Skip to content

No JS, No CSS, No HTML: online "clubs" celebrate plainer websites

Technology
205 120 851
  • Hackers Are Finding New Ways to Hide Malware in DNS Records

    Technology technology
    5
    1
    102 Stimmen
    5 Beiträge
    0 Aufrufe
    P
    Unless I'm missing something here... The attacker needs to be running some sort of executable in your network with permissions to: dig the records and assemble the strings write the decoded result to a file make that file executable execute that file You've got bigger problems than hexadecimal txt records in this scenario... The only difference between this and a GitHub gist appears to be that security software doesn't scan traffic in port 53... It easily could be configured for that though surely... It's just UDP traffic like any other. Someone tell me what I'm missing!
  • 172 Stimmen
    8 Beiträge
    35 Aufrufe
    S
    I wouldn't go quite as far. This is just breacrumbs falling of the corporate table.
  • 66 Stimmen
    9 Beiträge
    48 Aufrufe
    django@discuss.tchncs.deD
    All the tasks could have been easily solved with some basic APIs and algorithms.
  • 40 Stimmen
    1 Beiträge
    9 Aufrufe
    Niemand hat geantwortet
  • Microsoft’s new genAI model to power agents in Windows 11

    Technology technology
    12
    1
    30 Stimmen
    12 Beiträge
    66 Aufrufe
    ulrich@feddit.orgU
    which one would sell more I mean they would charge a lot of money for the stripped down one because it doesn't allow them to monetize it on the back end, and the vast majority would continue using the resource-slurping ad-riddled one.
  • 4 Stimmen
    1 Beiträge
    14 Aufrufe
    Niemand hat geantwortet
  • Everyone Is Cheating Their Way Through College

    Technology technology
    23
    1
    170 Stimmen
    23 Beiträge
    115 Aufrufe
    L
    i can this for essay writing, prior to AI people would use prompts and templates of the same exact subject and work from there. and we hear the ODD situation where someone hired another person to do all the writing for them all the way to grad school( this is just as bad as chatgpt) you will get caught in grad school or during your job interview. might be different for specific questions in stem where the answer is more abstract,
  • Microsoft's AI Secretly Copying All Your Private Messages

    Technology technology
    4
    1
    0 Stimmen
    4 Beiträge
    33 Aufrufe
    S
    Forgive me for not explaining better. Here are the terms potentially needing explanation. Provisioning in this case is initial system setup, the kind of stuff you would do manually after a fresh install, but usually implies a regimented and repeatable process. Virtual Machine (VM) snapshots are like a save state in a game, and are often used to reset a virtual machine to a particular known-working condition. Preboot Execution Environment (PXE, aka ‘network boot’) is a network adapter feature that lets you boot a physical machine from a hosted network image rather than the usual installation on locally attached storage. It’s probably tucked away in your BIOS settings, but many computers have the feature since it’s a common requirement in commercial deployments. As with the VM snapshot described above, a PXE image is typically a known-working state that resets on each boot. Non-virtualized means not using hardware virtualization, and I meant specifically not running inside a virtual machine. Local-only means without a network or just not booting from a network-hosted image. Telemetry refers to data collecting functionality. Most software has it. Windows has a lot. Telemetry isn’t necessarily bad since it can, for example, help reveal and resolve bugs and usability problems, but it is easily (and has often been) abused by data-hungry corporations like MS, so disabling it is an advisable precaution. MS = Microsoft OSS = Open Source Software Group policies are administrative settings in Windows that control standards (for stuff like security, power management, licensing, file system and settings access, etc.) for user groups on a machine or network. Most users stick with the defaults but you can edit these yourself for a greater degree of control. Docker lets you run software inside “containers” to isolate them from the rest of the environment, exposing and/or virtualizing just the resources they need to run, and Compose is a related tool for defining one or more of these containers, how they interact, etc. To my knowledge there is no one-to-one equivalent for Windows. Obviously, many of these concepts relate to IT work, as are the use-cases I had in mind, but the software is simple enough for the average user if you just pick one of the premade playbooks. (The Atlas playbook is popular among gamers, for example.) Edit: added explanations for docker and telemetry