|
|
|
|
Goodbye Apache config file bugs! |
|
|
|
There are no conversations. |
|
|
|
|
Nomar Garciaparra |
Back then, my idol was Bugs Bunny, because I saw a cartoon of him playing ball - you know, the one where he plays every position himself with nobody else on the field but him? Now that I think of it, Bugs is still my idol. You have to love a ballplayer like that. |
Chuck D |
People aren't going to support an artist just because they have an audio file. They have to feel a real connection. |
Dan Farmer |
I can write a program that lets you break the copy protection on a music file. But I can't write a program that solders new connections onto a chip for you. |
Dimebag Darrell |
I was lucky enough to get to see guys like Bugs Henderson, Jimmy Wallace, all those great Texas blues players. |
Edward Felten |
In making policy designed with copyright in mind, you end up making decisions about whether other important technologies, such as privacy-enhancing or file-search technologies, should be encouraged or discouraged. A collision is happening between creativity and protecting IP. |
Freema Agyeman |
I'm terrified of bugs and I travel with sprays, lotions, potions; the lot. I have to check the room before I go to sleep and if I come across a bug and fail to remove it I have to sleep in a separate room as I'm paranoid that I'll be taken advantage of as I sleep. |
Joe Dante |
Daffy, of course, wants to go on the journey with him but the studio decides they want Daffy back, so Bugs and a young studio executive heroine have to go out and try to bring him back. |
Mike Davidson |
Our old site did not have very good support for the disabled, but our new site should soon have much better support. With all of our content in divs now, we can hide all but the relevant chunks of content and navigation with a simple alternate CSS file. |
Douglas MacArthur |
Like the old soldier of the ballad, I now close my military career and just fade away, an old soldier who tried to do his duty as God gave him the light to see that duty. Goodbye. |
Eduardo Galeano |
History never really says goodbye. History says, 'See you later.' |
|
|
Here is the kind of thing that bugs the crap out of me about Windows 8.
I just tried to open my recycling bin and delete the files. I opened the window and hit delete and the files disappeared. Then I hit ALT+F4 to close the window and I get a message that says "close the window and cancel file transfer?" What the hell?! The OS is scheduling the release of the file pointers or something which shouldn't take that long and it's telling me that it can't close the window because it's not done? But then if you hit the 'X' to close the window it works... Horrible design.
|
|
|
|
Cramming Software With Thousands of Fake Bugs Could Make It More Secure, Researchers Say
It sounds like a joke, but the idea actually makes sense: More bugs, not less, could theoretically make a system safer. From a report: Carefully scatter non-exploitable decoy bugs in software, and attackers will waste time and resources on trying to exploit them. The hope is that attackers will get bored, overwhelmed, or run out of time and patience before finding an actual vulnerability. Computer science researchers at NYU suggested this strategy in a study published August 2, and call these fake-vulnerabilities "chaff bugs." Brendan Dolan-Gavitt, assistant professor at NYU Tandon and one of the rese...
|
|
|
|
In the previous post on sqlmap basics we learnt how to use sqlmap to hack a vulnerable web application and fetch the list of databases, tables, columns and data rows. In this post we shall see how to do some simple fingerprinting on the remote database to find valuable information that can be used to assist in further exploitation of a system.
So lets say we have a vulnerable url
http://loca...
This post is a comment.
|
|
|
|
Google Says Almost All CPUs Since 1995 Vulnerable To 'Meltdown' And 'Spectre' Flaws
Google has just published details on two vulnerabilities named Meltdown and Spectre that in the company's assessment affect "every processor [released] since 1995." Google says the two bugs can be exploited to "to steal data which is currently processed on the computer," which includes "your passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical documents." Furthermore, Google says that tests on virtual machines used in cloud computing environments extracted data from other customers using the same server. The bugs were discovered by Jann Horn, a security researcher with Google Project Zero, Google's elite security team. These are the ...
|
|
|
|
Why are there a million bugs in every program I write?
|
|
|
|
If you're interested... if you want to try and find bugs in the site I would actually really appreciate that.
This post is a comment.
|
|
|
|
this is actually fixed. now the issue is there is probably a billion security bugs.
This post is a comment.
|
|
|
|
I had a dream that I was at my parent's house and a river flooded and the water was so high that it was in some of the rooms. It cleared away after a day or so and then there were all these giant bugs and snails in my old bedroom that I was trying to catch and put outside.
|
|
|
|
HE CANT EXTRACT A ZIP FILE GUYS
This post is a comment.
|
|
|
|
I had a dream that I started designing tattoos with the tikz package in LaTeX. I sent one of my designs as a tex file to a tattoo artist and he was really confused.
|
|