-
Content Count
3304 -
Joined
-
Last visited
-
Medals
-
Medals
Everything posted by Sniperwolf572
-
Feedback to E3 Interview and Ingame Scenes
Sniperwolf572 replied to krazikilla's topic in ARMA 3 - GENERAL
I also did an interview with BI ages ago for Gaming Area, before ArmA I was released, last question asked was about the hair, it was a popular topic back then. :p You can find it =9&tx_ttnews[backPid]=10"]here. Also: -
FISHIES! Wheeee. I missed it at first, thought it was a surfing board. :rolleyes:
-
Well, that sums it up way better than I can. :p
-
Is there something the community does not demand? :p
-
Yes it is, link is in the first post. :)
-
Hey, some people have preordered DNF 10 years ago. :p
-
ArmAIII announcement @ Kotaku
-
Addition of Python or Lua as a Scripting Language
Sniperwolf572 replied to Harrumph's topic in ARMA 3 - GENERAL
JavaScript OO syntax style would indeed be nice, I'm a sucker for brackets. As long as we don't need armaQuery for it. :P -
The all new: Ask a moderator about the forum & rules
Sniperwolf572 replied to Placebo's topic in OFFTOPIC
There's also this graphical guide in case you need it. -
Am I the only one who disliked the futuristic approach?
Sniperwolf572 replied to ray243's topic in ARMA 3 - GENERAL
Only thing I fully expect from the "future" setting is the the light-blue glowy UI. You know, cos' it's the future brah. Here's a mockup. :p -
Am I the only one who disliked the futuristic approach?
Sniperwolf572 replied to ray243's topic in ARMA 3 - GENERAL
I don't mind it. From the announcement/screenshots, it still seems like a pretty down-to-earth plausible future. Bear in mind tho, it's the first bits of information released and we're barely scratching the surface on what we know about the game. -
The all new: Ask a moderator about the forum & rules
Sniperwolf572 replied to Placebo's topic in OFFTOPIC
ArmA3 section, for all those who didn't notice yet. :) -
The screenshots are missing the usual BIS "IN-GAMEâ„¢" label. :p
-
Guys, stay on topic, this isn't /r/todayilearned.
-
Next person that spams the thread gets some infraction points. :936:
-
Constant sprint when keys released
Sniperwolf572 replied to Cloughy's topic in ARMA 2 & OA - QUESTIONS & ANSWERS
Merged and moved two same threads. You won't find it, the controls don't have such perma-run toggle. Best I can suggest is lodging your forward key with something, like a toothpick. :P -
A few real life combat questions
Sniperwolf572 replied to cartier90's topic in ARMA 2 & OA - GENERAL
Very soon? xHlE7mOQOrU -
@walker: You addressed the topic as web based SQL code injection, so I'm going to focus on that. The fight with these specific attacks, LizaMoon seems to be the agreed name, is fought on 4 levels, web application side, browser side, user awareness and antivirus solution as a last line of defense. LizaMoon spreads because the developers of web applications failed to secure and sanitize the user input, which is a basic thing to be wary of when developing web apps. That's the first level of protection, if the web app is secure, LizaMoon has no attack vector and no way of spreading using that specific site. If the web application fails and gets injected into, we go to the next level. Second level, the browsers, because most modern browsers are sandboxed and have clear indications and warnings when they believe you might be in danger of being exposed to malicious code. You're going to be well alert to the potential danger, it's your call if you want to proceed with downloading the file. If you're using old browsers, such safeguards are probably not in place. If this gets ignored, it goes to the next level. Third level, user awareness is the major thing here because people are not well informed or educated with use of computers. Someone's, let's say, grandmother can't tell if a "Warning you have a virus, please click here to download our app and scan" is a genuine message or not (if they have any). I'm sure it takes everyone a few seconds to figure out which download button is real download and not a masked ad. Panic sets in as computer illiterate people are conditioned that computer viruses are a very bad thing and the instinct is to get rid of it by listening to the helpful prompt that popped up, while complete opposite action, just not doing anything and closing it is the best course of action. And AV's are a last line of defense because, if you have them, they're there when everything else has failed, and you have the file on your system, potentially executing it. If you ignore it and bypass it yourself, you're basically asking for it. As for purpose and number of compromised sites, I've got a few doubts. I agree that it might be forming a botnet, but then again it poses as your standard fake AV spyware. If it was a botnet attempt, I'm fairly sure it wouldn't so openly present itself with popups, but stay silent and wait to do it's purpose. Size is probably exaggerated because the number of infections has been measured only by search engines, and those are not very reliable numbers. The most concerning part about this whole thing to me so far is the fact that iTunes carried the malicious code in one way or another, and they have a sizeable userbase. @MadDogX: I've no interest in slinging mud at Walker, but the original post presented nothing but a bunch of links to various articles either hyping the issue or they were general descriptions of potential problems caused by various injection methods, and none of his own views on the issue, which he presented now and still managed to drift away from the actual news. From you and some searching I've discovered that this is about LizaMoon and that the number stated is way exaggerated because of the way information was gathered.
-
Erm, attacks actually happen every day in significant amounts. For example, I witness automated SQL injection attempts daily on a simple contact form for the small company I work for. Advertising servers, for example, get attacked a lot because the potential of spreading malicious script to the masses is huge. One of the reasons such malware spreads is because of people that use unsafe or antiqued browsers.
-
SQL injection isn't a new thing, I don't see why you're making it sound like it's a sudden and sensational news. It happens on a daily basis and it didn't become massive all of a sudden, just the news reporters looking for the next panic inducing headline have found out about it. A lot of apps get code injected on daily basis. Some inject ads into content, some take user emails for spamming, some look for apps that store passwords in plaintext, etc. I'm sure out of 100 random websites with a simple form on them you could inject anything you wanted on more than half of them. I don't find it a huge issue because most of exploitable sites do not (or should not have) any useful or interesting amount of information, compared to the lucrative targets like networking, banking sites etc. which in general hold security in high regard. The big issues only come after a serious hole was found in one of those lucrative targets (like Gawker Media recently). You can either trust developers that they've secured their application against those types of attacks or you don't. If you register and give your personal information to a third party on the internet, you're basically saying "Yes I trust you to keep my information secure and only use it for things you say you will" and that the point it's out of your hands. The information is out there, you've put it there willingly and there's not much you (personally) can do to keep it protected (against SQL injection). And I'll just leave this here:
-
Test crawl on the top 900 users resulted in 45 identified banmen. When it goes live, I'm aiming for 10500 users. :)
-
Banman crawler progressing at a steady pace. :)
-
This obviously calls for a BI Forum avatar crawler that checks for the major presence of distinct "Banned Red" color. Doubt you'll ever index them all manually. :P
-
ACE 1.9 (Advanced Combat Enviroment) for OA/CO
Sniperwolf572 replied to AnimalMother92's topic in ARMA 2 & OA - ADDONS & MODS: COMPLETE
They were found modifying their own work without permission from the author of said work, so we had to take some drastic measures.