The problem is that he's been riding, as it were, that gravy train for at least a decade.
1047 posts • joined 9 May 2018
Want to feel old? Aussie cyclist draws Nirvana baby in Strava on streets of Adelaide because Nevermind is 30
BOFH: You'll find there's a company asset tag right here, underneath the monstrously heavy arcade machine
Thousands of internet-connected databases contain high or critical CVEs, says report by cloud security biz
The unit of measure for fatbergs is not hippopotami, even if the operator of an Australian sewer says so
Re: If someone can tamper with the PAC file...
Does wpad.example.com (substitute your local network here) return a valid address on your local network? If not, change your computername to wpad and enable dhcp and crank up apache. You can now use this bug, if unpatched, to do as you will, in addition, if you install squid, you can become an invisible, internal corporate proxy.
Re: 1170 blocked exit points, any blocked entry points ?
That's how I prevent google search from using autocomplete. start every search with "fuck" and when I get to the end, I hit the home key, shift-cntrl-right arrow, del, enter. This is less of a pain that trying to ignore google's inevitably terrible suggestions.
Apple didn't engage with the infosec world on CSAM scanning – so get used to a slow drip feed of revelations
Re: Apple are hypocrites
Who's government warrant? Yours? Mine? Theirs? In your country, pictures of "A" are legal and "B" illegal. In my country, picutures of "B" are legal and "C" are illegal. In their country, picgures of "C" are legal and "A" are illegal. Which images are going to become part of a database used by this feature? A? B? C? or all three?
Apple's bright idea for CSAM scanning could start 'persecution on a global basis' – 90+ civil rights groups
No, but if I buy/lease a z/OS mainframe from IBM, I only pay for the cpus that are enabled, not the cpus that are installed in the box. The same goes for quite a few vendors, where its more cost effective for them to ship fully populated hardware (usually fully self-contained racks) than it is to schedule maintenance engineers, shipping, installation,testing, and customer qualification testing. It means installing a license to 'add 2 cpus' or 'add 20TB of disk' becomes a much less expensive (for the vendor) and much easier (for the customer) update.
Stephen King released a book in which the ink began to fade when the page was exposed to air, meaning that it could only be read once, so technically, when you bought it it wasn't fungible, but if you read it and skipped two pages then technically it will be unique but the only way to prove it (short of an xray/mri scan) would be the open it, wiping that last pair of pages.
Re: Firewall rulesets and defaults
More normally, the last rule is: any/any/any drop. If you need any any/any/any permit rule for testing, it has to be next-to-last in the list above the any/any/any drop. This is so that when you complete testing and have all of your required rules in place, you need only delete the any/any/any permit rule.
That being said, the best way to do this is to NOT use an any/any/any permit rule, but to open ports as the application requires them, but this is much more labour intensive.