That filibustering is still a valid political instrument is so weird as a non american. Maybe the us wouldn't be in this mess if it wouldn't cling to political process from the 1800s
Its is addiction, plain and simple, whole app is designed to be so by psychology experts. Same goes for all Meta products for same goal of course, no need to bash tiktok specifically, its all brain or more like soul cancer destroying a bit young generation and they dont even know any better. A bit, more than a bit a collective and specific parenting failure too.
Ever dealth with proper addict? They live in their own world where all is good, normal and justified. Similar here. In addicts communities, 'normal' bar is set very low but from inside its day as usual.
Now I dont claim there can be no good happening, ie those 'special circumstances' really sound like it, but it would sound way better if some proper child psychologist was there, instead of anonymous communities who may (eventually will like elsewhere) turn toxic and beyond, with consequences.
Wow. Totally unprofessional when you compare it with today's security bulletin standards. This downplays risks and blames the user. Was this common back then?
Wow. Apparently, respecting user freedom and personal responsibility is now "unprofessional".
I haven't seen a more blatant exposure/confirmation of the deep-seated authoritarian control-freak mindset that has permeated the whole computing industry.
Yes, back then it was common and expected that users were responsible for their own decisions. Now the industry is taking away that freedom and telling them it's for their own good.
> I haven't seen a more blatant exposure/confirmation of the deep-seated authoritarian control-freak mindset that has permeated the whole computing industry.
Can I use this as a testimonial? Chill... at least if you want me to discuss this further.
> Yes, back then it was common and expected that users were responsible for their own decisions.
You do not chose and decide to be victim of a scam. At least I presume the "if you wouldn't have downloaded hacker stuff from weird websites you wouldn't have caught malware" was as wrong back then as it is now and is just shifting the blame to the user.
If you drive a car down a railway track is it your fault or the sat nav's fault for saying "turn left"
We expect certain minimum skill in operating equipment
Now open an email and have it silently install exploiting a bug in your mail client/browser/network stack, that's one thing. That wasn't this though, this was some software which did exactly what it said on the tin.
Oh no, it totally got bundled into different files using other tools with creative names like saranwrap and silkrope whose job it was to disguise the software, and after it was installed silently replace the bundled executable with an ordinary unbundled one to stymie attempts at further analysis.
I'm not certain what GP is on about. There were copious ways to distribute (deliberately payload) infected files back in the day and it was common windows user practice to just download and run executables (especially if they appeared to be installers from reputable-seeming websites) and zero free virus scanning or firewall options were available: all were for pay and all were terrible. None certainly shipped with Windows itself.
Plus as mentioned elsewhere plenty of third party software like ICQ enabled benign-seeming mechanisms to view documents which could be exploited to instead run infected executables.
I find this an incomprehensible position. I've used computers 25 years. I've worked professionally with them for 10+ years. I know more about the runtime and workings of a computer than any of the architects, tech leads, or principal engineers at my company. I don't know how a computing device works fully. 99% of people working in 'tech' don't. So 99% of the professionals aren't to this standard, and we expect end users to be?
What percentage of car drivers are fully qualified vehicle inspectors?
Do you know how to fully use your phone? Would you be aware if pegasus spyware was installed?
> What percentage of car drivers are fully qualified vehicle inspectors?
AFAIK, all car drivers are required to go through specialized training, and pass through periodic skill examinations. You should not be (and are legally forbidden from) operating a car if you don't know how to use it.
Not in the US, at least not anywhere I've lived. The only regular re-examination is an eyesight test. There is no skill testing after the initial license issuance, and there won't be unless the license status is fully lost - waiting too long after expiration, revocation, that sort of thing.
The only regular re-examination is an eyesight test.
And, at least in the state of WA, that "eyesight test" consists of a checkbox on a form that says, "Your eyes aren't shit, are they?". I've checked that box, and I overheard a person well past retirement age tell the same story at a restaurant. I get regular eye exams, but I don't know about the guy at the restaurant.
The last time I took a physical skills test was 40-some years ago. The last time I took a "written" test was...I don't know, ten years? And guess what? I still remember getting a question wrong on that test (despite having lived in WA for over ten years at the time), and what do you know, TIL something about WA road laws. They should test me (and everyone else) more often, and not make half the questions "how much can you drink and still safely drive?"
Oof. In the half dozen states I've lived in, it's an actual vision test. It's not a very good one and I've managed to squint my way through it to keep the corrective lenses required marker of my license...but I did have to correctly report what I saw to renew my license.
This depends what you mean by "security bulletins". In general, Microsoft did stop publishing from their traditional, hand written format a while back.
The closest you get this is sort of thing now, which is completely automated and frequently wrong, and assumes you know what CVE you were searching for.
One of the bigger vulnerabilities in recent times was Printnightmare, where they did write ups like this due to visibility. I don't feel it actually says much.
There were a lot of Twitter threads about the shitstorm that I can no longer find back when all their bulletins changed formats, but the general reason was moving their "good" bulletins behind an E5 license. Which again, I know some people consider "professional".
So to actually answer your question, here's a screenshot from a paywalled security bulletin. You can see from the scrollbar I'm near the top, and the "Recommendations" are all Defender features (with "apply patch" almost a hidden detail). The statement about configuring AMSI is not a Sharepoint recommendation, it's a Windows security feature originally tied into Defender.
And everything from here on in this security bulletin on to Sharepoint vulnerabilities - of which very little useful technical information is presented - is about Defender.
Of course, not just the EDR, the first point is about EASM, a feature licensed on top of Defender. The detection hunting details further down require a P2 license on top of that to be able to use.
Despite all that, it's not a fair comparison. I can't find anything in the E5 portal that is a reflection of this thread, where MS respond to a backdoor people are installing on their own.
Thanks for taking the time to elaborate... and for the insights! I don't know why my initial post is received that aggresively, maybe I miscommunicated something.
I only know the mostly autogenerated MSN Developer Resources. not helpful.
You can use tr to replace the pattern [A-Z] with [a-z]
That said, if this unix game wants to showcase the great usability and pragmatism of unix pipes, it has the adverse effect on me. While I like the flexibility of plaintext pipes, I really wish there was a Linux shell that tries to be a bit like powershell without the opinionated powershell syntax... maybe there is?
reply