in ages. Modern primers use lead styphnate, which is stable unless heated above 330 C, or hit with a sharp impact.