Good to know, I’ll search some out. Thanks!
Good to know, I’ll search some out. Thanks!
Finitebanjo is right. Yes they are used to fight spam and bots but they way they do it us is picked intentionally to train ai.
https://medium.com/@yennhi95zz/how-google-trains-ai-with-your-help-through-captcha-876cb4eb4d01
Also from the Wikipedia article “Google profits from reCAPTCHA users as free workers to improve its AI research.” https://en.m.wikipedia.org/wiki/ReCAPTCHA
How do you do that?
Fantastic for protein shakes too
Closer to the speed of sound than the speed of light. But still a dang quick wave of blood coming at you!
I mean at that point wouldn’t it make sense to get a private bank loan to pay off the other loan with a much lower interest rate?
Just look at them, they are clearly extraterrestrial!
Neither does window. A file deletion did not cause this. A human at Crowdstrike uploaded a bug to production. Bugs in production can happen on any OS, this is just a terrible, terrible look for Crowdstrike because they seriously messed up
Two quick points, given the massive impact of this eveny it is clear to say many critical systems run windows. Meaning them being windows doesn’t make them any less “actual computers”.
Also, the OS in this event is irrelevant. They could have botched an update to their Linux version and crashes all the Linux boxes leaving windows untouched. This was not a result of an issue of any OS but a bad update.
I need to find my forg
Really cool idea! I agree on the whole most people are incredibly nice and will go out of their way to explain their reasoning. But a small, loud group seems to crop up in political discussions. It’s interesting because it’s not always they they don’t know they’re being rude, but rather they know and are proud of it because of their beliefs.
Could you guess at how many chickens in total you could expect to hatch with a full inventory of eggs?
They absolutely gained unauthorized access to the data. Their access was not intended or sanctioned. If it was intended to be public and accessible like it was, this wouldn’t be a story and they wouldn’t have locked down the access.
They absolutely exploited unintended functionality. If this was intended, they wouldn’t have added rate limiting and locked down the api after. It was clear to say this was certainly not an intended use of the api.
In a video game for example, if there is a an item that caused excessive lagging just by placing the item. Placing a lot of them with the intent to lag the game would be an exploit. They only used items sanctioned by the game, but for unintended reasons and they would likely be banned for exploitation.
They gained unauthorized access. From that guys definition that is a hack, no an exploit
Not a good time to be a whistle blower it seems
Sounds great!
I too see the broken icon. Just a white clip art image with a triangular exclamation mark warning sign over it.
How’d you brew it?
Did you get your pi hole set up?