If I don’t give it any permissions, does it actually do anything though? They only run when the app is open I assume?
If I don’t give it any permissions, does it actually do anything though? They only run when the app is open I assume?
Ah! Your using Kanban then!
Someone has a compiler if statement left somewhere in their code (… probably)
Do the slots share lanes?
If you remove the last drive and try again is it any faster?
A) discord
B) make friends with one person that does this or plays with other groups, then join them when they are playing with others
It’s probably a single dev that made the decision, then moves onto something else. They (probably?) don’t have the ability to just raise a recurring PO etc to easily pay you and don’t care enough to worth through the paperwork.
If you had a paid licencing model they may have done it, or just found another lib/ wrote their own.
The main thing to look for with motherboards (other than CPU compatibility) is the ports it has. Number/type of usb ports, ethernet speed etc. that’s most likely to be the thing that annoys you if you buy the wrong one.
(PCIE expansion cards can fix most problems there though if needed)
You can probably get the URL for a companies SharePoint pretty easily, but you need a login. You are able to get a PAs credentials through a phishing link etc but need the 2fa code.
You do the IT phishing attack (enter this code for me to fix your laptop being slow…), get them to enter the code and now you have access to a SharePoint instance full of confidential docs etc.
I’m not saying it’s a great attack vector, but it’s not that different to a standard phishing attack.
You could attack anything that’s using the single sign on. Attack their build infrastructure and you now have a supply chain attack against all of their customers etc.
It helps but its not enough to counter the limits of human gullibility.
It requires the bad guy to go to the page and ask the user to enter the code the bad guy gets
It’s not that different is it? You still need to get a user to share/enter a live code?
From a practical PoV - most people have their phone on them all the time. A work phone or a physical token can (and will) get forgotten, a personal phone much less.
Bad actor goes to super secret page while working on ‘fixing’ and issue for the user. They then get the 2 digit request code and ask the user to input it to ‘resolve’ the issue.
Mostly the same as any other 2fa social engineering attack I guess, but the users phone does display what the code is for on the screen which could help… But if your falling for it probably not.
They said that the option to use other authenticators were disabled by their company
The ms authenticator works in ‘reverse’ in that you type the code on the screen into the phone. I assume this is preferable to corporate as you can’t be social engineered into giving out a 2fa token. It also has a “no this wasn’t me” button to allow you to (I assume) notify IT if you are getting requests that are not you.
I don’t believe that the authenticator app gives them access to anything on your phone? (Happy to learn here) And I think android lets you make some kind of business partition if you feel the need to?
Dammit, I came here to make that comment!
A niche subject just makes it easier to be in the top 25%
Humorous questions on the survey probably are though
This posts entire comment chain is an interesting example of people that have extensive knowledge in completely different areas of programming to me. And have some concepts I had never heard/thought of.
You can trivially copy and ebook though, so can’t prove deletion.
It’s the only time that tabs Vs spaces really riles me up. So annoying when everyone has different tab lengths