I am going to use this when I make my next presentation to the board about IT spend!
Guaranteed funding :)
Security researchers have taken revenge on a publishing outlet that spams them with requests to write unpaid articles – by using a bogus submission to satirise the outlet's low editorial standards. Hakin9 rather grandly bills itself as the "biggest IT security magazine in the world", published for 10 years, and claims to have …
that in reply to your request for a comment, you will receive a request to come up with an article on their latest dicks.
p.s. as it's Friday, there's no greater ill-pleasure then to watch a "business" burying itself furiously with such legal threats. Perhaps it's a proof this Hakin9 is run by humans, not bots, as they are capable of learning from past case studies :)
"Furthermore, we reduced the effective tape drive throughput of our stochastic overlay network. Similarly, we tripled the effective floppy disk space of our Internet-2 overlay"
Once something has been done it all seems so obvious, and I'm just left wondering why no-one thought of this earlier. No doubt Apple have already patented it, and I look forward to the day that Apple include this marvellous advance in their iPhone. Shortly followed by the Samsung lawsuit.
Thats pretty cool, but its not that surprising a freeloading site like that was fooled
I was more amazed by the
"generates random Computer Science research papers"
mentioned in the article - those guys submitted similar bullshit to conferences and even delivered talks in person!
I know a lot of people on a lot more money than me who couldnt spot one of theses articles to save their life - in fact being highly paid seems to be a prerequisite - it means your watching people work ( aka managing or supervising) rather than doing it , therefore no need to actually know anything.
I take offense to that remark about managing/supervising. Well OK not really, like I give a rat's ass what anybody here or anywhere thinks of me. Some of us started as techs but it is true that you're just a glorified babysitter for those reporting to you and but-kiss/liar to those you report to.
Parody yes but not far from the truth.
Beer icon because it's Friday and nearing that time!
NMAP is elegant; so, too, must be our implementation. Our heuristic is composed of a collection of shell scripts, a homegrown database, and a server daemon. Continuing with this rationale, the homegrown database contains about 2371 instructions of SQL. Along these same lines, NMAP requires root access in order to allow B-trees. The code- base of 64 C files contains about 69 instructions of C.
BogoMIPS are Linus Torvald's fairly vague speed measure used in the Linux kernel for when time-based delays are too long.
And Flip-flop Gates: http://computer.howstuffworks.com/boolean4.htm.
The time line is definitely one of the best, although I was really tickled by "NMAP requires root access in order to allow B-trees" for some reason.
As the nmap guys were writing their article I was also writing my own about how I've been being spammed by the Hakin9 team for the past 3 years.
To the message above this, it isn't about the sharing it is about the constant nagging to write articles. I write articles which I publish for free on my own site, I am not interested in writing for Hakin9 and have been telling them for the last 3 years but they just won't listen.
Biting the hand that feeds IT © 1998–2019