Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)C
Posts
0
Comments
945
Joined
7 mo. ago

  • 👌👍

  • Oh, so you are being nitpicky over common English. Understood.

  • Yes. In nice areas. What's so complicated? Are you really trying to nitpick over the use of back yards? I hate to break it to you but using backyard to describe an area beyond your property line is pretty common English.

  • Then go find them at the same rate. Do it. 

    You can't, because it's an absurdly competitive market and most engineers are happy to skip it for equal or similar pay. You get what you pay for and at the same rate you typically get someone good at management or tech not both. This people go demand 300k from later companies posting more. And they'll get paid more than the engineers because they are harder to find. 

  • Okay, well you find someone competent enough to deal with the tech and get paid less than the engineers 🤣.

    The rates are the rates.

  • Seems to me, for  most successful companies, it does. Can you name a few successful companies past 50, making money, that don't have management? 

    There is little to no evidence, even in academic studies, typically a pro labor progressive environment, that management is not needed beyond small projects.

  • According to you all shorter because AI is simultaneously garbage propping upa bubble, so my sarcastic answer is it's slower.

    That being said I know I could detect and scan, with nessus/snyk/security hub and detect the issue inside of 5 minutes. Probably another half hour to hour for a proper pen tester to send an AWS exploit package at it and own the rest within an hour or two. 

    How many people do you think catch exploits in the first day or even week or month of a hack? I've got some news for you, its only the companies who really need their shit together and have a strong opssec team. They ain't going deleting buckets. They sit on it for months and years in most post mortem.

  • mf's gonna make me erase my free time pulling stats on anti Joe posts...

  • Rice, beans, and some frozen peppers and onions are an easy, no cut base to start a meal. Toss what else you want and you can have a good tasting ready to make one pot meal a few times a week.

  • Y'all obviously lead with AI and you're bad at propaganda.

    The attackers initially gained access by stealing valid test credentials from public Amazon S3 buckets. The credentials belonged to an identity and access management (IAM) user with multiple read and write permissions on AWS Lambda and restricted permissions on AWS Bedrock

    Run your shit against tenable once in a while.

  • Most devs refuse to take on any sort of responsibility of management. The manager gets paid to deal with that for you. Want more money? Manage coders on a successful team. You'll e miserable but at least you'll hit 200k.

  • Look these people are nimby assholes but this isn't what people bitch about. They bitch and it getting put in their backyards in nicer locations.

  • I mean on one hand, it's a shower thought. On the other, this is a really dumb shower thought.

  • They're assholes.

  • Most luxury car owners will be on to their next car before the warranty is out.

  • Safer than humans. It's great they keep on pushing.

  • The human eye can't perceive beyond 60fps. Fackt.

  • The setup process asked users to run a shell command that decoded a hidden payload, ran it, and then downloaded a second script. Finally, it installed a macOS binary and removed quarantine settings so the built-in malware checks wouldn't detect it.

    This just in, installing random un trusted binaries directed by plug in developers will get you in trouble. Garbage propaganda.