A wide ask here so please boost: my grandfather is trying to get rid of an old business computer, and I was wondering whether any vintage computer people might want it. It was purchased for $50k from The Ultimate Corporation in the early 80s. This ran the Pick operating system, and my best guess is the hardware was originally manufactured by GE or Honeywell. It's about the size of a half-rack and currently lives in Brandon, Manitoba, Canada. It has sat covered in plastic in a chemical warehouse for the past 35 years. Where do people usually post stuff like this other than here? Thanks!
Defcon is such a weird feeling for me, it's like two separate major life events. My first Defcon was the first time I ever booked a vacation with my own money, so I got to go from sharing budget accommodation with my family, to staying in 5 star hotels. Then my second defcon was when I went from living with my parents to being fully independent, thanks to getting arrested and forced to live in the US indefinitely.
@revk Whilst a person might have 'caused' it their error should have been no more than an 'oops do that again' internally.
People make mistakes... I've done it dozens of times. It should be impossible for an untested file to not only be rolled out to prod but pushed directly to prod on multiple critical networks.
Does anyone know what happened to internet access in Turkmenistan from the 11th to the 19th of July 2024?
We saw roughly a 75% reduction in requests to www.bbc.co.uk & www.bbc.com over that period.
Traffic looks to have returned now (possibly at a higher level).
Curious...Could be a scraper or something I guess. Not a lot of traffic.
#Turkmenistan #WebStats #Censorship (maybe)
I See Dead People... #maccSciBar
@mms @stefano this sounds like normal first level support behavior. When at customer projects I hit the wall with permission/groups I end up screen sharing with 1th level support. They make me install Putty when they see I use the OpenSSH client directly. For them it's the only way to ensure the behavior in their instructions is replicated correctly, despite technical details provided or infos like "my colleague has group XY, but not my user - just add me to it.".
Support usually works with tutorial videos, some cheat sheets with screenshots or, likely in your case, just an SSH banners handed out to them.
This is not the support's fault, but rather how they are organized. Management works with numbers and the cheapest way is to outsource it to a different country with unqualified personnel that costs them pennies. They measure how many tickets they close on the dollar, but not the time You spend on the problems. Broken metrics.
US politics | fake news?
@shadowsminder @w7voa how about the bbc?
https://www.bbc.co.uk/news/articles/c1e5xpdzkd8o
Both outlets have Washington correspondents.
Twitter may have been taken over by nazi's but that's not reflective of all the users still on there.
spoiler
@HcInfosec @makdaam Honestly, I did know that story (it was part of University for me!) I would have never remembered the name of that device. I would count that as a "no" in the wording of the question but a "yes" in what I assume is the spirit of it.
I'm sorry but CrowdStrike's "technical details" post is well below the expected standard in our field. What kind of logic error was it? More importantly, what was your QA process like? Why did CI not catch it? Why was there not a staged rollout? These are the absolute basics that should be expected.
https://www.crowdstrike.com/blog/falcon-update-for-windows-hosts-technical-details/
Let's relive this moment from 55 years ago when, on July 20, 1969 at 20:17 UTC, NASA astronauts Neil Armstrong and Buzz Aldrin touched down on the moon and made history.
I won't be using passkeys any time soon. https://me.micahrl.com/blog/concerns-about-passkeys/
Working through content creation of the next part of "Amiga as a Workstation in 1986" videos.
We write a simple program to get used to the #CommodoreAmiga Intuition and Graphics libraries.
I will record the video soon. #retrocomputing
"Linux would have prevented this!" literally true because my former colleague KP Singh wrote a kernel security module that lets EDR implementations load ebpf into the kernel to monitor and act on security hooks and Crowdstrike now uses that rather than requiring its own kernel module that would otherwise absolutely have allowed this to happen, so everyone please say thank you to him
Top 15%, that'll do
Lead dev @extravision for ☁️,📱 & 💻. Views own.
Likes : 🐕, 🧱, 🐧,🚀, sci-fi, whisky, electronic 🎶.
Dislikes : Long bios
He/him