My favorite single moment so far was the conclusion of the battle between Luffy and Boa Sandersonia.
It really highlights that Luffy is not willing to act against his principles, even if it would further his goals.
Best arc though is a tossup between Arlong Park or Impel Down. Arlong Park has had the best character writing in the series so far, and Impel Down has the highest stakes.
I’m currently going through the One Piece manga for the first time and I’m having a blast.
I’m in the middle of Punk Hazard right now and it’s starting to drag on, but I’m told that everything gets way better afterwards.
I’m not sure I necessarily agree. Your assessment is correct, but I don’t really think this situation is security by obscurity. Like most things in computer security, you have to weight the pros and cons to each approach.
Yubico used components that all passed Common Criteria certification and built their product in a read-only configuration to prevent any potential shenanigans with vulnerable firmware updates. This approach almost entirely protects them from supply-chain attacks like what happened with ZX a few months back.
To exploit this vulnerability you need physical access to the device, a ton of expensive equipment, and an incredibly deep knowledge in digital cryptography. This is effectively a non-issue for your average Yubikey user. The people this does affect will be retiring and replacing their Yubikeys with the newest models ASAP.
Absolutely. If you are the CISO in a place where security is a top priority with adversaries that may have access to the equipment and knowledge to exploit this, you will absolutely want to retire the keys ASAP and replace them with the new model that is not vulnerable to this.
This started happening to me more and more after I hit my 30s, and it stopped happening once I started taking a daily multivitamin.
I’ve yet to find a better controller than the DS4.
It has the perfect feel in the hands. And with Steam’s controller support, Ive yet to have an issue with functionality or button remapping(I haven’t played crosscode, so no info there)
This game is awful
Sure, but an average user is not going to know to check for the URL protocol. It’s still incredibly effective for phishing
You’ve got half of it. The hacker’s server is acting as a middleman for the real login page. Everything appears legitimate except the URL will be wrong and if you use a password manager, it won’t auto-fill
They access the legit login page and forward it to you, but they’re in the middle capturing everything you send.
When you enter your login details, they will record them and then forward them to the real login window in near real time, effectively logging in as you. They then have a legitimate session token which they can use to access your account without needing to re-authenticate.
An attack using this tool does require that the user actually logs in, but because they’re just acting as a proxy for the real login page, the only way you’d spot the difference is if the URL doesn’t match (or that your password manager doesn’t auto-fill)
However, it’s pretty easy to see that someone would be fooled by that as you’d expect to need to confirm your identity when adding a gift card to your steam account.
Typically, with scams like this, the attacker is using a tool like Evilginx.
The way this works is that Evilginx runs on a server that the hacker controls and will request the login page from whatever service they are targeting(Discord, Steam, Google, etc) and then serve it to you as a proxy. It looks entirely legitimate unless you make sure to very closely check the URL.
Once you login, it will take a copy of your Username, your password, and your session token(the thing that lets Discord know it’s you so you don’t need to login again after every refresh). and suddenly the attackers now have access to your account to do whatever they want with it.
Discord should absolutely prevent modifying links in this way specifically for this reason, but good practice as a user is to hover over every link and make sure it’s pointing where it’s supposed to. Don’t click on anything that looks suspicious.
I’m not sure what hardware you’re running, but with my motherboard, to get 4x4x4x4 out of a slot requires sacrificing GPU bandwidth from x16 to x8
to get 4x NVMe drives out of a single PCIe slot without bifurcation you need a card that has it’s own RAID controller. These aren’t cheap (think ~$500) as they are specialty hardware, but it’s a hell of a lot cheaper than a whole professional workstation or server.
My certs have all expired, but when I started I didnt have any at all.
The thing that worked for me was to apply to small businesses(Look into local MSPs). Places that have ~20 employees have much less rigor about certs and will more likely test that you’re amicable enough to mesh with the rest of the team. From there you can build experience and often get thr company to pay for your certs.
Not at all.
Unsolicited email is spam. It’s as simple as that. Dont feel bad about flagging them as such if they won’t respect your contact preferences.
There are loads of people out there that want stuff like this but dont have computer-related hobbies.
It makes perfect sense if you understand what you’re doing at each step, but if you’ve never used a command line before, each instruction would look like arcane gibberish.
They very likely dont have read or write access to the files on your device.
However, they probably do have the ability to remotely wipe the device. This feature is typically used in enterprise if a phone or laptop is lost or stolen to prevent bad actors from getting access to the data stored on the device.
I just glanced over the options it changes. From what I can tell it:
enables GPU rendering for some canvas2d options
doubles cache sizes for almost everything
disables some speculative prefetching
I cant imagine these options are making a 30% speed difference, outside of some very specialized tests. But, I also haven’t tried it so I could very well be wrong.
This is bad news for my productivity