Jump to content

Sniperwolf572

Member
  • Content Count

    3304
  • Joined

  • Last visited

  • Medals

  • Medals

Everything posted by Sniperwolf572

  1. Sniperwolf572

    Feedback to E3 Interview and Ingame Scenes

    I also did an interview with BI ages ago for Gaming Area, before ArmA I was released, last question asked was about the hair, it was a popular topic back then. :p You can find it =9&tx_ttnews[backPid]=10"]here. Also:
  2. Sniperwolf572

    E3 - Arma 3?

    FISHIES! Wheeee. I missed it at first, thought it was a surfing board. :rolleyes:
  3. Sniperwolf572

    Frozen Synapse

    Well, that sums it up way better than I can. :p
  4. Sniperwolf572

    Editor improvement suggestions.

    Is there something the community does not demand? :p
  5. Sniperwolf572

    Frozen Synapse

    Yes it is, link is in the first post. :)
  6. Sniperwolf572

    Preorders

    Hey, some people have preordered DNF 10 years ago. :p
  7. Sniperwolf572

    Media Coverage | No discussion here!

    ArmAIII announcement @ Kotaku
  8. Sniperwolf572

    Addition of Python or Lua as a Scripting Language

    JavaScript OO syntax style would indeed be nice, I'm a sucker for brackets. As long as we don't need armaQuery for it. :P
  9. Sniperwolf572

    The all new: Ask a moderator about the forum & rules

    There's also this graphical guide in case you need it.
  10. Only thing I fully expect from the "future" setting is the the light-blue glowy UI. You know, cos' it's the future brah. Here's a mockup. :p
  11. I don't mind it. From the announcement/screenshots, it still seems like a pretty down-to-earth plausible future. Bear in mind tho, it's the first bits of information released and we're barely scratching the surface on what we know about the game.
  12. Sniperwolf572

    The all new: Ask a moderator about the forum & rules

    ArmA3 section, for all those who didn't notice yet. :)
  13. Sniperwolf572

    ArmA 2 site hacked

    The screenshots are missing the usual BIS "IN-GAMEâ„¢" label. :p
  14. Sniperwolf572

    ArmA 2 site hacked

    Guys, stay on topic, this isn't /r/todayilearned.
  15. Sniperwolf572

    ArmA 2 site hacked

    Next person that spams the thread gets some infraction points. :936:
  16. Sniperwolf572

    Constant sprint when keys released

    Merged and moved two same threads. You won't find it, the controls don't have such perma-run toggle. Best I can suggest is lodging your forward key with something, like a toothpick. :P
  17. Sniperwolf572

    A few real life combat questions

    Very soon? xHlE7mOQOrU
  18. Sniperwolf572

    Millions hit by SQL Code Injection

    @walker: You addressed the topic as web based SQL code injection, so I'm going to focus on that. The fight with these specific attacks, LizaMoon seems to be the agreed name, is fought on 4 levels, web application side, browser side, user awareness and antivirus solution as a last line of defense. LizaMoon spreads because the developers of web applications failed to secure and sanitize the user input, which is a basic thing to be wary of when developing web apps. That's the first level of protection, if the web app is secure, LizaMoon has no attack vector and no way of spreading using that specific site. If the web application fails and gets injected into, we go to the next level. Second level, the browsers, because most modern browsers are sandboxed and have clear indications and warnings when they believe you might be in danger of being exposed to malicious code. You're going to be well alert to the potential danger, it's your call if you want to proceed with downloading the file. If you're using old browsers, such safeguards are probably not in place. If this gets ignored, it goes to the next level. Third level, user awareness is the major thing here because people are not well informed or educated with use of computers. Someone's, let's say, grandmother can't tell if a "Warning you have a virus, please click here to download our app and scan" is a genuine message or not (if they have any). I'm sure it takes everyone a few seconds to figure out which download button is real download and not a masked ad. Panic sets in as computer illiterate people are conditioned that computer viruses are a very bad thing and the instinct is to get rid of it by listening to the helpful prompt that popped up, while complete opposite action, just not doing anything and closing it is the best course of action. And AV's are a last line of defense because, if you have them, they're there when everything else has failed, and you have the file on your system, potentially executing it. If you ignore it and bypass it yourself, you're basically asking for it. As for purpose and number of compromised sites, I've got a few doubts. I agree that it might be forming a botnet, but then again it poses as your standard fake AV spyware. If it was a botnet attempt, I'm fairly sure it wouldn't so openly present itself with popups, but stay silent and wait to do it's purpose. Size is probably exaggerated because the number of infections has been measured only by search engines, and those are not very reliable numbers. The most concerning part about this whole thing to me so far is the fact that iTunes carried the malicious code in one way or another, and they have a sizeable userbase. @MadDogX: I've no interest in slinging mud at Walker, but the original post presented nothing but a bunch of links to various articles either hyping the issue or they were general descriptions of potential problems caused by various injection methods, and none of his own views on the issue, which he presented now and still managed to drift away from the actual news. From you and some searching I've discovered that this is about LizaMoon and that the number stated is way exaggerated because of the way information was gathered.
  19. Sniperwolf572

    Millions hit by SQL Code Injection

    Erm, attacks actually happen every day in significant amounts. For example, I witness automated SQL injection attempts daily on a simple contact form for the small company I work for. Advertising servers, for example, get attacked a lot because the potential of spreading malicious script to the masses is huge. One of the reasons such malware spreads is because of people that use unsafe or antiqued browsers.
  20. Sniperwolf572

    Millions hit by SQL Code Injection

    SQL injection isn't a new thing, I don't see why you're making it sound like it's a sudden and sensational news. It happens on a daily basis and it didn't become massive all of a sudden, just the news reporters looking for the next panic inducing headline have found out about it. A lot of apps get code injected on daily basis. Some inject ads into content, some take user emails for spamming, some look for apps that store passwords in plaintext, etc. I'm sure out of 100 random websites with a simple form on them you could inject anything you wanted on more than half of them. I don't find it a huge issue because most of exploitable sites do not (or should not have) any useful or interesting amount of information, compared to the lucrative targets like networking, banking sites etc. which in general hold security in high regard. The big issues only come after a serious hole was found in one of those lucrative targets (like Gawker Media recently). You can either trust developers that they've secured their application against those types of attacks or you don't. If you register and give your personal information to a third party on the internet, you're basically saying "Yes I trust you to keep my information secure and only use it for things you say you will" and that the point it's out of your hands. The information is out there, you've put it there willingly and there's not much you (personally) can do to keep it protected (against SQL injection). And I'll just leave this here:
  21. Sniperwolf572

    sooo.... its 1st of april

    Test crawl on the top 900 users resulted in 45 identified banmen. When it goes live, I'm aiming for 10500 users. :)
  22. Sniperwolf572

    sooo.... its 1st of april

    Banman crawler progressing at a steady pace. :)
  23. Sniperwolf572

    sooo.... its 1st of april

    This obviously calls for a BI Forum avatar crawler that checks for the major presence of distinct "Banned Red" color. Doubt you'll ever index them all manually. :P
  24. Sniperwolf572

    sooo.... its 1st of april

  25. They were found modifying their own work without permission from the author of said work, so we had to take some drastic measures.
×