I guess I’m chaotic good when I’m not just listening to audiobooks, but I like to find a Magic card that fits the general vibe of the book.
For example, I chose Lost in a Labyrinth for House of Leaves
I guess I’m chaotic good when I’m not just listening to audiobooks, but I like to find a Magic card that fits the general vibe of the book.
For example, I chose Lost in a Labyrinth for House of Leaves
With the US, there is also a culture problem to address. There are way too many people there that make 2A their whole personality.
Australia had its share of gun nuts, but they were both a small minority and didn’t have a whole lifetime of indoctrination telling them to prepare for the day the government will come for their guns
I disagree about TotK being a bad sequel, but I 100% agree that it should have been a new franchise. TotK returned to the same map, but with a twist and a whole new set of tools to explore with, plus 2 new massive areas.
You’re spot on with Echoes of Wisdom though. It’s hard to avoid using beds and water blocks as the solution to every movement puzzle and it’s hard to avoid just using whatever Lv3 mob you have as a solution to all the combat.
Protonmail is definitely more private than google or Microsoft, but you shouldn’t hold 100% trust in any provider. Ultimately your data is still on their hardware and they have control of it. Also, as others have pointed out, both sides need to be secure otherwise all that data is accessible on the other side.
You can mitigate it yourself a bit by hosting your own email server, but I highly recommend against that as its a massive headache to secure and basically every provider will reject your messages anyway.
Right attitude, wrong solution.
Email is very much not private
Ultimately, in terms of security, you’re likely to find that both are similarly good.
What makes Firefox desirable over Chrome is that it’s not beng developed by massive corporation that gets the majority of its profits selling user data and delivering targeted adverts.
The other thing that may act as a deciding factor is the “MacOS doesn’t have viruses” effect. Wherein that because firefox has such a small userbase in comparison to chromium, it’s far more profitable to find exploits in chromium.
Just get better at hunting. You go out for hours at a time and never come back successful.
It’s a good thing that the pantry always has food, otherwise we’d be in trouble.
Oh yeah, Project management is one of those roles that is especially vulnerable to the Peter Principal.
In order to be a good one, you need to be part therapist and part hostage negotiator while also being one of those weirdos that enjoys meetings
A few competent project managers would probably help things quite a bit, actually.
Having a single point of contact for several disparate teams of people doing real work so that they can actually do that work, instead of spending extra time in endless meetings arguing over the best way to implement something that requires multiple people’s input is a valuable tool to have.
Think of them like a tank in an RPG, taking all the meeting hits that would otherwise decimate the effectiveness of people actually putting the real work in.
Sure, but an average user is not going to know to check for the URL protocol. It’s still incredibly effective for phishing
You’ve got half of it. The hacker’s server is acting as a middleman for the real login page. Everything appears legitimate except the URL will be wrong and if you use a password manager, it won’t auto-fill
They access the legit login page and forward it to you, but they’re in the middle capturing everything you send.
When you enter your login details, they will record them and then forward them to the real login window in near real time, effectively logging in as you. They then have a legitimate session token which they can use to access your account without needing to re-authenticate.
An attack using this tool does require that the user actually logs in, but because they’re just acting as a proxy for the real login page, the only way you’d spot the difference is if the URL doesn’t match (or that your password manager doesn’t auto-fill)
However, it’s pretty easy to see that someone would be fooled by that as you’d expect to need to confirm your identity when adding a gift card to your steam account.
Typically, with scams like this, the attacker is using a tool like Evilginx.
The way this works is that Evilginx runs on a server that the hacker controls and will request the login page from whatever service they are targeting(Discord, Steam, Google, etc) and then serve it to you as a proxy. It looks entirely legitimate unless you make sure to very closely check the URL.
Once you login, it will take a copy of your Username, your password, and your session token(the thing that lets Discord know it’s you so you don’t need to login again after every refresh). and suddenly the attackers now have access to your account to do whatever they want with it.
Discord should absolutely prevent modifying links in this way specifically for this reason, but good practice as a user is to hover over every link and make sure it’s pointing where it’s supposed to. Don’t click on anything that looks suspicious.
Good. Ad blocking is security and anyone that tells you different both doesn’t care about your computer security, and also wants to sell you something.
That 2/3 to 3/4 of computer programmers, computer security experts and advertisers seems low. I feel like that should be closer to 90%
It can also happen if your password expired. Active Directory is infamous for just locking accounts if your user doesn’t change their password when they get the popup that it expired