Hacker Newsnew | past | comments | ask | show | jobs | submit | economyballoon's commentslogin

This must be optional?

Otherwise this is ridiculous.

EA can really do everything and still the games are bought.


I am sorry but what is "300 Go RAM" 300 Go? I only know GB/GiB.


OP is probably French or his native tongue is French. Byte is “Octet” in French and typically you’ll see Go = Gigaoctet which is the same as GB.


Also more technically correct as byte never "officially" meant 8 bits, but octet is unambiguous.


<troll>like measuring lengths in meters</troll>


It's basically French for GB (Go = Gigaoctet)


you can even download the untreated wave files


Is this Web4?

Time to free the web again. An we thought Web3 is nonsense :(



Thanks for the link. OP video is blurry, and starts at 29:42 of this video. This video is better quality, also.



SolarWinds’ Customers

SolarWinds’ comprehensive products and services are used by more than 300,000 customers worldwide, including military, Fortune 500 companies, government agencies, and education institutions. Our customer list includes:

    More than 425 of the US Fortune 500
    All ten of the top ten US telecommunications companies
    All five branches of the US Military
    The US Pentagon, State Department, NASA, NSA, Postal Service, NOAA, Department of Justice, and the Office of the President of the United States
    All five of the top five US accounting firms
    Hundreds of universities and colleges worldwide
Partial customer listing: Acxiom | Ameritrade | AT&T; | Bellsouth Telecommunications | Best Western Intl. | Blue Cross Blue Shield | Booz Allen Hamilton | Boston Consulting | Cable & Wireless | Cablecom Media AG | Cablevision | CBS | Charter Communications | Cisco | CitiFinancial | City of Nashville | City of Tampa | Clemson University | Comcast Cable | Credit Suisse | Dow Chemical | EMC Corporation | Ericsson | Ernst and Young | Faurecia | Federal Express | Federal Reserve Bank | Fibercloud | Fiserv | Ford Motor Company | Foundstone | Gartner | Gates Foundation | General Dynamics | Gillette Deutschland GmbH | GTE | H&R; Block | Harvard University | Hertz Corporation | ING Direct | IntelSat | J.D. Byrider | Johns Hopkins University | Kennedy Space Center | Kodak | Korea Telecom | Leggett and Platt | Level 3 Communications | Liz Claiborne | Lockheed Martin | Lucent | MasterCard | McDonald’s Restaurants | Microsoft | National Park Service | NCR | NEC | Nestle | New York Power Authority | New York Times | Nielsen Media Research | Nortel | Perot Systems Japan | Phillips Petroleum | Pricewaterhouse Coopers | Procter & Gamble | Sabre | Saks | San Francisco Intl. Airport | Siemens | Smart City Networks | Smith Barney | Smithsonian Institute | Sparkasse Hagen | Sprint | St. John’s University | Staples | Subaru | Supervalu | Swisscom AG | Symantec | Telecom Italia | Telenor | Texaco | The CDC | The Economist | Time Warner Cable | U.S. Air Force | University of Alaska | University of Kansas | University of Oklahoma | US Dept. Of Defense | US Postal Service | US Secret Service | Visa USA | Volvo | Williams Communications | Yahoo

I still dont get it. Why are high profile companies still fully connected to the internet? Makes no sense. If I am not connected to the internet X cant hack me via the internet. $logic.


what does "None of the tools contain zero-day exploits" exactly mean? Does the tools contain knows zero-days but not non public zero days?


It just means all the exploits are for vulnerabilities that have been published already.


Doesn't being known preclude them from being zero days by definition?


In the 'zero-day' and related terminology the days start counting from the time when a fix is available. It refers to how much time a defender has had to fix their systems, a zero-day implying that even the most prudent defender could not have prevented the attack; and a day-1 (or day-x) attack implying that the defender might have closed the vulnerability if they had been sufficiently fast in monitoring for the existence of the problem and fixing their systems.

So there certainly could be zero-day exploits for vulnerabilities that are known but not yet fixable, perhaps because the vulnerability did not seem easily exploitable and thus not urgent to the vendor.


Or no exploits at all, ie. post exploitation frameworks, control channels etc. only.

EDIT: Nevermind they added something to the countermeasures repo that goes against that.


I would have thought it would mean that any exploits which are used have widely available patches.



Nice find!

I wonder if the people removing articles on fictional works are moving it to Wikia by themselves.


Also here we can see: a machine, in this case a tractor, has to be more complicated in the future to ensure economic growth and to rise added value.


Maybe its a trick by TESLA to force the owners to buy solar roofs and powerwalls. This lets the economy grow. Just a little bit.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: