Skip to content

Cancers can be detected in bloodstream three years prior to diagnosis

Technology
26 16 130
  • 6 Stimmen
    2 Beiträge
    2 Aufrufe
    H
    Top 1 things you should never use AI for.
  • VMware’s rivals ramp efforts to create alternative stacks

    Technology technology
    10
    1
    77 Stimmen
    10 Beiträge
    83 Aufrufe
    B
    I don't use any GUI... I use terraform in the terminal or via CI/CD. There is an API and also a Terraform provider for Proxmox, and I can use that, together with Ansible and shell scripts to manage VMs, but I was looking for k8s support. Again, it works fine for small environments, with a bit of manual work and human intervention, but for larger ones, I need a bit more. I moved away from a few VMs acting as k8s nodes, to k8s as a service (at work).
  • Trump says US will start talks with China on TikTok deal this week

    Technology technology
    7
    56 Stimmen
    7 Beiträge
    57 Aufrufe
    L
    Walk me thru how the tariffs will work on that, will ya taco boy?
  • 255 Stimmen
    14 Beiträge
    80 Aufrufe
    S
    According to the case website, it looks like it's only people who own a device made by Google that runs their voice assistant. So, Samsung Android users are not included, but anyone with a Google Home device or a Chromecast is included
  • 364 Stimmen
    198 Beiträge
    879 Aufrufe
    F
    Okay but we were talking about BTC pump and dumps and to perform that on the massive scale which dwarfs any stock ticker below the top 5 by hundreds of billions of dollars while somehow completely illuding people who watch the blockchain like hawks for big movers... It's just not feasible. You would have to be much richer than the official richest man on earth and have almost all of your assets liquid and then on top of that you would need millions of wallets acting asynchronously. And why would you even bother? If you're that rich you could just not hide it.
  • 50 Stimmen
    22 Beiträge
    126 Aufrufe
    B
    I hate that both trademarks exist, but I'd say using a name form a Tolkien work to develop weapons is especially wrong. Like, abject.
  • 1 Stimmen
    8 Beiträge
    40 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • Everyone Is Cheating Their Way Through College

    Technology technology
    23
    1
    170 Stimmen
    23 Beiträge
    115 Aufrufe
    L
    i can this for essay writing, prior to AI people would use prompts and templates of the same exact subject and work from there. and we hear the ODD situation where someone hired another person to do all the writing for them all the way to grad school( this is just as bad as chatgpt) you will get caught in grad school or during your job interview. might be different for specific questions in stem where the answer is more abstract,