![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
The bottom bar ain’t staying though if everyone does it.
The bottom bar ain’t staying though if everyone does it.
Well from a professional here: It is.
A missing rate limit is a vulnerability, or a weakness, depending on the definition. You’re playing smart without having an idea of what you’re talking about. Here you go:
https://cwe.mitre.org/data/definitions/799.html
YouTube videos are public, and as such it’s not really hacking. If you were able to download private videos, for example, it would be a vulnerability like “Improper Access Control”. It does not matter in the least whether you use an “exploit” in your definition (which is wrong) or “just increment the video ID”.
The result is a breach of confidentiality, and as such this is to be classified as a “hack”.
There are wave lengths that you cannot perceive, like, I don’t know… UV, maybe?
Meatbags gonna meatbag.
Right, because fuck paying for proper journalism. Everything must be free!
Remind me again, how does that work?
Yeah, go read a book or something.You have no idea what you are talking about.
That’s not an unpopular opinion, it’s an outrageously stupid and uninformed one and you should keep it to yourself.
So?
With Gemini you can let it show you search results for (some) of its statements. It’s useful for cross-checking: I was, for example, researching plastics recycling and there was a claim that seemed untrue and corporate. The automagic search/source function for that statement led me to a blog post of some consortium/lobbying group of manufacturers. After telling that to Gemini it apologized and compiled a list of different view points for that specific statement.
I was pretty impressed with that, and I find it very useful for researching topics I know basically nothing about. Of course it’s not the sole source of truth.
That’s not how this works. Maybe if you get some business consultants, but this ain’t it. Just because you hire them yourself, doesn’t mean that they’ll fall in line with your wishes.
deleted by creator
That page isn’t even geo-blocked 😁
It’s not as vulnerable but it still is.
Interestingly, Android is the only operating system that fully immunizes VPN apps from the attack because it doesn’t implement option 121. For all other OSes, there are no complete fixes. When apps run on Linux there’s a setting that minimizes the effects, but even then TunnelVision can be used to exploit a side channel that can be used to de-anonymize destination traffic and perform targeted denial-of-service attacks.
Definitely Signals Music Studio. Really great guy and an excellent guitar teacher for harmony and song writing stuff.
He puts out a lot for free so I feel more than justified to send some money his way - his teaching has been instrumental (heh) for my progress and understanding of music.
I had a colleague at work years ago who did his Master’s thesis on network scanning. He ran a PoC in the company’s network and had all the printers print hundreds of pages.
We learned that printers suck and that we should always know our payloads and targets 😁
Check out openvas.
https://github.com/greenbone/openvas-scanner
I use Nessus professionally, they are somewhat similar. I can’t decide which one has the worse user interface.
I’m a big fan of hashcat for this use case myself! I route it through WS, however. I like being on the bleeding edge.
I never cared about discord so I don’t know, but I’d assume so, yes.
Yeah, most effective illegal hackers are working for intelligence agencies or criminal organizations. The legal ones work for companies.
The ones “for the people” are very few.