Back when cell phones were just starting to get “smart” I knew a few folks that carried both a pager & phone. They lived in rural areas where pager coverage was decent but phone coverage was spotty at best, and non-existent in places.
Back when cell phones were just starting to get “smart” I knew a few folks that carried both a pager & phone. They lived in rural areas where pager coverage was decent but phone coverage was spotty at best, and non-existent in places.
Back in the 90’s before the days of Windows 3.0 I had to debug a memory manager written by a brilliant but somewhat odd guy. Among other thing I stumbled across:
Depends on a large part how deep the water is right at the edge. The bows of the boats are largely on top of the surface. The stern of the boats sit lower in the water, and when lowered the outboard motors will sit a foot or more under the surface. It’s very possible that at low tide the prop could hit bottom when backing in…
My first reaction to this question was: hey, I was alive (not by much) when Neil Armstrong walked on the moon. I don’t remember anything about it though.
Next up, the CyberSub…. Who is ready to risk drowning in one?
No, see, piracy is just you downloading movies for yourself. To be like OpenAI you need to download it, put it in a pretty package with a bow, then sell it over and over again. Only when it’s piracy for profit do you get to beg and plead for a pass.
My wife and I bring water bottles we can fill up after going through security, and packs of pedialyte powder to mix into it.
How about a Hunger Games variant where the worlds top 20 billionaires are pitted against each other?
Keep an eye on that truck driver for winning a Darwin Award sooner or later…
My employer goes so far as to lock down what devices can connect to our network & VPN, and also locks down laptops so that removable media like USB thumb drives won’t work.
No way in hell I’d let them do things like that to my personal laptop.
Well OPSEC is the stated cause. Who knows how the person was initially identified and tracked. For all we know he was quickly identified through some sort of Tor backdoor that the feds have figured out, but they used that to watch for an unrelated OPSEC mistake they could take advantage of. That way the Tor backdoor remains protected.
Exactly. Tor was originally created so that people in repressive countries could access otherwise blocked content in a way it couldn’t be easily traced back to them.
It wasn’t designed to protect the illegal activities of people in first world countries that have teams of computer forensics experts at dozens of law enforcement agencies that have demonstrated experience in tracking down users of services like Tor, bitcoin, etc.
She talks about it in this video.
I’m willing to bet the vast majority of that money is changing hands among tech companies like Intel, AMD, nVidia, AWS, etc. Only a small percentage would go to salaries, etc. and I doubt those rates have changed much…
I wonder if Ukraine expects that, and feeds Trump misinformation to trick Putin?
Prior to the war Ukraine was the world’s 4th largest military arms exporter. They just stopped exporting and turned all their R&D on defending themselves instead.
https://en.m.wikipedia.org/wiki/Defense_industry_of_Ukraine
In 2012, Ukraine’s export-oriented arms industry had reached the status of world’s 4th largest arms exporter.[1]Since the start of the war in Donbas, Ukraine’s military industry has focused more on its internal arms market and as a result slipped to the 9th spot among top global arms exporters by 2015,[2]11th spot by 2018,[3] and the 12th spot among global arms exporters by 2019.
Sooner or later Ukraine will start manufacturing their own such weapons. They have demonstrated time and again that they the ability to be creative and do what the world never expected of them.
Holding them back at this point is just prolonging the war.
Smarter bots know how to easily avoid being detected based on the speed of their requests by simply adding a random delay to them. A few years ago we discovered a very slow speed credential stuffing attack (testing usernames & passwords) against my employers site. It was only testing one set of credentials every couple of minutes.
Once we discovered it we didn’t block it though. We were able to spot the attack fairly easily once we knew what to look for, so we updated our system to always return a login failure no matter what credentials they sent.
Man has pager in his pocket. Man is sitting down having a meal with his family. Pager blows up in his pocket, killing the child sitting next to him, and probably killing or injuring other family members.
Targeted or not, that child’s death is squarely on Israel. They decided that collateral damage was acceptable when they chose this method of mass assassination.