Back when cell phones were just starting to get “smart” I knew a few folks that carried both a pager & phone. They lived in rural areas where pager coverage was decent but phone coverage was spotty at best, and non-existent in places.
Back when cell phones were just starting to get “smart” I knew a few folks that carried both a pager & phone. They lived in rural areas where pager coverage was decent but phone coverage was spotty at best, and non-existent in places.
DigiCert recently was forced to invalidate something like 50,000 of their DNS-challenge based certs because of a bug in their system, and they gave companies like mine only 24 hours to renew them before invalidating the old ones…
My employer had an EV cert for years on our primary domain. The C-suites, etc. thought it was important. Then one of our engineers who focuses on SEO demonstrated how the EV cert slowed down page loads enough that search engines like Google might take notice. Apparently EV certs trigger an additional lookup by the browser to confirm the extended validity.
Once the powers-that-be understood that the EV cert wasn’t offering any additional usefulness, and might be impacting our SEO performance (however small) they had us get rid of it and use a good old OV cert instead.
This guy has never heard of South of the Border…
Back in the 90’s before the days of Windows 3.0 I had to debug a memory manager written by a brilliant but somewhat odd guy. Among other thing I stumbled across:
Those aren’t bikinis….
And 3
If you have ssh open to the world then it’s better to disable root logins entirely and also disable passwords, relying on ssh keys instead.
Port 22 is the default SSH port and it receives a TON of malicious traffic any time it’s open to the whole internet. 20 years ago I saw a newly installed server with a weak root password get infected by an IP address in China less than an hour after being connected to the open internet.
With all the bots out there these days it would probably take a lot less time if we ran the same experiment again.
No, see, piracy is just you downloading movies for yourself. To be like OpenAI you need to download it, put it in a pretty package with a bow, then sell it over and over again. Only when it’s piracy for profit do you get to beg and plead for a pass.
Unless the judge arrests the coroner first.
How about a Hunger Games variant where the worlds top 20 billionaires are pitted against each other?
Depends on the content. My employers sites are a good mix of images, static, and dynamic content, and we rely heavily on Akamai. Their caching of our images offloads a huge amount of work from our origins. We also use their Image Manager tool to optimize a lot of the images seamlessly, which adds further optimization. Their WAF and other security tools are also very impressive.
My employer goes so far as to lock down what devices can connect to our network & VPN, and also locks down laptops so that removable media like USB thumb drives won’t work.
No way in hell I’d let them do things like that to my personal laptop.
Well OPSEC is the stated cause. Who knows how the person was initially identified and tracked. For all we know he was quickly identified through some sort of Tor backdoor that the feds have figured out, but they used that to watch for an unrelated OPSEC mistake they could take advantage of. That way the Tor backdoor remains protected.
Exactly. Tor was originally created so that people in repressive countries could access otherwise blocked content in a way it couldn’t be easily traced back to them.
It wasn’t designed to protect the illegal activities of people in first world countries that have teams of computer forensics experts at dozens of law enforcement agencies that have demonstrated experience in tracking down users of services like Tor, bitcoin, etc.
deleted by creator
She talks about it in this video.
I’m willing to bet the vast majority of that money is changing hands among tech companies like Intel, AMD, nVidia, AWS, etc. Only a small percentage would go to salaries, etc. and I doubt those rates have changed much…
I wonder if Ukraine expects that, and feeds Trump misinformation to trick Putin?
Man has pager in his pocket. Man is sitting down having a meal with his family. Pager blows up in his pocket, killing the child sitting next to him, and probably killing or injuring other family members.
Targeted or not, that child’s death is squarely on Israel. They decided that collateral damage was acceptable when they chose this method of mass assassination.