They'll probably go to the private sector, or land a job at a foreign space agency like ESA.
you parents out there ... clue me in, but isn't this the pinnacle of irresponsibility, even on a cool day?
I wouldn't leave my 1 year old alone for more than 5 minutes in the centre of a pillow fort in my house with the AC on (bad analogy, soft fluffy surfaces can be dangerous to small children if they can't get their faces up reliably to get air).
There have been countless times when it's a nice 18 degrees Celsius outside and I needed to run into the store to grab ONE thing. A total in and out time of maybe 3 minutes. I also live in a quiet and safe town. And yet each and every time, I took the effort to get my kid out of his car seat, carry him inside with me, get the stuff, and do the whole process of getting him into his seat, get him bucked in, get his toys set up again, etc.
I would throw myself off a cliff for being the worst parent imaginable if I left him in the car for those 3 minutes because I couldn't make the effort.
This mother from the news didn't deserve the child that died and neither of them deserved her as a mother, for all that term does any good here.
Why are you comparing theft to game hacking out of nowhere?
You made the comparison: "Much like every security system"
Source?
It's out there, my dude. It's a constant complaint in literally every competitive online game. If people are complaining about it, then it's not working well enough. This isn't an esoteric thought either. You ask anyone if cheating is a big issue in online gaming and anyone with knowledge about it will tell you it's a constant problem that's getting worse.
What do you mean by system in "full access to the system"?
If you own the hardware and have admin/root access to the OS. Then it's yours and you have "full access" to everything. And I do mean everything. You can modify the OS. You can read the values of protected parts of memory. And so on.
If you don't understand what I mean by "full access to the system" in the context of anti-cheat running on your own hardware, then there's nothing I can say in a short comment to get you up to speed.
Someone still has to discover the exploit.
The cheat and anti-cheat battle is a constant cat and mouse game. The advantage is always with the cheaters because they outnumber the developers 100:1 at the least. Plus they have the will and determination to find ways around anti-cheats. In fact, building security against exploits is by far way harder than finding exploits.
The reality is that client-side anti-cheat is a losing battle.
What you're referring to is deterrence, and it doesn't apply to online gaming the way it does to theft of property. One cheater doesn't ruin the game for one other person, they ruin the game for dozens or hundreds of other players.
And the efficacy being so bad is the reason why client-side anti-cheat keeps getting more and more invasive to the point of being literally, by definition, a type of malware and system rootkit. And yet it's still not enough to defeat cheaters, because the cheaters have full access to the system itself.
And the guys writing the cheat software just have to put in the effort once to defeat the anti-cheat and then they sell it to people who install it like any other software. The cheaters who use the cheats have it easy.
Anti-cheat is a necessary evil for competitive online games
Client-side anti-cheat is useless. It's not a necessary evil, it's just evil. The minute the cheater/hacker has direct access to the system, you've already lost.
What I do is just take out the card a plug it into a little USB dongle thing which I can plug into either my phone or laptop.
What's wild to me is that anyone would do it any other way. I'm astounded that this is somehow a "tip".
Not even 10 years ago it was simply the way to do it.
"Those who cannot remember the past are condemned to repeat it."
Can't have LLMs learning about manifestos against the rich, eh?
Thank goodness they cleared out all that snow and ice so that we can finally see the pretty mountains.
What the user was doing is that they don't trust that the system truly deleted the account, and they worry it was just deactivated (while claiming it was "deleted"). So they tried to do a password recovery which often reactivates a falsely "deleted" account.
I've done this before and had to message the company and have them confirm the account is entirely deleted.
JSON data within a database is perfectly fine and has completely justified use cases. JSON is just a way to structure data. If it's bespoke data or something that doesn't need to be structured in a table, a JSON string can keep all that organized.
We use it for intake questionnaire data. It's something that needs to be on file for record purposes, but it doesn't need to be queried aside from simply being loaded with the rest of the record.
Edit: and just to add, even MS SQL/Azure SQL has the ability to both query and even index within a JSON object. Of course Postgres' JSONB data type is far better suited for that.
CeeBee_Eh
0 post score0 comment score
We work in 20 minute microsleep shifts