@pidooma multiple lifetimes worth of climbing in one shot.
Cybersecurity student.
@pidooma multiple lifetimes worth of climbing in one shot.
#question are there any colleges / high schools that do placement exams for computer science?
Currently (re)discovering every jungle breakbeat and drum 'n' bass album from the entire Playstation game catalog.
Honest: So, the end of Mr. Robot season 1 sucked. Does it get better?
Half-full: Cinematography and actors do a good job of portraying a mental break.
@infobex throw in intermittent mouse control inversion and window minimizations.
@omartwotone seriously though.... ska / rocksteady above 120 bpm is like THE MOST FUN to play drums to.
Should I be worried that I keep noticing typos and some formatting errors in my current study guide?
The previous version had some weird definitions, but it never missed on the grammar.
This current iteration did, however, come to its senses about what constitutes an 'insider threat,' and correctly label it as an intentional threat actor or accidental n00b.
Dream internship interview scheduled!!!!!! LET'S GO!!!!!!
@woFF you're totally right. I--admittedly--got it wrong because I have spent the previous three years with a different definition of 'insider threat.'
A huge reason why I meticulously re-read this subject matter is to understand the outfit's terminology. 'Insider threat' was said to "... imply malicious intent." I know that I define it differently but I'm not taking my own test in a couple of weeks!
Interesting stance to a study guide question, in that, a ransomware attack "... was the result of a new employee ...," and the "vulnerability" was "Untrained User" and not "Insider Threat."
I see a way to delineate between the two but one still encompasses the other.
Quality humor in my CompTIA Sec+ Study Guide:
"... comparing ports and ports ... [similar to] the old joke about the meaning of 'secure.' The Secretary of Defense directed members of different services to 'secure that building.'
- Navy personnel turned off the lights and locked the doors.
- The Army occupied the building and ensured no one could enter.
- The Marines attacked it, captured it, and set up defenses to hold it
- The Air Force secured a two-year lease with an option to buy."
just to attach a more definitive pin / explanation to my above question: C Startup Code or crt0 (C Runtime Libraries)
https://www.bravegnu.org/gnu-eprog/c-startup.html
https://learn.microsoft.com/en-us/cpp/c-runtime-library/crt-library-features?view=msvc-170
https://learn.microsoft.com/en-us/cpp/c-runtime-library/c-run-time-library-reference?view=msvc-170
@alyssam_infosec I literally just *paused* my BS because of this issue.
@alyssam_infosec to my knowledge, since the May '21 E.O., Google has been one of the only big-tech entities to put forth a program designed for academia intended to be a metric for IT skills. Have there been others? Should there be others which were already established we should be aware of?
@cbleslie I highly recommend the music of Yves Montand. Imagine a "50's, French musician" and his discography sounds every bit as you'd expect.
@cyberkaida this is much appreciated! I am glad to see Thunk exists outside Ghidra as I am building my CompSci vocabulary more and more. Thank you.
Thank you to everyone involved with https://godbolt.org/
@kevinthomas if you ever need a drummer I'm down.
@cbleslie fractions of carry/overflow are the same types of crimes that showed up in 'Computer Abuse' from the early 70's. Literally some of the first recorded cybercrimes in the USA.
@rewzilla any insight into this @realhackhistory?