[-] drspod@lemmy.ml 3 points 6 hours ago

If you can reproduce it, I would recommend filling a bug report with QEMU. If anything can crash the whole VM then there could be a security vulnerability that’s exploitable.

[-] drspod@lemmy.ml 15 points 8 hours ago

There’s a huge gap in the market for just decent quality dumb web search right now.

The problem is filtering out the garbage from the results.

[-] drspod@lemmy.ml 25 points 1 day ago

Don't forget the tuition fees. The reason why a whole generation will never vote Lib Dem again.

[-] drspod@lemmy.ml 5 points 1 day ago

your company is hiring and you want to help bring people that are like-minded

This is a mistake. When building any kind of team, you want diversity of experience, backgrounds, viewpoints etc. A mono-culture is extremely prone to group-think and is unlikely to generate ideas as quickly or elegantly as a team comprising many different types of people.

The second reason why I have always advised my teams not to consider "culture-fit" when interviewing prospective employees is that it is a covert way of discriminating against people who have otherwise protected attributes (race, religion, gender, sexuality etc).

You should hire people based on their ability to perform the job, and nothing else.

[-] drspod@lemmy.ml 2 points 1 day ago* (last edited 1 day ago)

"Suspected" people smugglers? So they're guilty until proven innocent?

If they're suspected of people smuggling then they should be investigated, and if there's evidence they should be charged.

Upon further reading it turns out they are talking about SCPOs (Serious Crime Prevention Orders) which are documented by the CPS here: https://www.cps.gov.uk/legal-guidance/serious-crime-prevention-orders

A Serious Crime Prevention Order (SCPO) can be made on application by the Director of Public Prosecutions, the Director of the Serious Fraud Office, the Director of Public Prosecutions for Northern Ireland and the Lord Advocate in Scotland. Applications are made to the Crown Court, if a person has been convicted of a serious offence, or the High Court on standalone application, if the person has been involved in serious crime.

[-] drspod@lemmy.ml 3 points 2 days ago

I’ve been typing with 10 fingers for 3 years

That's 30 finger-years!

[-] drspod@lemmy.ml 18 points 3 days ago* (last edited 3 days ago)

You can exclude tags by going to your Store Settings page and scrolling down to "Tags to Exclude." You can only exclude up to 10, and this only works for games that are actually tagged with the word. It doesn't exclude keywords in the description. ~~I don't know how many games are actually tagged with "dystopian."~~ I get 3195 results when I search for the "Dystopian" tag, so at least you can exclude those.

This works best for genre types.

[-] drspod@lemmy.ml 48 points 4 days ago

The story that this 260K parameter model generated (in the screenshot of their report):

Sleepy Joe said: "Hello, Spot. Do you want to be careful with me?" Spot told Spot, "Yes, I will step back!"
Spot replied, "I lost my broken broke in my cold rock. It is okay, you can't." Spoon and Spot went to the top of the rock and pulled his broken rock. Spot was sad because he was not l

It's still impressive that they got it running. I look forward to seeing if their BitNet architecture produces better results on the same hardware.

[-] drspod@lemmy.ml 3 points 6 days ago

blog post of the guy getting fucked by people polling his bucket due to an open source project typo

Was it this one?: https://medium.com/@maciej.pocwierz/how-an-empty-s3-bucket-can-make-your-aws-bill-explode-934a383cb8b1

[-] drspod@lemmy.ml 5 points 6 days ago

How do people end up finding them? Don't they have random UUIDs in the URL? Or are they predictable?

[-] drspod@lemmy.ml 107 points 1 week ago

For the most part, large open source projects are worked on by adults not children.

21
submitted 1 month ago* (last edited 1 month ago) by drspod@lemmy.ml to c/lemmy_support@lemmy.ml

Edit: this appears to be fixed now: https://lemmy.ml/post/22203615/14801411

All images in posts on lemmy.ml are currently being resized to 256px on the longest dimension (width/height), even if they are image posts, not intended to be just article thumbnails.

Is this an intentional change? It makes text in images illegible and means that I have to view the original post to see the original image on every image post.

If this is a deliberate space-saving measure, could it be tuned for a little better usability? For example, increasing the maximum size of image when the post is an image post (as opposed to a web link that generates a thumbnail) and setting a size threshold to trigger resize (ie. most small images could be left alone).

Some examples from my feed:

23
submitted 1 month ago by drspod@lemmy.ml to c/privacy@lemmy.ml
35
submitted 4 months ago* (last edited 4 months ago) by drspod@lemmy.ml to c/programming@programming.dev

Threat actors are utilizing an attack called "Revival Hijack," where they register new PyPi projects using the names of previously deleted packages to conduct supply chain attacks.

The technique "could be used to hijack 22K existing PyPI packages and subsequently lead to hundreds of thousands of malicious package downloads," the researchers say.

If you ever install python software or libraries using pip install then you need to be aware of this. Since PyPI is allowing re-use of project names when a project is deleted, any python project that isn't being actively maintained could potentially have fallen victim to this issue, if it happened to depend on a package that was later deleted by its author.

This means installing legacy python code is no longer safe. You will need to check every single dependency manually to verify that it is safe.

Hopefully, actively maintained projects will notice if this happens to them, but it still isn't guaranteed. This makes me feel very uneasy installing software from PyPI, and it's not the first time this repository has been used for distributing malicious packages.

It feels completely insane to me that a software repository would allow re-use of names of deleted projects - there is so much that can go wrong with this, and very little reason to justify allowing it.

295
submitted 1 year ago by drspod@lemmy.ml to c/privacy@lemmy.ml

cross-posted from: https://lemmy.ml/post/4912712

Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users.

If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google's Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware.

Don't click on search ads or, even better, use an ad-blocker so that you never see them in the first place!

193
submitted 1 year ago by drspod@lemmy.ml to c/technology@lemmy.ml

Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users.

If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google's Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware.

Don't click on search ads or, even better, use an ad-blocker so that you never see them in the first place!

332
submitted 1 year ago by drspod@lemmy.ml to c/linux@lemmy.ml

A reported Free Download Manager supply chain attack redirected Linux users to a malicious Debian package repository that installed information-stealing malware.

The malware used in this campaign establishes a reverse shell to a C2 server and installs a Bash stealer that collects user data and account credentials.

Kaspersky discovered the potential supply chain compromise case while investigating suspicious domains, finding that the campaign has been underway for over three years.

view more: next ›

drspod

joined 3 years ago