Kazumara

joined 2 years ago
[–] Kazumara@discuss.tchncs.de 3 points 5 months ago

No not really. I have the bedtime mode set up the way I want it with the necessary exceptions. Airplane mode would mess that up.

[–] Kazumara@discuss.tchncs.de 14 points 5 months ago (3 children)

“If they want people to work 80 hours a month, they’d need to bring in a lot more jobs,” he says.

Why 80 hours? Is that a threshold that has taken on a specific meaning in the US political discord? Otherwise it seems a little random, that's like a 50% employment, right?

[–] Kazumara@discuss.tchncs.de 6 points 5 months ago (1 children)
[–] Kazumara@discuss.tchncs.de 15 points 5 months ago

That Economic Times article cites a Kyiv Insider article, but doesn't link it, which I consider terrible journalism.

Here's the link: https://kyivinsider.com/orbans-hungary-is-now-officially-the-poorest-nation-in-the-eu/

[–] Kazumara@discuss.tchncs.de 26 points 5 months ago (1 children)

He's just stirring shit to get his name out there isn't he?

[–] Kazumara@discuss.tchncs.de 9 points 5 months ago (3 children)

Heh a royal patchwork family then. I guess as a non blood relative to the crown prince he wouldn't be in the line of succession?

[–] Kazumara@discuss.tchncs.de 1 points 5 months ago

I wonder how betrayed the people in the Appalachian feel when their supposed "own" Vance stood for this.

[–] Kazumara@discuss.tchncs.de 2 points 5 months ago

They are hardly even in the US market. Only via Murena with their e/OS/.

[–] Kazumara@discuss.tchncs.de 1 points 5 months ago (3 children)

Those are both way more useful than exploiting a lazy coder’s fuckup

I never said social engineering, physical breaching, exerting force on people, and other ways of compromising systems weren't useful. They just aren't hacking to me, otherwise the term is too broad to be very useful.

You're free to come up with your own definition, I was asked to define it and that's my best shot for now.

[–] Kazumara@discuss.tchncs.de 2 points 5 months ago (1 children)

You know my first instinct wast to reply with: "No."

Maybe I should have stuck with that. I had a feeling this would lead nowhere.

[–] Kazumara@discuss.tchncs.de 7 points 6 months ago (8 children)

I'd start with the following, and refine if necessary:

"Gaining unauthorized access to a protected computer resource by technical means."

  • Port scanning --> Not hacking because there isn't any access to resources gained*
  • Using default passwords that weren't changed --> Not hacking because the resource wasn't protected*
  • Sending spam --> Not hacking because there isn't any access to resources gained
  • Beating the admin with a wrench until he tells you the key --> Not hacking because it's not by technical means.
  • Accessing teacher SSN's published on the state website in the HTML --> Not hacking because the resource wasn't protected, and on the contrary was actively published**
  • Distributed denial of service attack --> Not hacking because there isn't any access to resources gained

* Those first two actually happened in 2001 here in Switzerland when the WEF visitors list was on a database server with default password, they had to let a guy (David S.) go free
** The governor and his idiot troupe eventually stopped their grandstanding and didn't file charges against Josh Renaud of the St. Louis Post-Dispatch reporter, luckily

[–] Kazumara@discuss.tchncs.de 2 points 6 months ago (1 children)

I haven't heard of a firewall failing open when overwhelmed yet. Usually quite the opposite, a flood disables access to more than just the targeted device, when the state table overflows.

But maybe there is a different mechanism I'm not aware of. How would the DDoS change the properties of ingress?

view more: ‹ prev next ›