They did back when that was the windows logo.
They did back when that was the windows logo.
Ultimately, in terms of security, you’re likely to find that both are similarly good.
What makes Firefox desirable over Chrome is that it’s not beng developed by massive corporation that gets the majority of its profits selling user data and delivering targeted adverts.
The other thing that may act as a deciding factor is the “MacOS doesn’t have viruses” effect. Wherein that because firefox has such a small userbase in comparison to chromium, it’s far more profitable to find exploits in chromium.
Well of course it errors out, you’re using powershell rather than DOS
This makes perfect sense to me.
At the start of your career, you want to be important enough that people will care about your opinions, which means getting invited to meetings where things are discussed.
Stage 2, you’ve been there long enough and know how things work so you can offer input and help make decisions.
Stage 3 is the point at which people will come to you for input outside of meetings because that’s easier. You just want to do your job and generally don’t care about decisions anymore unless they bring sweeping changes.
People have been saying this since he was forced into buying the platform. I initially thought that could be true too.
As time has gone on, however, I’m starting to think he’s just that incompetent
Excel is one of those tools that punches way above its weight class. Which is why it’s so common to see in places where it should have been replaced by a proper database years ago.
I’ve yet to find a better controller than the DS4.
It has the perfect feel in the hands. And with Steam’s controller support, Ive yet to have an issue with functionality or button remapping(I haven’t played crosscode, so no info there)
Ive played this version with my nephews before. You can still be raunchy, but you’ve got to be a bit more creative with innuendo.
Sure, but an average user is not going to know to check for the URL protocol. It’s still incredibly effective for phishing
You’ve got half of it. The hacker’s server is acting as a middleman for the real login page. Everything appears legitimate except the URL will be wrong and if you use a password manager, it won’t auto-fill
They access the legit login page and forward it to you, but they’re in the middle capturing everything you send.
When you enter your login details, they will record them and then forward them to the real login window in near real time, effectively logging in as you. They then have a legitimate session token which they can use to access your account without needing to re-authenticate.
An attack using this tool does require that the user actually logs in, but because they’re just acting as a proxy for the real login page, the only way you’d spot the difference is if the URL doesn’t match (or that your password manager doesn’t auto-fill)
However, it’s pretty easy to see that someone would be fooled by that as you’d expect to need to confirm your identity when adding a gift card to your steam account.
Typically, with scams like this, the attacker is using a tool like Evilginx.
The way this works is that Evilginx runs on a server that the hacker controls and will request the login page from whatever service they are targeting(Discord, Steam, Google, etc) and then serve it to you as a proxy. It looks entirely legitimate unless you make sure to very closely check the URL.
Once you login, it will take a copy of your Username, your password, and your session token(the thing that lets Discord know it’s you so you don’t need to login again after every refresh). and suddenly the attackers now have access to your account to do whatever they want with it.
Discord should absolutely prevent modifying links in this way specifically for this reason, but good practice as a user is to hover over every link and make sure it’s pointing where it’s supposed to. Don’t click on anything that looks suspicious.
My certs have all expired, but when I started I didnt have any at all.
The thing that worked for me was to apply to small businesses(Look into local MSPs). Places that have ~20 employees have much less rigor about certs and will more likely test that you’re amicable enough to mesh with the rest of the team. From there you can build experience and often get thr company to pay for your certs.
NTP is the one that comes to mind for me.
Basically every device uses it and until fairly recently was maintained by a single person
There are loads of people out there that want stuff like this but dont have computer-related hobbies.
It makes perfect sense if you understand what you’re doing at each step, but if you’ve never used a command line before, each instruction would look like arcane gibberish.
believe it or not, jail.
I tend to just check uptime before asking this question.
If I see the machine has been up for weeks and they tell me they rebooted it, I know i’m dealing with someone who doesn’t know that pressing the power button on the monitor doesn’t turn the computer off.
While many of the CVEs are filed in good faith by responsible researchers and represent credible security vulnerabilities, a recently growing pattern involves newbie security enthusiasts and bug bounty hunters ostensibly “collecting” CVEs to enrich their resume rather than reporting security bugs that constitute real-world, practical impact from exploitation.
Oh, this is once again HR’s fault
Anyone can learn any skill if they actually invest the time.
And regarding the older brother, you learn pretty quickly working help desk that users generally don’t care what the problem is or why it happened. They just want to get back to work and not have it happen again. After a while you get conditioned to just be friendly and solve the issue without explaining what you’re doing or why.