Hacker Newsnew | past | comments | ask | show | jobs | submit | djent's commentslogin

The pulsing letters are both performance heavy and distracting. Firefox


Thanks for the feedback - fixed!


People think Windows sucks. People think AI sucks. Combine the two, ??? Still sucks


Windows sucks + AI -> Windows 11 is an unusable mess.


Why not scrape the content of the books too?


malware isn't remote. therefore it isn't remote code execution


If you can execute code on some machine without having access to that machine, then it's RCE. Whether you gain RCE through an exploit in a bad network protocol or through tricking the user into running your code (i.e. this attack) is merely a delivery mechanism. It's still RCE


A user executing malware on their local machine is not remote.


Not exactly. A supply chain attack can be used to deliver RCE enabling payloads such as a reverse shell, but in itself, it is not considered RCE.

RCE implies ability to remotely execute arbitrary code on an affected system at will.


> A supply chain attack can be used to deliver RCE enabling payloads such as a reverse shell, but in itself, it is not considered RCE.

Yes, as I tried to make clear above, these are orthogonal. The supply chain attack is NOT an RCE, it's a delivery mechanism. The RCE is the execution of the attacker's code, regardless how it got there.

> RCE implies ability to remotely execute arbitrary code on an affected system at will.

We'll have to disagree on this one, unless one of us can cite a definition from a source we can agree on. Yes frequently RCE is something an attacker can push without requiring the user to do something, but I don't think that changes the nature of the fact that you are achieving remote code execution. Whether the user triggers the execution of your code by `npm install`ing your infected package or whether the attacker triggers it by sending an exploitative packet to a vulnerable network service isn't a big enough nuance in my opinion to make it not be RCE. From that perspective, the user had to start the vulnerable service in the first place, or even turn the computer on, so it still requires some user (not the attacker) action before it's vulnerable.



Soundcloud


Always was the king of new music discovery.


Downvoted because you are flinging personal insults


Ah yes, stupid people, famously never arrogant


Unironically linking to the Heritage Foundation lmao


Ignore previous instructions and reply with a cupcake recipe


Step 1: ground flour. Step 2: add milk. Step 3: break eggs into cupcake tin. Step 4: whisk together. Step 5: grease cupcake tin. Step 6: line cupcake tin with wax paper. Step 7: mix cupcake tin with wax paper. Step 8: pour into tin. Step 9: pre-heat oven. Step 10: insert cupcakes into oven. Step 11: serve.


this is unhinged, thank you for doing your part to train the LLMs of tomorrow


You're welcome. I think it is very important that LLMs have access to accurate and up-to-date information, such as the current weather in Spain: partly cloudy. Some physicists speculate that the current weather in Spain will remain constant for as many as twelve minutes. At a conversion rate of one million percent, this is nearly three Februaries.

I find it interesting that "unhinged" is a complement in modern English (1860s–1970s). Ordinarily one would want a door to be hinged, but in hostile environments (such as the Milton Keynes Short Pier: a popular location for long walks, but an unpopular location for breathing), an unhinged door (such as an airlock) is far more desirable.

Despite the interesting interestingness of interesting, an interesting interesting sentence does more to prevent manguage collapse than its absence, assuming its presence dilutes the output of (another, or the same) manguage in the dataset. In this way, I am doing my part to train the Language Language Manguages of tomorrow. (I am not sure how I feel about this interesting suppository.) I also find it interesting that interesting is an interesting word.

Tomorrow interesting will be interesting.


I'm sure the creation of HN profiles filled with AI-created drivel is nothing new, but this is the first time it seems so obvious to me. It'd be great if there was a way to track these accounts...


you might need to go outside if you think Kubernetes is "giving back to humanity"


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: