Go back to your PHP.
13380 posts • joined 3 Jun 2008
Go back to your PHP.
"All bugs are shallow with enough eyes."
But that doesn't help. You still need to recruit enough eyes and make what the code does visible in the first place. And this includes shipping a large testing base btw.
Otherwise it's just a reformulation of "all NP-hard problems are easy given enough time..."
> it's practically impossible to write code that runs below the OS in such a language
Go back to first semester and stay there.
> "assert-like mechanisms perhaps?"
They don't have this simple "must use to not be considered utter caveman" squeaky-bottoms avoiding tool?
Really? What a vapid statement.
Next: BDS now ILLEGAL in France. Because saying something about shitheads is as bad as being a shithead.
Trying to project imperial power abroad is tough and has a high probability of resulting in oodles of FAIL.
Like, you know, the permanent slapstick show in the Middle East.
And from that we can deduce that the home secretary signs anything and everything put in front of her, just in case?
I feel a good Hindenburg joke coming up
(It goes like this: Random story with a guy eating sammich .... when the guy in the story finishes it, a secretary will tell him not to leave the lunch paper around because President Hindenburg will probably sign it.)
Plus ça change, but ça Oswald Mosley.
Yesh, it sounds good in this case...
> Space based weapon systems are specifically forbidden by international treaty.
Someone still thinks "international treaty" is in force.
The US alone has raped "international treaty" so hard in the last two decades (and with impunity) that its ears are bleeding.
Agent BOND has been shibari-ed to a PLATFORM OF EXTERMINATION and is basically awaiting his fate.
GOLDHACKER: "Yes, Mr. Bond. All passwords downloaded via a simple exploit, rainbow-tabled and indexed. A trivial hack, enabled by third-rate coders. It's human nature, Mr Bond. Inevitable."
BOND [STRAINING]: "I don't understand, Goldhacker! Do you expect me to believe this kind of thing will go on forever?"
GOLDHACKER: "No Mr. Bond. I don't expect you to understand. I expect you ... to die!"
[GOLDHACKER turns to leave but then whips around]
GOLDHACKER: "By the way. Nice password, Mr. Bond."
[GOLDHACKER shows BOND a printout with the clearly written text: "007"]
As the saying goes: "FUCK THE EU"
SWIFT "sharing"? EU rolls over!
FATCA "sharing"? EU rolls over!
Flight records "sharing"? EU rolls over!!
Safe Harbor 2.0: Yes, the US will be nice, we promise...
I didn't know there is an actress called Browning...
From Jimbo's Trivia White Hole
When the Nazis achieved power in 1933, Johst wrote the play Schlageter, an expression of Nazi ideology performed on Hitler's 44th birthday, 20 April 1933, to celebrate his victory. It was a heroic biography of the proto-Nazi martyr Albert Leo Schlageter. The famous line "when I hear the word culture, I reach for my gun", often associated with Nazi leaders, derives from this play. The actual original line from the play is slightly different: "Wenn ich Kultur höre ... entsichere ich meinen Browning!" "Whenever I hear of culture... I unlock my Browning!" (Act 1, Scene 1). It is spoken by another character in conversation with the young Schlageter. In the scene Schlageter and his wartime comrade Friedrich Thiemann are studying for a college examination, but then start disputing whether it is worthwhile doing so when the nation is not free.
When I hear "data driven", I take the safety off my Browning.
"Hoover: He was a body remover"
There is something called "price control".
Or you can throw in a nuke station or two.
I think you will find these are different Dysons?
> These vacuums have a special 'don't suck much if you are vacuuming something clean' mode
FOR WHAT PURPOSE!
Elsevier has a journal called "Digital Investigation"? An upmarket Phrack?
Still, good work at analyzing the innards of the protocol, but it's about as "info-sucking" as SS7. Or not. It depends what is going over the protocol once it has been set up.
But clearly the goal is to help the gumshoes:
From its wide adoption, it is obvious how WhastApp communication exchanges may be used during an nvestigation, making the artifacts it produces of compelling forensic relevance. Therefore, we see a strong necessity for both researchers and practitioners to gain a comprehensive understanding of the networking protocol used in WhatsApp, as well as the type of forensically relevant data it contains. Most importantly, due to the newly introduced calling feature, it becomes essential to understand the signaling messages used in the establishment of calls between the WhatsApp clients and servers. The methods and tools used in this research could be relevant to investigations where proving that a call was made at a certain date and time is necessary.
> required access to heart data from my wearable
I actually had to read it thrice until I got that "heart" is not a verb here.
We shall wait for more analysis ... and actual case law. If someone whistle-blows, that is.
Of course, if this law is harmless, imperfect or worse ... why even have it? And make case application secret? Some people want it badly under a smokescreen. The White House is as usual horse-trading and having a spine-bending quid-pro-quo with somebody else. The package cannot even be sold on its own merits, of which there are none. For the public, at least.
> So what are you all waiting for?
These things are like stockmarket crashes, or avalanches. It is unclear when or why, but then...
But i can't go too far; a breakdown of the ultra-optimized / just-in-time delivery system that makes modern society hum will cause havoc in a VERY short time. It's like an explosive collar...
The sad thing is that after a removal operation driven by idealism, mythology and anger which survives the forces of the status quo (in this case, well-militarized police forces, the private armies managed by some very dubious individuals and the professional armies), it is a fact of history that fascism comes in even harder as the sociopathic ruthless and charismatic rise to the top even more unfettered by the appearance of law than before.
Well, historians sure will be busy.
Anything that pisses Verisign off is good, anything that wrecks the current economic "fake scarcity" model of domain names is good, but all in all the new domain names suck ...
So, overall it's good.
In gRPC a client application can directly call methods on a server application on a different machine as if it was a local object, making it easier for you to create distributed applications and services
A Critique of the Remote Procedure Call Paradigm -- Andrew S. Tanenbaum, Robbert van Renesse
"It is our contention that a large number of things may now go wrong due to the fact that RPC tries to make remote procedure calls look exactly like local ones, but is unable to do it perfectly.
Many of the problems can be solved by modifying the code is various ways, but then the transparency is lost.
Once we admit that true transparency is impossible, and that programmers must know which calls are remote and which ones are local, we are faced with the question of whether a partially transparent mechanism is really better than one that was designed specifically for remote access and makes no attempt to make remote computations look local at all."
Funny thing are the juvenile wet dreams of playing Darth Vader and having everything under machine management from the belowdecks meditation room, controlled from Earth Orbit and targeted using machine analytic Big Data 24/7 "unblinking stare" 360° operational awareness shit and autonomous intelligence up the wazoo while the fa**ots are using "0000000000" as password to the Minuteman launch grid and cannot even manage to discover they are bombing a hospital for a full hour because "our combat management system is down, awww". The Uniformed Bukkakeed-by-Neocon Ones are even now starting to realize the fact that they are actively committing war crimes in Yemen by blockading the coast and tankering Saudi F-15s. Great stuff.
These are people who have been trained to think that problems yield to willpower and a forceful attitude, that being "gung-ho", "aggressive" and a "team player" will ensure success. The lack of neocortical reasoning power often does not help. It's like a special school for attack dog PHBs from hell with a medal ribbon. Never work for these guys.
"There has been some misinformation that the government are somehow against encryption"
Indeed, they are not "somehow" but "very much" against encryption.
Recent developments forbid that the NSA export the captured data from the Eurosphere and keep it in a European Datacentre. I'm sure it can be recovered.
"A Chernobyl rat may taste like pumpkin pie but I wouldn't know because I wouldn't eat the filthy motherfucker. Pigs are processed into bacon, and sausage. That's a filthy animal. I don't want to have nothing to do with any piece of an animal that gives you cancer when you eat it."
You seem to fear the Karma Police?
It is a sad fact of life that I know vegans who got cancer....
Cancer is the preferred failure mode of assemblies of self-reproducing, weakly error-checking von Neumann machines.
It must be yet another Jewish/Muslim Conspiracy against the staple food of Central Europe / Asia
Yep, it's him alright! He's going down!!
...it would be a lucky hit though.
"Who wakes me .... it's 15 billion years in the morning??? THIS SHALL NOT STAND!"
It's actually the hand of Allen Dulles.
The useful baud rate is 1kbps - or about 2Gbps of internet 'data'.
That doesn't make any sense.
Baud rate is always order of bps rate. The bps rate is not magically 6 orders of magnitude above (unless you are using millions of distinguishable values, which I rather doubt in this context)
Isn't that some Frank Herbert?
"What is the object re-entering Earth's atmosphere on November 13???"
Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
1) Database has password
2) Backups exist
3) Monthly audit that access is not done by Rogue Sysadmin and stuff is not being used for spamvertisements
4) Someone is called "Security Officer"
In some ancient Hebrew myths ... somewhere in the neighbourhood of Jerusalem
Tough to find as Jerusalem was not even on the map yet? Before David the youthful bruiser set up his local variant of the yurt, there must have been two sheep and a donkey and possibly an olive tree at that place.
> data subject
Should be the "data object", right?
The World today is full of such questions...
Finally, there’s the most important aspect of IBM’s identical Big Data approaches to death and customer service: Both are extremely powerful systems that have escaped any kind of human, democratic control. As Ellsberg puts it, the drone study is “unintelligible to anyone who might ask, ‘to what end is all this?’ or ‘do we have the right to be doing this?’ or ‘is this making us more secure, in the mid- to long-term, or on balance less so?’ or ‘is this creating more people who hate us — including the families of EKIAs (unintended victims) — and wish to harm us, than it is eliminating?’”
So..... where is that European Salesforce Center?
> Implying that the US is any sort an advanced civilization.
In short, the very four digits that Amazon considers unimportant enough to display in the clear on the web are precisely the same ones that Apple considers secure enough to perform identity verification.
I don't understand. Am I not supposed to get asked "security questions" and at amazon I have even labeled them "security question #1", "security question #2", "security question #3"...
Seriously, it's on the level of Garfield. Who writes code with a headset on? What's with the stupid metrosexual beard look? Who says "finished" after writing anything more than a 6-line script?
That comic is bad.
"QUALITY Reich material reproduction - made in Shenzen"
Hitler suicides a SECOND time.