Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)KA
Posts
0
Comments
789
Joined
1 yr. ago

  • Those are both way more useful than exploiting a lazy coder’s fuckup

    I never said social engineering, physical breaching, exerting force on people, and other ways of compromising systems weren't useful. They just aren't hacking to me, otherwise the term is too broad to be very useful.

    You're free to come up with your own definition, I was asked to define it and that's my best shot for now.

  • I'd start with the following, and refine if necessary:

    "Gaining unauthorized access to a protected computer resource by technical means."

    • Port scanning --> Not hacking because there isn't any access to resources gained
    • Using default passwords that weren't changed --> Not hacking because the resource wasn't protected
    • Sending spam --> Not hacking because there isn't any access to resources gained
    • Beating the admin with a wrench until he tells you the key --> Not hacking because it's not by technical means.
    • Accessing teacher SSN's published on the state website in the HTML --> Not hacking because the resource wasn't protected, and on the contrary was actively published*
    • Distributed denial of service attack --> Not hacking because there isn't any access to resources gained

    Those first two actually happened in 2001 here in Switzerland when the WEF visitors list was on a database server with default password, they had to let a guy (David S.) go free
    * The governor and his idiot troupe eventually stopped their grandstanding and didn't file charges against Josh Renaud of the St. Louis Post-Dispatch reporter, luckily

  • I haven't heard of a firewall failing open when overwhelmed yet. Usually quite the opposite, a flood disables access to more than just the targeted device, when the state table overflows.

    But maybe there is a different mechanism I'm not aware of. How would the DDoS change the properties of ingress?

  • I just happened to use the OS search bar which always (?) uses the Android browser.

    Ah right, I had that issue too.

    To avoid it I use the Lawnchair 3rd party launcher with a 5x5 grid, and placed a Firefox "search the web" Widget on the top row. Admittedly it's not perfect, I encountered a few bugs in Lawnchair before (though not recently), but it still annoyed me less than the default.

  • I recommend Firefox for Android, share works normally, and you can install extensions. I have one for ad blocking and one to keep YouTube running even when I minimize the browser or lock the screen.

  • Ist das beim TÜV auch gestaffelt, dass Neuwagen noch nicht so oft müssen?

    Bei uns in der Schweiz ist es typischerweise so 5, 3, 2, 2, 2, 2 Jahre. Aber wie immer sind wir zu föderalistisch, als dass es einheitlich wäre

  • Ah I found some more info from the Frankfurter Allgemeine Zeitung:

    Lame wurde am 6. Juni auf dem Flughafen von Las Vegas im Bundesstaat Nevada von der US-Einwanderungsbehörde vorübergehend festgesetzt und flog noch gleichentags freiwillig nach Kanada weiter. Offenbar hatte Lame übersehen, dass seine elektronische Einreisegenehmigung (ESTA), die zwei Jahre lang gültig ist und mehrmalige Einreisen ermöglicht, abgelaufen war.

    It says he didn't realize that his ESTA authorization (which you can use for multiple visits, but is only valid for two years) had lost validity.

    Source link: https://www.faz.net/aktuell/gesellschaft/menschen/tiktok-superstar-khaby-lame-nach-festnahme-aus-usa-ausgereist-110525932.html

  • it should automatically shut down after applying the updates

    Okay, that part it does for me though. That's extra annoying for you then.

    apply everything that is possible, then restart and apply the remainder

    Yeah on one hand I get the concept, on the other macOS and Linux manage without, and I don't really remember older Windows doing this either, so I wonder if there is a real reason why it's needed, or they just engineered themselves into a bad corner...

  • The linked video is a bit unclear to me. The don't explain the modes well. Mostly it seems to just show heat. According to the description it's a Teledyne FLIR G620, which should be able to detect Methane and other VOCs. But it's not clear to me how we are supposed to distinguish hot rising CO2 and H2O from any potentially leaking Methane, in those pictures.

    Video in question https://www.youtube.com/watch?v=4prazMVylRs

  • This week I heard from a network group lead of a university hospital, that they have a similar issue. Some medical devices that come with control computers can't be upgraded, because they were only certified for medical use with the specific software they came with.

    They just isolate those devices as much as possible on the network, not much else to do, when there is no official support and recertification for upgrading. And of course nobody wants to spend half a million on a new imaging device when the old one is still fine except for the OS of the control computer.

    Sounds like a shitty place to be, I pity those guys.

    That said, if you were talking about normal client computers then it's inexcusable.