Shared posts

24 Dec 15:08

[LPT] You DO NOT need to give answers to questions that HAVE NOT been asked. Stop the need to explain yourself before someone asks you to. Keep it Simple. Over explaining all of the time can be seen as a sign of weakness. It can get you into unnecessary situations that could have been avoided.

by /u/ThatWayi3ear

This applies is any situation whether it's in the workplace, with family, with the law. Of course, there are situations that you might need to explain yourself before asked, if it's going to affect your life, job, or freedom but ultimately you don't owe anyone anything. Over explaining all of the time can be seen as a sign of weakness. It can also get you into unnecessary and avoidable situations.

submitted by /u/ThatWayi3ear to r/LifeProTips
[link] [comments]
16 Oct 13:52

Must be some damn good beer [Dumbass]

06 Mar 15:34

Thieves Steal 600 Computers Used To Mine Bitcoin

by Tyler Durden

Approximately 600 computers in Iceland used to mine bitcoin and other cryptocurrencies were stolen from data centers in what has been dubbed the "Big Bitcoin Heist."  Eleven people including a security guard were arrested following four separate heists, according to Fortune. Two of the suspects were ordered to remain in custody by a Reykjanes District Court judge while the rest were released. The name of the company involved in the thefts have not been reported. 

Three of the burglaries happened last December, and the fourth occurred in January. Authorities kept the incidents under wraps while their investigation was ongoing. 

Bitmain mining farm near Keflavik, Iceland (Reuters/Jemima Kelly)

The computers are worth nearly $2 million - however the potential value of the untraceable cryptocurrencies they could produce makes the heist quite a bit more lucrative. 

"This is a grand theft on a scale unseen before," said police commissioner Olafur Helgi Kjartansson. Two of the burglaries took place in his district on the southwestern Reykjanes peninsula. "Everything points to this being a highly organized crime."

Cryptocurrency mining in Iceland has boomed in the last several years - so much that the "mining industry" is projected to use approximately the same 100 mW in 2018 as the entire 334,000 population of the island nation.

Low electricity costs in the North Atlantic from and abundance of renewable energy along with naturally icy temperatures that keep GPUs cranking along at peak efficiency make Iceland an attractive location to mine cryptocurrencies.


Although expensive, mining hardware must be kept cool so as to prevent overheating. Utilising Icelands natural elements, the exteriors of mining facilities are deliberately only partially constructed; providing huge financial savings.

Iceland police has called on local ISPs, electricians and storage space owners to report any unusual requests for power. 

29 Jun 13:07


by nedroid


16 Nov 19:27

John Oliver on the "Fucking Assholes" Who Attacked Paris

by Jay Hathaway on Morning After, shared by Jay Hathaway to Gawker

Whenever The Daily Show’s Jon Stewart had to report on a tragedy like Friday’s terrorist attacks on Paris, he would temporarily drop the jokes and speak candidly. Serious Jon was a little jarring to watch, at least the first couple of times, and that successfully conveyed the gravity of situation.

But Jon Stewart was on Comedy Central. John Oliver is on premium fucking cable, which gives him access to high-quality HBO-level cusses. So fuck it, he can say what he wants: The Paris attackers were fucking assholes.

[Last Week Tonight]

27 Oct 05:49

Alphabet Prepares to Spend More On Its Riskiest Projects: Google’s new parent company, Alphabet, warns investors it will invest more in long-term “bets” on breakthrough technologies.

02 Oct 07:15

Male domestic violence victims 'often arrested due to false accusations by their abusers'

02 Oct 07:11

Pornography users found to be more supportive of women and hold less sexist views than nonusers in representative US sample

27 Aug 20:02

“Spookiness” Confirmed by the First Loophole-free Quantum Test



21 Aug 15:10

Companion Helps You Stay Safe When You're Walking Somewhere Alone

by Kristin Wong

Walking alone at night can be dangerous, but with an app like Companion, you can use your smartphone to stay a little safer.


24 Jul 02:14

US Company Takes First Steps Towards Mining Asteroids In Space

09 Jul 22:06

That Government Hack Was Much, Much Bigger Than Initially Reported

by Gabrielle Bluestone

That Government Hack Was Much, Much Bigger Than Initially Reported

ABC News reports that at least 25 million people were affected by the recent Office of Personnel Management hack—more than six times the number originally reported by authorities.

The government’s apparent explanation for the wildly disparate reports is that they counted the breach as two hacks, the larger of which they considered to be a “separate but related” issue that was still “under investigation” at the time. Via ABC:

At the time, OPM only disclosed that the personnel records of 4.2 million current and former federal employees had been compromised.

But there was little doubt — at least privately –- that the universe of victims was vastly bigger because the hackers had access to far more than personnel records, including files associated with background investigations and information on government workers’ families.

In fact, the hackers allegedly rummaged through various OPM databases for more than a year — and lawmakers and U.S. officials alike have described the breach as a significant threat to national security.

It’s still unclear how many Americans were actually affected (most reports cite anonymous sources) but Politico says it’s actually more like 21.5 million because some identities were essentially hacked twice. Either way, it’s clear the government drastically underreported the extent of the damage.

And it wasn’t just basic information—the hackers got away with highly sensitive documents that include “military records and veterans’ status information, address, birth date, job and pay history, health insurance, life insurance, and pension information; age, gender, race data,” plus reportedly unencrypted social security numbers.

The breach reportedly began in 2013 when hackers obtained credentials through an employee of a government contractor, KeyPoint Government Solutions. It wasn’t detected until April, ABC reports.

Contact the author at

08 Jul 18:51

Hacking Team's Lame Excuse for Selling Digital Weapons to Sudan

by Kate Knibbs on Gizmodo, shared by Leah Beckmann to Gawker

Hacking Team's Lame Excuse for Selling Digital Weapons to Sudan

Hacking Team, the company now equally known for selling intrusive spyware to governments and getting royally hacked, has words for people who disagree with its habit of peddling powerful cyberweapons to regimes with terrible human rights records: What’s a “repressive” regime, anyway?

I asked Hacking Team if someone would speak directly to its reputation for selling its remote access spyware—which lets law enforcement and governments turn on webcams, record phone calls, steal files, and track messages—to repressive regimes. US spokesperson Eric Rabe informed me that it’s all relative:

This issue may appear to be simple. In reality it is a complicated one for several reasons. For one thing, some have labeled certain long-time allies of the West “repressive.” Furthermore, it happens that governments change, and, therefore they become more or less criticized over time.

Hacking Team’s excuse for its eccentric roster of clients basically boils down to “you say terrorist, I say freedom fighter, nothing matters lol.” Just because some fuddy-duddy activist group like the UN puts LABELS on a government doesn’t mean it’s necessarily “repressive,” you hippie. Which explains why Hacking Team decided to sell spyware to Sudan’s intelligence service in 2012, even though UN sanctions prohibited the sale of weapons, including digital weapons, at that time.

(The leaked emails show that Hacking Team halted sales to Sudan in 2014, after pressure from a UN panel monitoring the implementation of weapons sanctions in Sudan.)

But wait, there is more excuse:

Finally, even some governments that are deeply criticized by some activists may have a very legitimate need for our technology. For example, such a state, though the focus of activist anger, may also be a breeding ground for terrorists. The technology provided by HackingTeam is particularly useful in detecting and prosecuting terrorists.

Ah, gotcha, cool cool. So when Hacking Team decided to renew its license with Ethiopia’s Information Network Security Agency even after the INSA was discovered to be using the software to spy on journalists, it was because INSA also wanted it to fight terrorists...except INSA categorized the journalists as terrorists...

This muddled official excuse is similar to the line of thinking Hacking Team CEO and co-founder David Vincenzetti put forth in one of his leaked emails to a colleague, where he complains about the negative press Hacking Team receives for its clientele:

“I have a question for you all: PLEASE NAME a single really ‘democratic’ country, a country which does not violate anybody’s rights and has a TOTALLY clean human rights record,” he wrote.

If you’re looking for more gems like that, a non-profit called Transparency Toolkit has made the entire trove of leaked data available online for download. We’ll be combing through over the next few days, but if you find anything worth checking out, let me know in the comments, or email me.

Contact the author at
Public PGP key
PGP fingerprint: FF8F 0D7A AB19 6D71 C967 9576 8C12 9478 EE07 10C

01 Jul 22:21

How IKEA Patched Shellshock

by samzenpus
jones_supa writes: Magnus Glantz, IT manager at IKEA, revealed that the Swedish furniture retailer has more than 3,500 Red Hat Enterprise Linux servers. With Shellshock, every single one of those servers needed to be patched to limit the risk of exploitation. So how did IKEA patch all those servers? Glantz showed a simple one-line Linux command and then jokingly walked away from the podium stating "That's it, thanks for coming." On a more serious note, he said that it took approximately two and half hours to upgrade their infrastructure to defend against Shellshock. The key was having a consistent approach to system management, which begins with a well-defined Standard Operating Environment (SOE). Additionally, Glantz has defined a lifecycle management plan that describes the lifecycle of how Linux will be used at Ikea for the next seven years.

Share on Google+

Read more of this story at Slashdot.

04 Mar 00:09

Flaw In GoPro Update Mechanism Reveals Users' Wi-Fi Passwords

by timothy
An anonymous reader writes A vulnerability in the update mechanism for the wireless networks operated by GoPro cameras has allowed a security researcher to easily harvest over a 1,000 login credentials (including his own). The popular rugged, wearable cameras can be controlled via an app, but in order to do so the user has to connect to the camera's Wi-Fi network. Israel-based infosec expert Ilya Chernyakov discovered the flaw when he had to access the network of a friend's camera, but the friend forgot the login credentials.

Share on Google+

Read more of this story at Slashdot.

07 Feb 00:46

Ask Slashdot: With Whom Do You Entrust Your Long Term Data?

by Soulskill
jppiiroinen writes: F-Secure, a company based in Finland, has sold its cloud storage business to a U.S. company (Synchronoss Technologies, Inc) speculated to have ties to the NSA. In previous, public announcements, they used arguments equivalent to, "trust us, your data will be safe." Now, it's likely F-Secure simply realized that competing against the big players, such as Google and Dropbox, didn't make much sense. But it makes me wonder: Whom do you trust with your data? And who really owns it? What about in 3-6 years from now? How should I make sure that I retain access to today's data 20 years from now? Is storing things locally even a reasonable option for most people? I have a lot of floppies and old IDE disks from the 90s around here, but no means to access them, and some of the CDs and DVDs has gone bad as well.

Share on Google+

Read more of this story at Slashdot.

05 Feb 01:07

Why the "Internet As a Utility" Is Good for Net Neutrality

by Eric Ravenscraft

Why the "Internet As a Utility" Is Good for Net Neutrality

Today, the FCC officially announced that it will vote on whether to classify the internet as a utility under Title II regulations. Here's what that mess of jargon means and how it affects you.


29 Jan 20:36

FCC: Blocking Wi-Fi in hotels is prohibited: Marriott asked the FCC to please let it block Wi-Fi. The hotel gets a firm answer -- "Persons or businesses causing intentional interference to Wi-Fi hotspots are subject to enforcement action"

05 Dec 20:37

On Reddit, it's more risqué to show your face than it is to show your butthole.

17 Sep 20:49

TIL New York's area code is 212 because it was the fastest number to dial on a rotary phone

01 Aug 01:31

A bridge's weight limit is more of a guideline than a rule. Most of the time [Scary]

08 Apr 17:55

Kissy Congressman Confesses to Texting Stranger: "I Messed Up"

by Adam Weinstein

Kissy Congressman Confesses to Texting Stranger: "I Messed Up"

Last night, after Rep. Vance McAllister (R-La.) publicly apologized for snogging, on surveillance video, in his congressional office, a staffer who was not his wife, he received a text from a stranger: "Hey bro. How's your day goin." For some inexplicable reason, he replied—at length.


07 Apr 14:51

First official climate change refugees evacuate their island homes forever, before they are washed away in 2015 [Sad]

27 Mar 21:48

Newlywed Wife Gets 30 Years in Bizarre Death Shove Case

by Michelle Dean

Newlywed Wife Gets 30 Years in Bizarre Death Shove Case

Today, a Montana federal court sentenced 22-year-old Jordan Graham to thirty years in prison for, well, there's really no delicate way of putting this: Shoving her husband of approximately eight days, 25-year-old Cody Johnson, off a cliff in Glacier National Park.



17 Feb 07:01

200-400 Gbps DDoS Attacks Are Now Normal

by Soulskill
An anonymous reader writes "Brian Krebs has a followup to this week's 400 Gbps DDoS attack using NTP amplification. Krebs, as a computer security writer, has often been the target of DDoS attacks. He was also hit by a 200Gbps attack this week (apparently, from a 15-year-old in Illinois). That kind of volume would have been record-breaking only a couple of years ago, but now it's just normal. Arbor Networks says we've entered the 'hockey stick' era of DDoS attacks, as a graph of attack volume spikes sharply over the past year. CloudFlare's CEO wrote, 'Monday's DDoS proved these attacks aren't just theoretical. To generate approximately 400Gbps of traffic, the attacker used 4,529 NTP servers running on 1,298 different networks. On average, each of these servers sent 87Mbps of traffic to the intended victim on CloudFlare's network. Remarkably, it is possible that the attacker used only a single server running on a network that allowed source IP address spoofing to initiate the requests. An attacker with a 1 Gbps connection can theoretically generate more than 200Gbps of DDoS traffic.' In a statement to Krebs, he added, 'We have an attack of over 100 Gbps almost every hour of every day.'"

Share on Google+

Read more of this story at Slashdot.

15 Feb 00:09

Star Wars | df2.jpg

20 Jan 13:12

the Golden Songbird

25 Nov 06:27

FDA: Anti-smoking drug Chantix linked to more than 500 suicides

18 Sep 15:07

U.S. to seize Manhattan skyscraper secretly owned by Iran


I wonder if some of these victims of Iranian terrorism might be currently supporting the rebel faction in Syria. I feel like it's the 80's this morning.

08 Sep 02:23

Walmart, supporting stereotypes since 1962