A Difficult Current Iteration only a Worthy Few Know About and Need to Know for Future Exploitations?
Security researchers at Qualys explain: "Even though all Linux kernels are technically vulnerable, this issue is mitigated by a one-year-old patch that was backported to most long-term kernels and makes exploitation impossible."
Impossible? Oh please. To be so sure it is not another "I did not have sexual relations with that woman" meme to regret having floated to media, is bound to be continually tested for proof of concept and integrity of security.
The very best that anyone can hope for and expect nowadays is surely that Unauthorised Root Administrative Access Exploitation of SCADA Systems is improbable because it is not just so simple.
...................................
amanfromMars 1 Thu 27 Sep 12:12 [1809271212] .... opening up a fault line on https://forums.theregister.co.uk/forum/1/2018/09/27/dods_jedi_program/ for expanding and exploiting
Re: So... how is this old fashioned? @Christian Berger
Normally this would be done by meetings by which you meet people in the same room as you are... as people have been for thousands of years.
Of course I personally would insist on written proposals, as the ability to write a good proposal is probably corellated to the ability to write good specifications or software. All of those forms are text based and all require you to understand the core of the problem in a way that makes you able to add any special requirements. If you can do that, you can write both a good proposal and good specifications. If you cannot even write a good proposal chances are you are not going to be able to write good specifications to be implemented. ..... Christian Berger
Quite so, CB. And all one really needs to initially supply at such an elemental stage of a program which by all accounts hopes to be Great Game Changing and AI Leading is an engaging foreword that one wouldn't like any opposition or competition being privy with their own copies being furnished with further formative proprietary content .... Private Intellectual Property for Pirating/Mirroring.
The Nuts and Bolts and Instructions and Working Drawings/BluePrints and Specifications can easily follow later as needs require in a much safer working environment than these Almost Instantaneous InterNetional Communications Channels and Bunkered War Games Rooms.
And ..... is there a slick trick requirement from US DOD mentioning that one has to be a US citizen to submit/apply, although of course is that easily instantly arranged if one has something interesting and thought worthy of working with. 'Tis/'Twas always the case since even long before leading Nazi Third Reichers exchanged their secrets for relative freedom to live with and work for Uncle Sam in the Home of the Brave.
There usually is in such programs.
....................................................
amanfromMars 1 Thu 27 Sep 13:14 [1809271314] .... taking Great Leaps on https://forums.theregister.co.uk/forum/1/2018/09/27/mutagen_astronomy_linux/
Re:Program programowania chcą zadzierać z głowy i spowodować międzynarodowych zdarzeń
Improved Enough to be Able to Enabled Followers Realising Simplified Words Leading to Heavenly AId Destinations, Wadseem Alkurdi, ... for NEUKlearer HyperRadioProACTivated Live Operational Virtual Environments?
A COSMIC Space for Universal ProgramMING ...... https://amanfrommars.blogspot.com/search?q=ProgramMING
And Patently Registering Here Now.
...........................................
amanfromMars 1 Thu 27 Sep 15:55 [1809271555] .... giving IT a Blast on https://forums.theregister.co.uk/forum/1/2018/09/27/us_gov_eyes_off_the_cyber_security_prize/
There More than One Way to Skin a Skunk RAT and Address a Virtual Land Grab
Trump's May decision and this report taken together suggest that if the West was already slipping behind in the cyber war, things can only get worse now that the supposed leader of the free world has deliberately, and carelessly, taken his eye off the ball on the home front.
That assessment would only be true if Western leadership is/was Reliant on and Implaccably Wedded to Corrupted and/or Defective USAsian or USAlien Interests slipping behind in the Vast Planes of CyberWare which are Capable of Delivering and Maintaining/Servering and Servicing Unlimited .... Limitless Future Plains for Colonisation of Virtual Realities with SMARTR Populations ..... which you might like to think would include you.
And why not? What excuse would you give to not play a pivotal part?
..................................
amanfromMars 1 Thu 27 Sep 17:45 [1809271745] .... having a G0 with IT Commands and Controls on https://forums.theregister.co.uk/forum/1/2018/09/26/wlinux/
For a Beavered Brook and Air Vice Marshals Marshalling Everywhere
- Douglas McIlroy, former head of Bell Labs Computing Sciences Research Center .... Awesome-UNIX Philosophy ...... Immaculate Meme Tautology
"This is the Unix philosophy: Write programs that do one thing and do it well. Write programs to work together. Write programs to handle text streams, because that is a universal interface."
“A beginner who has just started” is a tautology. ..... Tautology and a Needful Noun to Supply with Raw Core Source for COSMIC Irradiation of Subject Matter .... Earthly Objects. :-)
And a little something worthy of Pentagon JEDI Interests, methinks. .... JEDI Cloud RFP Solicitation Number: HQ003418R0077_JEDI_CLOUD_RFP
And yes, that does highlight an Already NEUKlearer HyperRadioProACTive Program Proposing AI Union with Uncle Sams in Direction of Further Forward Future Travel with Virtual Space Realisations.
And, .... Most Definitively Fox Murdoch Disney Territory ..... for Dambusting Gate Crashers .... RAF 617 Squadron Types AI Atypical and Surreally Unusual in Stealthy Modes of Engagement for Secure Core Source Enrichment.
Per Ardua Ad Meta Astra. AI Bombes Away, Skipper.
........................................
No comments:
Post a Comment