![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
To build on you analogy: if you left your garage door open and people came in and started taking your things, is that not stealing?
To build on you analogy: if you left your garage door open and people came in and started taking your things, is that not stealing?
They could bundle in my idea of having a telephone in your house, not a cell phone more like a land phone
Sorry
• • • ノ( ゜-゜ノ)
I think of Ace and Gary’s penismobile from Ambiguously Gay Duo
The ol’ Uno reverso countersquat technique, I like it
It’s an odd position to be in; I work in the private sector but my company deals almost exclusively with government and NGO contracts, so at times I feel like I’m public sector.
What I’ve noticed is that even though the desired outcome is nearly identical for both sectors, the buzz words associated with each is what determines who responds to my job applications. As an example:
Private: IaC and Policy-as-Code, supply chain and software composition analysis, SAST, DAST, etc.
Public: Compliance automation, risk management frameworks, risk quantification (this one has generated a lot of excitement recently), etc.
This is purely anecdotal, but you may find adjusting your resume to include some of these buzzwords as applicable to the industry to which you are applying may help you get your foot in the door.
To reiterate, yes I know in the end all of these companies strive toward the same goals, whether it be passing audits or being able to demonstrate prudent security practices to clients, sometimes the hiring manager is looking for specific terminology and will discard any applications that exclude it.
Make sure to wear your favorite Music Band tshirt.
LLM just autocomplete on steroid.
Funny you should say this. I only have anecdotal evidence from me and a few friends, but the general consensus is that autocomplete and predictive text are much worse now than they used to be.
Rs: “Individual freedoms! No government overreach!”
Also Rs: “Let’s track these motherfuckers so they can be punished.”
The Nodfather
Why is thinnest ever placed in such high regard? Have you seen how ridiculous the new iPad Pro looks when the Pencil is attached to it for charging?
I think I’m in the vocal minority in that I really don’t give a shit about thin, especially if it affects performance, repairability, or battery life.
wefwef 4 lyfe!!
For all you know the victims rate it positively as well but they don’t submit feedback
Really struggling to find the value in this article. How does it go from
Cybersecurity is typically handled by a company’s IT staff, who become quickly overwhelmed
to
The most effective way for SMEs to escape this cybersecurity hell is to adopt a single platform
without so much as entertaining the idea of hiring a dedicated team of security professionals with this specific task in mind?
This reads more like, “We have all these lawyers that sometimes talk to the IRS, instead of hiring an accountant let’s just buy TurboTax.”
Why doesn’t anyone ever think about the poor microbes?
A strong acid would do just as good a job without having to involve any lifeforms.
That was a joke in reference to the Van Halen album 5150, which in fact did not include the track Hot for Teacher, as that was on the album 1984, and I was being facetious.
5150 is also the name of Eddie (and subsequently Wolfgang) Van Halen’s recording studio where 1984 and many other seminal albums were recorded.
The studio was named after Section 5150 of the Welfare Code of California which allows officers or mental health professionals to detain individuals for involuntary psychiatric holds.
Pretty sure it’s a reference to Van Halen’s Hot For Teacher
There is infrastructure involved with monitoring subscription status to make sure you’re not pirating heated seats. Also for taking payments to unlock your adjustable lumbar supports. They gotta pay for it somehow!
What about this scenario:
Would this be considered breaking in? Probably. Here is where the analogy breaks down; if I were to leave the front door of my house unlocked, even if there’s a welcome mat outside, anyone who enters without my knowledge or consent can be charged with breaking and entering (yes, even though no actual breaking is involved).
The interesting thing with public APIs is that there are generally terms and conditions associated with creating an account and acquiring a key, though if you are hitting an unauthenticated endpoint you technically never agreed to them. In this particular case with Authy, it would probably be argued that the intent was to acquire data by exploiting a vulnerability in the custodian’s system and use it for nefarious purposes or profit. I’d call it a hack.