Skip to content

ChatGPT users shocked to learn their chats were in Google search results

Technology
36 27 153
  • Password manager by Amazon

    Technology technology
    150
    2
    534 Stimmen
    150 Beiträge
    2k Aufrufe
    cralex@lemmy.zipC
    My handwriting comes with free encryption at rest. Even I might not be able to read it.
  • Using Clouds for too long might have made you incompetent

    Technology technology
    87
    166 Stimmen
    87 Beiträge
    2k Aufrufe
    M
    I was recruited as an R&D engineer by a company that was sales focused. It was pretty funny being recruited like a new sales hire: limo from the airport, etc. Limo driver didn't work direct for the company but she did a lot of work for them, it was an hour drive both ways to/from the "big" airport they used. She said most of the sales recruits she drove in were clueless kids, no idea how the world worked yet at all - gunning for a big commission job where 9/10 hires wash out within a year. At least after I arrived on-site I spent the day with my prospective new department, that was a pretty decent process. The one guy I didn't interview well with turned out to be the guy who had applied to the spot I was taking and had been passed over. As I was walking in on my first day he was just finishing moving his stuff out of the window-office desk he was giving up for me, into a cube. I can understand why he was a little prickly.
  • Electric Bikes

    Technology technology
    1
    2
    0 Stimmen
    1 Beiträge
    20 Aufrufe
    Niemand hat geantwortet
  • Apple to Australians: You’re Too Stupid to Choose Your Own Apps

    Technology technology
    60
    1
    398 Stimmen
    60 Beiträge
    742 Aufrufe
    P
    I was always surprised by that (t9 dialing). Surely there was some legal reason for that. It felt so - primative.
  • 1 Stimmen
    2 Beiträge
    32 Aufrufe
    A
    If you're a developer, a startup founder, or part of a small team, you've poured countless hours into building your web application. You've perfected the UI, optimized the database, and shipped features your users love. But in the rush to build and deploy, a critical question often gets deferred: is your application secure? For many, the answer is a nervous "I hope so." The reality is that without a proper defense, your application is exposed to a barrage of automated attacks hitting the web every second. Threats like SQL Injection, Cross-Site Scripting (XSS), and Remote Code Execution are not just reserved for large enterprises; they are constant dangers for any application with a public IP address. The Security Barrier: When Cost and Complexity Get in the Way The standard recommendation is to place a Web Application Firewall (WAF) in front of your application. A WAF acts as a protective shield, inspecting incoming traffic and filtering out malicious requests before they can do any damage. It’s a foundational piece of modern web security. So, why doesn't everyone have one? Historically, robust WAFs have been complex and expensive. They required significant budgets, specialized knowledge to configure, and ongoing maintenance, putting them out of reach for students, solo developers, non-profits, and early-stage startups. This has created a dangerous security divide, leaving the most innovative and resource-constrained projects the most vulnerable. But that is changing. Democratizing Security: The Power of a Community WAF Security should be a right, not a privilege. Recognizing this, the landscape is shifting towards more accessible, community-driven tools. The goal is to provide powerful, enterprise-grade protection to everyone, for free. This is the principle behind the HaltDos Community WAF. It's a no-cost, perpetually free Web Application Firewall designed specifically for the community that has been underserved for too long. It’s not a stripped-down trial version; it’s a powerful security tool designed to give you immediate and effective protection against the OWASP Top 10 and other critical web threats. What Can You Actually Do with It? With a community WAF, you can deploy a security layer in minutes that: Blocks Malicious Payloads: Get instant, out-of-the-box protection against common attack patterns like SQLi, XSS, RCE, and more. Stops Bad Bots: Prevent malicious bots from scraping your content, attempting credential stuffing, or spamming your forms. Gives You Visibility: A real-time dashboard shows you exactly who is trying to attack your application and what methods they are using, providing invaluable security intelligence. Allows Customization: You can add your own custom security rules to tailor the protection specifically to your application's logic and technology stack. The best part? It can be deployed virtually anywhere—on-premises, in a private cloud, or with any major cloud provider like AWS, Azure, or Google Cloud. Get Started in Minutes You don't need to be a security guru to use it. The setup is straightforward, and the value is immediate. Protecting the project, you've worked so hard on is no longer a question of budget. Download: Get the free Community WAF from the HaltDos site. Deploy: Follow the simple instructions to set it up with your web server (it’s compatible with Nginx, Apache, and others). Secure: Watch the dashboard as it begins to inspect your traffic and block threats in real-time. Security is a journey, but it must start somewhere. For developers, startups, and anyone running a web application on a tight budget, a community WAF is the perfect first step. It's powerful, it's easy, and it's completely free.
  • Apple’s Smart Glasses Expected to Hit the Market by Late Next Year!

    Technology technology
    14
    6 Stimmen
    14 Beiträge
    142 Aufrufe
    L
    great, another worthless tech product that no one asked for. I can hardly wait.
  • 131 Stimmen
    67 Beiträge
    687 Aufrufe
    I
    Arcing causes more fires, because over current caused all the fires until we tightened standards and dual-mode circuit breakers. Now fires are caused by loose connections arcing, and damaged wires arcing to flammable material. Breakers are specifically designed for a sustained current, but arcing is dangerous because it tends to cascade, light arcing damages contacts, leading to more arcing in a cycle. The real danger of arcing is that it can happen outside of view, and start fires that aren't caught till everything burns down.
  • 1 Stimmen
    8 Beiträge
    81 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.