Well, there was that time they included a rootkit in their audio CDs (this went on for a couple of years. Wikipedia)
…guilty as charged
…how did I fail to see that coming?
Respect though - the world needs more eaters
What were the useful scenarios, if you don’t mind?
Just watched this on QI. S16E08, plants. It’s about 11 minutes in…
Photoshop - it would be a great name for this cat
Nice catch! Thanks for calming things down
Back when they had consistent style guidelines to follow (I remember reading them, along with deep descriptions of how PnP actually works - yuck!).
Now they just throw shit at the wall it seems
Honestly this sounds like a good idea but a flawed implementation
This is a perfect use of the template
That’s highly entertaining - thank you for the somewhat helpful comment :)
Yeah, even for this one, mite and the nvd are completely useless (denying it exists).
mitre denies it exists links to NVD which is also basically an HTTP 404 error
You are right, though - When I look at CISAs notes, they direct to the right source meaningfully. I’m sure I’ve found some that are total stonewalls in the past, but no idea of that was MS, chrome or just a particular vulnerability… It’s happened enough I’d given up, but maybe I should retry next time
I could never get useful details out of any of the CVE sites. Really annoying, but maybe I’m dumb
Yeah, same boat. It’s like the uncle that had a head injury and can hardly function compared to some of the earlier products they released
Holy shit, is that the actual sauce? I had no idea about where this came from!
Holy crap, is it still working?
I thought nitter died…