JRaccoon

joined 2 years ago
[–] [email protected] 2 points 5 months ago

If he's been a real bad boy, they might remove the backups too :3

[–] [email protected] 1 points 5 months ago (1 children)

You clearly have a system that works for you, not gonna argue against that.

I've only seen the "chaos version" of that. Like I go up to a coworker, they wanna show me something and then spend the following 30 seconds clicking through the tabs until they finally find the correct one.

[–] [email protected] 11 points 5 months ago (1 children)

Then you finally hit send and immediately after notice the horrible typo you made and somehow didn't catch. Should have read it eleventh time. But at least you didn't sent the dancing video this time...

[–] [email protected] 5 points 5 months ago

Yep, has happened in the past. But nowadays browsers are pretty good at minimizing the cpu usage of background tabs. Also, most of our developers' workstations are configured with 64 GB ram, which, come to think of it, might be enabling the addiction in the first place...

[–] [email protected] 12 points 5 months ago (7 children)

I'm a good boy and always close my tabs! ^^
Sometimes I see some coworkers having hundreds of tabs open, and I just don't understand why or how. Any tab hoarders here who can explain?

[–] [email protected] 4 points 5 months ago* (last edited 5 months ago)

Cool, we have the exact same saying in Finnish:
Ei meitä sokerista ole tehty --> We're not made of sugar

Can be used as a response anytime someone doesn't want to go outside because it's raining.

Edit: typo

[–] [email protected] 2 points 5 months ago (2 children)

There would need to be a way to guarantee that only the browser could do this, or at least some way to tell exactly what the source was.

I don't think there's a way to do that. Let's say browsers implemented this. I could then just take a copy of Firefox source code and make my own version, which is exactly the same than normal FF except the fancy screenshot tool has been slightly modified to allow editing the page before taking the screenshot.

[–] [email protected] 6 points 5 months ago

The website (Telegram in this case, but can be any website) adds a specifically crafted text to the clipboard and then tricks the user into pasting that text into the Windows Run dialog, which can be used to execute any command(s), basically like a command prompt.

The text the attacker places in the clipboard is actually a command to download and execute an executable file from the internet, giving the attacker remote access to the system or whatever the payload happens to be.

It's a pretty clever trick. Perhaps MS should consider adding a warning before allowing pasting into the Run dialog or cmd for the first time. They already have this in the Edge browser console.

[–] [email protected] 7 points 5 months ago

Yeah I get that, but why return that information in the HTTP response?

[–] [email protected] 37 points 5 months ago

with the motion largely serving to get Democrats on the record as voting against a bill being framed as anti-infanticide

Democrats have routinely criticized “born-alive” bills as being redundant because killing an infant who was born alive following an attempted abortion is already illegal.

tl;dr: The bill would actually change nothing and it's all political games.

[–] [email protected] 13 points 5 months ago (2 children)

Interesting read. One thing I don't fully get is why does Cloudflare have the airport code in the response headers anyway? I cannot think of a single reason to have it in the response.

[–] [email protected] 9 points 5 months ago

the malicious package was added to PyPi last year in June and has been downloaded 885 times so far.

That's a pretty long time to go undetected. Makes you wonder how many other similar packages there currently are, yet to be discovered, in PyPi, npm and others.

view more: ‹ prev next ›