borari

joined 11 months ago
[–] borari@lemmy.dbzer0.com 8 points 1 week ago (2 children)

Wait how high am I? The example on top returns a length one higher than the example on bottom, because it has a non-printable character in there right?

[–] borari@lemmy.dbzer0.com -1 points 1 week ago (1 children)

The lifespan of a CPU, as long as you repaste it to keep it from overheating and stuff, is like 20 years.

[–] borari@lemmy.dbzer0.com 3 points 1 week ago (1 children)

What’s xxxx and xxx?

[–] borari@lemmy.dbzer0.com -1 points 1 week ago* (last edited 1 week ago) (3 children)

Recommending that somebody upgrade their hardware that is currently working fine because your hardware took a dump is the literal definition of anecdotal evidence.

I’m not saying that you did anything wrong by updating, I’m saying that you shouldn’t be implying that your experience “dodging a bullet” means other people have bullets coming at them.

When does it stop btw? How many years old does hardware have to be for you to feel like you need to upgrade when nothings wrong? (Am I misinterpreting what you said? I thought you said you ordered new stuff before your current system threw a bsod.) Why not buy two of everything when you upgrade and just have cold spares lying around?

To be completely fair though, a 3600 is prolly a bit long in the tooth for certain games, if that’s what you do. I mainly play the finals and I’m having to fight the urge to upgrade my 5800x. It’s good enough, but a 5800x3d isn’t enough of an uplift to justify it and the current performance isn’t bad enough to justify the price of an upgrade to a new socket. I feel like if I was still on a 3600 I’d have pulled the trigger on the upgrade already.

Edit - Also that can absolutely be a transient error. It can be related to too high fclk and/or vsoc voltage, etc. But you’ve already replaced the parts so it doesn’t matter.

[–] borari@lemmy.dbzer0.com 3 points 1 week ago* (last edited 1 week ago)

No. You can have control over specific parameters of an SQL query though. Look up insecure direct object reference vulnerabilities.

Consider a website that uses the following URL to access the customer account page, by retrieving information from the back-end database: https://insecure-website.com/customer_account?customer_number=132355 Here, the customer number is used directly as a record index in queries that are performed on the back-end database. If no other controls are in place, an attacker can simply modify the customer_number value, bypassing access controls to view the records of other customers.

[–] borari@lemmy.dbzer0.com 20 points 1 week ago* (last edited 1 week ago) (1 children)

Every German person I’ve ever met talks so confidently about shit that you just kinda assume they know what they’re talking about, until they start talking about a domain you’re an expert in and you realize they’re actually kinda dumb but with good vocabulary.

[–] borari@lemmy.dbzer0.com 23 points 1 week ago (4 children)

lol. You mean vba macros.

[–] borari@lemmy.dbzer0.com -2 points 1 week ago* (last edited 1 week ago) (5 children)

Bro I have a 1600x that’s still going strong in a rack mount chassis. I highly doubt that your bluescreen was a hardware issue that would have made your system unusable forever. You probably just needed to repaste or something. That stuff dries out eventually you know. A 7-8 year old processor is nowhere near the end of its operational lifespan.

[–] borari@lemmy.dbzer0.com -1 points 1 week ago (1 children)

Because centralization isn’t healthy for a decentralized platform, but you do you.

[–] borari@lemmy.dbzer0.com 1 points 1 week ago (3 children)

Now that you know you could just like leave for a new instance though right?

[–] borari@lemmy.dbzer0.com 16 points 2 weeks ago (1 children)

Just to be clear, I will absolutely create new domain users or add my own ssh keys to an authorized_keys file to escalate privs or move laterally through a network while I’m “hacking”.

Also a malicious actor opening a reverse port forward tunnel with ssh allows them to punch a hole to them on the WAN side of the network when they’re dealing with NAT or firewall rules. If a system is truly airgapped then that accomplishes nothing. You’d need something plugged in to the airgapped system or airgapped network to bridge that air gap, like a usb adapter that has a SIM card in it.

 

HOUSTON, Aug 21 (Reuters) - U.S. oilfield services firm Halliburton (HAL.N), opens new tab on Wednesday was hit by a cyberattack, according to a person familiar with the matter. Halliburton said it was aware of an issue affecting certain systems at the company and was working to determine the cause and impact of the problem. The company was also working with "leading external experts" to fix the issue, a spokesperson said in an emailed statement. The attack appeared to impact business operations at the company's north Houston campus, as well as some global connectivity networks, the person said, who declined to be identified because they were not authorized to speak on the record. The company has asked some staff not to connect to internal networks, the person said. Houston, Texas-based Halliburton is one of the largest oilfield services firms in the world, providing drilling services and equipment to major energy producers around the globe. It had nearly 48,000 employees and operated in more than 70 countries at the end of last year.

Cyberattacks have been a major headache for the energy industry. In 2021, hackers attacked the Colonial Pipeline with ransomware, causing a days-long shutdown to the major fuel supply line. That breach, which the FBI attributed to a gang called DarkSide, led to a spike in gasoline prices, panic buying and localized fuel shortages. Several major U.S. companies have suffered ransomware attacks in recent years, including UnitedHealth Group (UNH.N), opens new tab, gambling giants MGM Resorts International (MGM.N), opens new tab, Caesars Entertainment CZR.O and consumer good maker Clorox (CLX.N), opens new tab.

While its unclear what exactly is happening at Halliburton, ransom software works by encrypting victims' data. Typically, hackers will offer the victim a key in return for cryptocurrency payments that can run into the hundreds of thousands or even millions of dollars. If the victim resists, hackers sometimes threaten to leak confidential data in a bid to pile on the pressure. The ransomware group DarkSide, suspected by U.S. authorities of the Colonial Pipeline attack, for example, said it wanted to make money. Colonial Pipeline's CEO said his company paid a $4.4 million ransom as executives were unsure how badly its systems were breached or how long it would take to restore the pipeline.

view more: next ›