People have been saying this since he was forced into buying the platform. I initially thought that could be true too.
As time has gone on, however, I’m starting to think he’s just that incompetent
People have been saying this since he was forced into buying the platform. I initially thought that could be true too.
As time has gone on, however, I’m starting to think he’s just that incompetent
Excel is one of those tools that punches way above its weight class, which is why it’s so common to see in places where it should have been replaced by a proper database years ago.
Welcome back. I love these comics. The website situation is super shitty, I wish you luck on that endless battle.
I ended up just switching to your Tumblr page in my webcomic rotation to get around it.
Sure, but an average user is not going to know to check for the URL protocol. It’s still incredibly effective for phishing
You’ve got half of it. The hacker’s server is acting as a middleman for the real login page. Everything appears legitimate except the URL will be wrong and if you use a password manager, it won’t auto-fill
They access the legit login page and forward it to you, but they’re in the middle capturing everything you send.
When you enter your login details, they will record them and then forward them to the real login window in near real time, effectively logging in as you. They then have a legitimate session token which they can use to access your account without needing to re-authenticate.
An attack using this tool does require that the user actually logs in, but because they’re just acting as a proxy for the real login page, the only way you’d spot the difference is if the URL doesn’t match (or that your password manager doesn’t auto-fill)
However, it’s pretty easy to see that someone would be fooled by that as you’d expect to need to confirm your identity when adding a gift card to your steam account.
Typically, with scams like this, the attacker is using a tool like Evilginx.
The way this works is that Evilginx runs on a server that the hacker controls and will request the login page from whatever service they are targeting(Discord, Steam, Google, etc) and then serve it to you as a proxy. It looks entirely legitimate unless you make sure to very closely check the URL.
Once you login, it will take a copy of your Username, your password, and your session token(the thing that lets Discord know it’s you so you don’t need to login again after every refresh). and suddenly the attackers now have access to your account to do whatever they want with it.
Discord should absolutely prevent modifying links in this way specifically for this reason, but good practice as a user is to hover over every link and make sure it’s pointing where it’s supposed to. Don’t click on anything that looks suspicious.
There are loads of people out there that want stuff like this but dont have computer-related hobbies.
It makes perfect sense if you understand what you’re doing at each step, but if you’ve never used a command line before, each instruction would look like arcane gibberish.
While many of the CVEs are filed in good faith by responsible researchers and represent credible security vulnerabilities, a recently growing pattern involves newbie security enthusiasts and bug bounty hunters ostensibly “collecting” CVEs to enrich their resume rather than reporting security bugs that constitute real-world, practical impact from exploitation.
Oh, this is once again HR’s fault
The argument is that “we would like to study these works of art in a purely academic setting, and are willing to limit access to academics only, we just need to make sure it’s going to work even if you guys stop supporting it”
The corporations involved seem to read this argument as “we are looking to start a game streaming service, please give us free access to all your games to distribute at our whim”
Megadungeons can be great, but they’re way harder to run because you’re working with a very limited palette as a DM.
It’s very easy to get a bunch of content for minimal effort by relying on traps and combat encounters, but these get boring for your players pretty quickly.
As long as you can offer enough variety with your encounters, along with rewarding your players for remembering details from past trips in the dungeon they can be a blast.
Use it to program an functional DOS emulator for MacOS 8?
Yes, it’s possible
You need a SIP trunk to connect to and a PBX server. I would also recommend a proxy server to obfuscate your SIP server as it will be constantly attacked.
It doesn’t technically need its own network, but having it on its own VLAN is recommended as you will want to have some QoS policies for the UDP voice traffic otherwise your call audio will be choppy
I always have and will continue to pronounce it as “gay ass”
Good. Ad blocking is security and anyone that tells you different both doesn’t care about your computer security, and also wants to sell you something.
That 2/3 to 3/4 of computer programmers, computer security experts and advertisers seems low. I feel like that should be closer to 90%
This would turn the Internet into a hell scape if only because corporations could throw huge amounts of money around.
There would be incentive for the Pizza Huts and the Walmarts of the world to just assume control of the websites for any local competitors.
Domain squatting is incredibly scummy, but I have no idea how it would be possible to have any other system.
My understanding is that domains do expire unless you pay the fee to renew for another year.
Regarding unused domain names, how would anyone know if a particular name is being unused? Domain names are used for more things than browsable websites. You’d have to have a system that could determine if traffic is going to those names, which seems bad from a privacy standpoint and also pretty easy to script around.
Sounds like you want Noscript in addition to uBO
Ultimately, in terms of security, you’re likely to find that both are similarly good.
What makes Firefox desirable over Chrome is that it’s not beng developed by massive corporation that gets the majority of its profits selling user data and delivering targeted adverts.
The other thing that may act as a deciding factor is the “MacOS doesn’t have viruses” effect. Wherein that because firefox has such a small userbase in comparison to chromium, it’s far more profitable to find exploits in chromium.