136 private links
In what follows, I try to make the same case nearly 30 years later, updated for today’s computing horrors. A version of this post was originally published on my personal blog, Berthub.eu.
Cyberkriminelle haben offenbar schon rund 3 Millionen smarte Zahnbürsten mit einer Schadsoftware infiziert, um die vernetzten Geräte in Botnetze einzugliedern und damit DDoS-Angriffe auf verschiedene Onlinedienste auszuführen.
It is unfortunate that people dealing with computers often have little interest in the
history of their subject. As a result, many concepts and ideas are propagated and
advertised as being new, which existed decades ago, perhaps under a different
terminology. I believe it worth while to occasionally spend some time to consider the
past and to investigate how terms and concepts originated.
Do you run a mail server, or own a domain example.com that you send mail from?
PSA about the Coming DKIMpocalypse on Thursday when Google and Yahoo tighten mail rules:
Microsoft is trying to get all email users, including governments, to migrate to their cloud-based solutions. This makes their email cloud THE prime target for nation-state/state sponsored hackers. Yet Microsoft appears to be leaving gaping security holes in th
The world is designed against the elderly, writes Don Norman, 83-year-old author of the industry bible Design of Everyday Things and a former Apple VP.
Unter dem Schlagwort des "Once-only-Prinzips" sollen Bürgerinnen und Bürger ihre Daten nur an einer Stelle hochladen müssen, sie werden anschließend über eine zentrale Drehscheibe ausgetauscht, die auf den nicht sonderlich einprägsamen Namen "Digital Austria Data Exchange" ("Dade X)" hört.
"So müssen die Menschen nicht mehr mühsam ihre Dokumente von einer Behörde zur nächsten tragen, sondern reichen sie einmalig ein", sagt Florian Tursky, Staatssekretär für Digitalisierung. Aktuell sind 21 Register an Dade X angebunden, darunter unter anderem das Melderegister, das Personenstandsregister, das Unternehmensregister sowie das Straf- und Finanzstrafregister.
Sticker. Hm. "Sticker"
$ Ohne Graphik, trotzdem da
$ Commandline only Antifa
"Obendrein sei ihm der Datenbankzugriff nur durch sein "tiefes Verständnis über Programmiersprachen und Softwareentwicklung" möglich gewesen."
Sie haben ihn für Kompetenz verurteilt. Wie bei einer mittelalterlichen Hexenverbrennung, weil sich eine mit Heilkräutern auskennt oder so.
I embraced OS X as soon as it was available and have never looked back. So a lot of In the Beginning...was the Command Line is now obsolete. I keep meaning to update it, but if I'm honest with myself, I have to say this is unlikely.[1]
In July 2004 I found myself sitting alone in the dark, on the enclosed deck of a ferry boat oozing between fog-shrouded islands of the Alaskan coast. The scenery was haunting, but after the first three hours, I decided to occupy myself by finally reading Neal Stephenson's essay about the command-line. Halfway through it I began crossing things out, and scribbling comments in the margin. The essay was five years old, and in dire need of a fresh perspective.
Months later, I learned that Stephenson himself was dissatisfied with the essay. He wrote that it, "is now badly obsolete and probably needs a thorough revision." An "Ask Slashdot" poll quoted him as saying, "I keep meaning to update it, but if I'm honest with myself, I have to say this is unlikely."
Though I have fleshed out my original comments into longer, more structured pieces, it is not my intention to replace or revise Neal Stephenson's original writing. His original essay is a much more cohesive and entertaining read than my notes are. (He is a Writer, after all. I consider myself a code-monkey by comparison.) In fact, my notes do not hold together unless they use the original essay as a framework, and that's why his entire essay is reproduced here, with my comments color-coded. And yes, I have sought and obtained permission from Neal to do this.
Difftastic is a structural diff tool that compares files based on their syntax.
Like many things in git, zdiff3 is one of those hidden features that I wish was set as the default option. It has made my day to day development much easier when it comes to resolving conflicts and it's a nice little improvement over diff3. If you want to enable zdiff3 by default on versions of git >= 2.35, you can run git config --global merge.conflictStyle zdiff3. If you just want to give it a test run next time without setting that option to see if you like it you can also run git checkout --conflict zdiff3 ./conflicted/file/path to checkout just the one conflicted file again with the zdiff3 algorithm.
President Clinton had exhorted the government in mid-1998 to “put our own house in order,” and large businesses — spurred by their own testing — responded in kind, racking up an estimated expenditure of $100 billion in the United States alone. Their preparations encompassed extensive coordination on a national and local level, as well as on a global scale, with other digitally reliant nations examining their own systems.
...
The innumerable programmers who devoted months and years to implementing fixes received scant recognition. (One programmer recalls the reward for a five-year project at his company: lunch and a pen.) It was a tedious, unglamorous effort, hardly the stuff of heroic narratives — nor conducive to an outpouring of public gratitude, even though some of the fixes put in place in 1999 are still used today to keep the world’s computer systems running smoothly.
Here's the truth. Ted Kowalski, username frodo, may he rest in peace, was the original author, just down the hall from my office in Murray Hill, and his name for the program had a 'u' where there is now an 's'. Management made him change it for distribution, but they couldn't make him change his pronunciation.
Bei der Attacke handelt es sich mutmaßlich um einen der häufigen Fälle von Cybererpressung. Die Täter verschlüsseln mit "Ransomware" genannter bösartiger Software die angegriffenen Rechnersysteme und verlangen anschließend Geld für die Entsperrung. "Eine konkrete Lösegeldforderung ist nicht benannt, auf dem Server befindet sich eine Text-Datei, die zur Kontaktaufnahme über eine zu installierende Software auffordert", erklärte Bürgermeister Stölzle dazu.
Der Landkreis Vorpommern-Rügen hat aus Sicherheitsgründen IT-Systeme vom Netz genommen. Das Ausmaß des Problems wird untersucht. Nach der Trennung von IT-Systemen des Landkreises Vorpommern-Rügen vom Netz arbeiten Fachleute an einer Lösung des Problems.
Die Verwaltung hatte am Dienstagabend bekannt gegeben, dass die Systeme aus Sicherheitsgründen vorsorglich getrennt worden seien. Ob es sich um einen Cyber-Angriff handele, sagte eine Landkreissprecherin am Mittwochmorgen nicht.
The binary size difference is presumably because the 'test' binary omits the version and help text, along with the code to display it. But if you look at the relevant Coreutils test.c code, the relevant code isn't disabled with an #ifdef. Instead, LBRACKET is #defined to 0 when compiling the 'test' binary. So it seems that modern C compilers are doing dead code elimination on the 'if (LBRACKET) { ...}' section, which is a well established optimization, and then going on to notice that the called functions like 'usage()' are never invoked and dropping them from the binary.