I’ve found on my android phone that the bitwarden prompt comes up more reliably if I tap on the password field instead of the username field.
I’ve found on my android phone that the bitwarden prompt comes up more reliably if I tap on the password field instead of the username field.
Is generative AI going to be the calculator of the future? Seems probable, but I don’t know of course.
For important emails I always draft the message before adding the recipient’s email address. Then, I review it before finally adding in the email and hitting send.
I mean, it IS freely available. I’m pretty sure many (all?) of these paid apps get their data from NOAA and NWS.
I’ve found that bitwarden pops up more consistently if I select the password field instead of the username field.
Most people do not know who Satoshi is.
Not really a concern for home use if it’s not networked. If it is networked, make sure you at least have it behind your firewall, disable any remote access/remote printing features, and ideally update the firmware as well.
This is the integrated search on the home screen of my android (pixel). For a lot of mobile phone users, it’s the fastest way to search something. I can just Google search directly from the home screen instead of opening up a browser.
This is a good list. I watched it in this order and had a good time.
Seriously dragon maid? That show is very divisive for its depiction of characters, lol. (e g. Kanna)
That’s just left over from the original comic: https://www.gocomics.com/calvinandhobbes/1990/06/05
deleted by creator
I have used Excel to make tags from a table before. Usually just for one off stuff and before I was very familiar with JavaScript.
E.g. if you have a table of 100 urls you could use excel to easily turn them into a
tags using the various text formulas like concat.
It’s probably never the best tool for the job but sometimes I’ll do stuff in Excel just because I’m very familiar with it.
To clarify I am not a programmer by trade lol
I am a big fan of BLUF (Bottom Line Up Front). Condense your entire email to a single sentence and then explain afterward.
The person you’re emailing will see the key point immediately (maybe even in the lede). If they agree with you, you’re good. If not, they can then read your explanation.
If the email is so complex I can’t explain it one sentence, that’s usually when I consider asking for a meeting or try to reduce further.
Example:
Hi {boss},
I think we should do X.
X is the best way to do Y because it can be automated and reproduced sustainably.
Etc. Etc. Supporting details…
Let me know if you’d like to meet to discuss further, {Name}
Have never seen someone talk about tebibytes ever lol
Ada is a feminine name. The Ada language is named after Ada Lovelace.
I thought about changing the headers for our tests to avoid this, but honestly if someone is doing that I’m not very concerned about them, lol.
Generally no-- the payload typically comes from some sort of interaction (click a link, open an attachment, reply to the message). There have been some zero interaction attacks with emails before. Like for example, when the email is previewed in the reading pane in Outlook. These are exceptionally rare and not what we’re training against when we do phishing training.
That said, if you know an email is phishing it’s always best to not interact with it at all, but you really can’t always tell by the sender and subject line alone.
The good news is, a lot of old secrets won’t really matter anymore by the time we have quantum computers that can break the encryption. There will obviously be a big impact on information that was encrypted just before we get a working quantum computer that can crack modern crypto.
In cryptography discussions, I feel like we’re usually implying (or even saying out loud) that the encryption is secure for a sufficient amount of time and computer power. Perhaps people outside of cryptography don’t know it, but I think there is a reasonable expectation that encrypted communications could be decrypted at some point in the future. We just hope it’s sufficiently far enough away (or difficult enough) to not be a problem.
Honestly as soon as we get some good post-quantum crypto, we’ll probably want to switch over to it asap, even if good quantum computers are still far out, just to help alleviate some of this problem. Of course, I imagine we’re still going to be finding new things once the technology is real and being used. Let’s hope the post-quantum cryptography algorithms we come up with actually are strong against a sufficiently large quantum computer.
Esc > E > S > Q