incompetent

joined 1 year ago
[–] incompetent@programming.dev 19 points 2 months ago

Add it to the list of crimes.

[–] incompetent@programming.dev 1 points 2 months ago (1 children)

Are the commands mostly the same on both (sudo, apt update, etc.)?

cc: @Fitik@fedia.io

[–] incompetent@programming.dev 6 points 2 months ago

User @brickfrog@lemmy.dbzer0.com explained the differences pretty well in this comment.

[–] incompetent@programming.dev 7 points 3 months ago

"I have read and agree to the Terms" is the biggest lie on the web. Together, we can fix that.

https://tosdr.org/en

[–] incompetent@programming.dev 0 points 3 months ago (3 children)

Does Bernie Sanders come close, in your opinion?

[–] incompetent@programming.dev 1 points 3 months ago

I was just thinking the same thing.

[–] incompetent@programming.dev 5 points 3 months ago (1 children)

Your AI generated summary, again, lacks evidence. I asked for a site, or a source where what you claim credibly happened, not just repeating the same myths in a circular series of arguments.

I used no AI. Had you actually paid attention you'd see that I cited my source in the first link. The summary I posted it a direct quote from that source. Just because you don't like what you read that doesn't automatically make it AI slop.

I don't feel like refuting any of your other, unsourced assumptions. Good luck with your beloved Windows 7.

[–] incompetent@programming.dev 10 points 3 months ago (4 children)

It's called a Drive-by Compromise:

Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. Multiple ways of delivering exploit code to a browser exist (i.e., Drive-by Target), including:

  • A legitimate website is compromised, allowing adversaries to inject malicious code

  • Script files served to a legitimate website from a publicly writeable cloud storage bucket are modified by an adversary

  • Malicious ads are paid for and served through legitimate ad providers (i.e., Malvertising)

  • Built-in web application interfaces that allow user-controllable content are leveraged for the insertion of malicious scripts or iFrames (e.g., cross-site scripting)

Browser push notifications may also be abused by adversaries and leveraged for malicious code injection via User Execution. By clicking "allow" on browser push notifications, users may be granting a website permission to run JavaScript code on their browser.

It's not Hollywood fantasy, as you claim. It is a well documented attack vector.

[–] incompetent@programming.dev 66 points 3 months ago

Yes.

Yes.

Yes.

I agree.

[–] incompetent@programming.dev 10 points 3 months ago

Because the cops are on her side and they're usually corrupt. Things aren't as they should be in a lot of places.

[–] incompetent@programming.dev 44 points 3 months ago (1 children)

"let's rip at Benjamin Netanyahu"

Ha! That was the tamest thing I've ever seen on South Park. And the scene with Bibi was only for a few seconds at the very end. The headline is such hyperbole.

view more: ‹ prev next ›