|
|
|
|
|
|
There are no conversations. |
|
|
cauz |
March 13, 2014, 12:46 p.m. |
|
|
|
Anthony Fauci |
It's the advantage of the virus to spread, and you can only spread when you infect people and they infect other people without necessarily killing them. So if you had 100 percent mortality, the potential pandemic would almost self-eliminate itself. |
Dyan Cannon |
They offered me millions and millions and millions of dollars to write books about Cary. That was between us. That was private. I'll always love him. |
Mario Gabelli |
How can you allow the trading companies to locate computers closer to exchanges and flash millions of bids to give an unfair advantage?... Even professionals are losing faith in some aspects of the system. |
Jean-Paul Sartre |
I am no longer sure of anything. If I satiate my desires, I sin but I deliver myself from them; if I refuse to satisfy them, they infect the whole soul. |
Harry S Truman |
You can always amend a big plan, but you can never expand a little one. I don't believe in little plans. I believe in plans big enough to meet a situation which we can't possibly foresee now. |
John C. Maxwell |
Failed plans should not be interpreted as a failed vision. Visions don't change, they are only refined. Plans rarely stay the same, and are scrapped or adjusted as needed. Be stubborn about the vision, but flexible with your plan. |
Napoleon Hill |
First comes thought; then organization of that thought, into ideas and plans; then transformation of those plans into reality. The beginning, as you will observe, is in your imagination. |
Chris Hadfield |
Some of the greatest reality television we ever had was the moon landings. When you think about it, that was human emotion and people, unscripted, working with each other - and millions and millions of people around the world, glued to their television sets to share real-time in a brand new, fascinating human experience. |
Sheila E. |
If you are on television, that one night that someone is able to see you, you're talking about millions of people in one day. That's pretty awesome because then it helps you to jumpstart your career, and if you're the one to go out there and perform, people are going to come see you because those millions saw you on the television. |
Andy Rooney |
Computers make it easier to do a lot of things, but most of the things they make it easier to do don't need to be done. |
|
|
Love Letter, was a computer worm that attacked tens of millions of Windows personal computers on and after 5 May 2000[1] local time in the Philippines when it started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.vbs".
Its at least the same time frame
This post is a comment.
|
|
|
|
The CCleaner Malware Fiasco Targeted at Least 20 Specific Tech Firms
Hundreds of thousands of computers getting penetrated by a corrupted version of an ultra-common piece of security software was never going to end well. But now it's becoming clear exactly how bad the results of the recent CCleaner malware outbreak may be. Researchers now believe that the hackers behind it were bent not only on mass infections, but on targeted espionage that tried to gain access to the networks of at least 20 tech firms. Earlier this week, security firms Morphisec and Cisco revealed that CCleaner, a piece of security software distributed by Czech company Avast, had been hijacked by hackers and loaded with a backdoor that evaded the company's security checks. It wound up installed on more than 700,000 co...
|
|
|
|
this is an old quote i found about sean parker from my fb memories
"He’s always talking about the potential of computers to generate algorithms for likable melodies, and we have this ongoing argument: he believes it’s only a matter of time before computers will be able to create listenable tunes."
|
|
|
|
Malicious Chrome Extensions Infect Over 100,000 Users Again
https://arstechnica.com/information-technology/2018/05/malicious-chrome-extensions-infect-more-than-100000-users-again/
Criminals infected more than 100,000 computers with browser extensions that stole login credentials, surreptitiously mined cryptocurrencies, and engaged in click fraud. The malicious extensions were hosted in Google's official Chrome Web Store. The scam was active since at least March with seven malicious extensions known so far, researchers with security firm Radware reported Thursday. Google's security team remo...
|
|
|
|
Investigation Finds Inmates Built Computers, Hid Them In Prison Ceiling
The discovery of two working computers hidden in a ceiling at the Marion Correctional Institution prompted an investigation by the state into how inmates got access. In late July, 2015 staff at the prison discovered the computers hidden on a plywood board in the ceiling above a training room closet. The computers were also connected to the Ohio Department of Rehabilitation and Correction's network. Authorities say they were first tipped off to a possible problem in July, when their computer network support team got an alert that a computer "exceeded a daily internet usage threshold." When they checked the login being used, they discovered an employee's credentials were being used on days he wasn't scheduled to work. ...
|
|
|
|
Hackers Broke Into An SEC Database and Made Millions From Inside Information, Says DOJ
Federal prosecutors unveiled charges in an international stock-trading scheme that involved hacking into the Securities and Exchange Commission's EDGAR corporate filing system. "The scheme allegedly netted $4.1 million for fraudsters from the U.S., Russia and Ukraine," reports CNBC. "Using 157 corporate earnings announcements, the group was able to execute trades on material nonpublic information. Most of those filings were 'test filings,' which corporations upload to the SEC's website." From the report: The scheme involves seven individuals and operated from May to at least October 2016. Prosecutors sa...
|
|
|
|
US Says North Korea 'Directly Responsible' For WannaCry Ransomware Attack
The White House has publicly blamed North Korea for a ransomware attack in May that locked more than 300,000 computers in 150 countries. From a report: In an opinion piece published in The Wall Street Journal on Monday, Homeland security adviser Tom Bossert writes that after careful investigation, Washington can say that Pyongyang is "directly responsible" for the WannaCry virus. Bossert called the attack in which victims received ransom demands to unlock their computers "cowardly, costly and careless." "The consequences and repercussions of WannaCry were beyond economic," he wrote. "The malicious software hit compu...
|
|
|
|
The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands.
To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency?s term for the interception of electronic communications. Instead, it sought to broaden ?active? surveillance methods ? tactics designed to directly infiltrate a target?s computers or network devic...
This post is a comment.
|
|
|
|
I still have plans on bringing this back into my main sites. they all have email optin forms
This post is a comment.
|
|
|
|
Five years later and I'm still installing the same shit - just on different computers.
|
|