Re: So, basically businesses should acquire fraud guides
This is a guide on how to exploit information that has already been negligently mishandled by various companies, not one that will assist in preventing such negligence in one's own company.
165 posts • joined 7 Aug 2007
This post has been deleted by a moderator
In a previous job, the thing I had been warning for months would happen, happened, to within a few days of when I predicted. Had all the email I’d sent about it as evidence.
The moronic manager who should have acted and didn’t blamed me anyway. Said I hadn’t made the case strongly enough!
That company no longer exists and said manager went on to have a successful career at one of the outsourcing companies that’s always appearing in El Reg. Successful for him, not any of his clients, naturally.
Sounds like the harrassers are highly skilled And talented and simply need to be offered a opportunity
No. A fundamental personality trait of anyone working in security is that you can trust them to follow the rules/do the right thing, even if they think no one is watching. You watch them anyway, obv.
Siri comes with male/female voices with English, American, Irish and Australian accents. Strongly suspect that critics of Siri being female aren't actually users of it, or they would know this.
I have mine set to Australian because it sounds the most natural. Or maybe Australians just sound robotic, that's why.
Amusingly Oracle pitch it as an advantage that you can buy at entire stack from them, from that hardware (inherited from Sun) all the way up to the apps, via OS and database. “One throat to choke” if anything goes wrong, their salesmen would say.
Now they are upset that someone is taking that advice and going for a single supplier... just not them!
You need to check again then. A DLL can be downloaded from a remote server, buffered in memory, and be injected into an existing process all without ever touching the disk.
It’s easy enough to do this in Linux too - you can try it yourself with GDB. Other tools are available.
Note: the technique of loading code from the network without ever touching the disk is nothing new. In fact it was one of the major features of Java back in the mid 90’s...
How are these “techies”? When was the last time any of them wrote a line of production code, if they ever did?
These are no difficult problems of technology here, just the usual incompetence at management level. I bet they all got paid themselves with no hiccups mind...
As an aside, I'll wager whoever coined the term "deep dive" wasn't actually a diver themselves. When you dive deep, you make a plan in advance, to the minute, and then you execute it. If you find the lost treasure of Blackbeard but you have hit the limit, then you execute your ascent plan, and come back tomorrow. Divers who don't do this end up becoming a permanent part of the site. It's a product evaluation; what's wrong with calling it that?
Don't you get it yet? Yes outsourcing IS cheaper... For the first quarter, or maybe the first year. Enough for whoever inked the deal to be hailed as a business genius and get his bonus and promotion. Then the wheels come off and you're over a barrel. Penny wise, pound foolish as they say.
Biting the hand that feeds IT © 1998–2020