I grew up with the originals. I hate Episodes 1-3 and always will (they were kids' movies). I deeply dislike the "enhanced" versions of the originals (sure, fix some things, but don't add or change shit).
I actually like The Force Awakens, love Rogue One, and love Solo. All three were...
I also use winamp, both at work and at home. Low resource usage, always works, doesn't require Internet access or report my usage, and will manage my classic ipods without the need for itunes. I've had no reason to use something else, really.
This entirely depends on what sort of task you've mandated for your QA layer. What you describe are QA that try to break code, which is not what they all do. Some try to make sure code adheres to the original requirements. Some do quality reviews. Some will do performance benchmarking. Some do...
Real Names are the Holy Grail for advertising firms. Fake names aren't as easy to track, but with a real, legal name, and maybe a few other benign pieces of information (like your phone number, which is why places like Google love to ask you for it), you can tie together lots of information from...
Who are we, exactly? What is the definition of exist? Do we exist? Does this game exist? Let's sit back and get metaphysical, because that a good debate foundation makes.... :)
As a security and admin professional, this +more. I don't need much out of my browser, but I do want transparency and ability to control privacy/security.
This thread went on way longer than it needed to. If you can't turn off a device for several 10 minutes when other people's lives and consideration may be on your shoulders, you need to re-evaluation your jackass level.
And you don't want to be bossed around by a glorified cocktail waitress...
Is it better to be quiet and let this issue linger in the shadows, or to bring it to light so someone can be informed, do something about it, or make sure it doesn't happen again in the next version or someone else's product/standard.
As a security dood at my company, I'd prefer issues be out...
I think you are correct when we start talking sports that require a certain level of physical strength or power or physical characteristic where men and women simply are generally different.
But gaming? Especially something like a card game (a digital one at that!)? We're just talking brain...
This is the age-old problem with security. In this case, one person made a bad call, probably not someone who is very smart in the first place. She had access, gave out the info. How do you limit who has access to this sort of info and still have people able to do their jobs?
And what if...
This is somewhat tangential to the topic at hand, but you might want to look up "peeping tom" laws before you spout too much ignorance.
"...looking in from outside is illegal," is a false claim. Are you loitering? Are you on private property? Are you doing so surrepticiously? What is your...
What specific part(s) of the CISSP do you think is at a "CEO level?" The part about what encryption algorithms are outdated? The part about which backup tape scheme to use? Or RBAC management?
I'm not defending the CISSP cert as something that is hallowed or determines whether someone knows...
1. There isn't a certification or compliance requirement list that is bullet proof and can insure that no attacks will succeed.
2. It's pretty general to say they all "got their ass handed to them." Typically, a leader of a company has the final say, and I can tell you almost no one actually...
This seems highly unlikely.
It is possible that egress traffic monitoring may be looking for data of a certain format and alarm on that. For anything encrypted, this would be an extra hurdle, but heartbleed can be exploited even while unencrypted still.
From the article:
*le sigh*
PixelNinja already explained the touch typing position. 'asdf' and 'hjkl' are the "home keys" for typing. That explains why most keyboards have little notches on 'f' and 'j' so you can actually find your place on the keyboard without looking.
Another reason is [chat] bindings. I'm old. I come...
Paypal does have its issues, but for me as a regular user, they've been just fine for making online payments when I don't want to sprinkle my cc information on various e-commerce sites. I pay directly from my bank account and carry no balance on Paypal itself.
What other good options are...
See, there's still a problem. The guys who go after gamerscore play the min/max game. They get it. Put as little time in to get as many points. Props to Neurofreeze up there on that.
The problem is, they've done all this work to min/max a carrot on a stick that doesn't really matter all that...
Actually, there have been addons that do just that for a long time. I'm going to be annoying and admit I don't remember them offhand, nor am I going to look for them. Sorry!
It's a decent idea, though.
Just like so many "security studies" done in universities, this is an interesting exercise, but woefully impractical, even almost useless, in the real world. It's annoying when these get press and real issues slide.
1. I'm not just trolling, but thanks for assuming. Trolling is somewhat in the eye of the beholder, yes?
2. I'm sorry, next time I want to post, I'll make sure I read the last 6 months of news articles to make sure I don't step into a topic where a horse is being beaten past death. My bad, I...
I waded through this thread actually hoping to learn a bit more about Bitcoin. Sadly, about the only thing I learned from most of the Bitcoin defenders (for lack of a better term) is they have some pretty terrible and defensive mechanisms to defend their hobby. Seriously, making assumptions...
Really? I have heard that quite regularly over the years. Even today some Apple users still echo that refrain, though they are typically living in the past in various other ways as well in their life... It *did* take a while for actual malware/attacks to finally shut most of the fanboys up...
I see it often enough that I don't even recall specifics. Picking a door lock is often done wrong, such that when it is done right, I get a little wood.
Even if you overlook any technical issues with hollywood hacks, I also get annoyed when an attacker looks at some strange interface/terminal and immediately knows what to do. That just doesn't happen; these companies barely have their own employees who know how to do those things (or to know...