dotdi

joined 1 year ago
[–] dotdi@lemmy.world 18 points 14 hours ago (2 children)

It’s the Data Science craze all over again. Hope we’re done with this soon.

[–] dotdi@lemmy.world 3 points 3 days ago

Same. I use it on desktop too

[–] dotdi@lemmy.world 16 points 1 week ago

Tor itself was not breached. Rather, the suspects were using an outdated, long-retired app that did not employ some of the protections that are now available, and this, in turn, allowed investigators to carry out the attack.

[–] dotdi@lemmy.world 45 points 1 week ago (1 children)

Als jemand der jahrelang über einer Familie mit 2 Kettenrauchern gewohnt hat, und dessen Balkon bzw. alle Fenster auf der selben Seite wie der Balkon unbenutzbar waren: bitte, bitte strengere Maßnahmen gegen Raucher.

[–] dotdi@lemmy.world 15 points 3 weeks ago

I said it before and I’ll say it again: we need to work harder so that this asshole can buy his 2nd yacht. Have some compassion.

[–] dotdi@lemmy.world 2 points 4 weeks ago

Hard drives (SSDs, etc) are not the only durable storage that can be written to

[–] dotdi@lemmy.world 312 points 1 month ago (43 children)

I am outraged, a plea deal to avoid life imprisonment? What the fuck did I just read?!

This guy trafficked, raped and tortured her, and other underage women. Police did jack shit. And she was supposed to be watching him just walk away? Grotesque.

[–] dotdi@lemmy.world 1 points 1 month ago

Best of luck everyone!

I would love to win one of the keys for the Final Fantasy VII Remake.

[–] dotdi@lemmy.world 1 points 1 month ago* (last edited 1 month ago) (2 children)

Yes, I have been eyeing a soft switch into cybersecurity. Maybe not head-over-heels and maybe not entirely, but I do plan to have a significant part of my work to be in infosec.

For context, I am currently working as Tech Lead/Software Architect for a company that has a security-focused product (with an, as of today, 0 incident track record), but I work on design and scalability most days. When involved in security-related tasks, I mostly coordinate and sometimes implement security critical code under the guidance of our (small) security team.

I do have enough insight to have a positive impact on security related discussions on higher levels (think “lol, this proposed change opens up the endpoint to being exploited by x or y”) but not enough to discuss our cryptographic primitives.

In order to get my feet wet, I started doing THM (quite actively, yet I’ve hit a rut with the Windows-focused buffer overflow rooms), and I can say I enjoy it more than I expected.

However, I am unsure what concrete steps I should take after THM.

I’ve been thinking of working towards the OSCP exam, but honestly the certification landscape is quite confusing.

[–] dotdi@lemmy.world 92 points 1 month ago

“It is difficult to get a man to understand something, when his salary depends on his not understanding it.”

― Upton Sinclair

[–] dotdi@lemmy.world 4 points 2 months ago (1 children)
[–] dotdi@lemmy.world 10 points 2 months ago (1 children)
view more: next ›