Profile cover photo
Profile photo
Thomas Lekanger
139 followers -
Web developer
Web developer

139 followers
About
Posts

Post has shared content
Hey +Amazon.com, this is how your last mile delivery driver delivered my package today.

Are you kidding me?

My wife was in the car and watched the whole thing. When he was walking back, she asked him "Really?"

He said "Yup" and walked away.

https://www.youtube.com/watch?v=yzarUhjqGZA
Add a comment...

Post has shared content
MIUi forums in a nutshell. One sentence post = 3 screens worth of medals nobody gives a crap about. Insanity.

http://en.miui.com/thread-299743-1-1.html
Photo
Add a comment...

Post has shared content
Take that, rogue ads!

This also gives the more technical ones among our readers an opportunity to help us figure out which ad exactly caused the redirect so we can finally figure out what ads are doing it.

You can hook up to adb on desktop, then go to Chrome Dev Tools -> Remote Devices, then examine Elements there and find the redirect code in one of the ad iframes.

Unfortunately, Chrome prevents an easy copying of all the generated sources, including iframe sources, so I just filed this feature request: https://bugs.chromium.org/p/chromium/issues/detail?id=782789.
Add a comment...

Post has shared content
Add a comment...

Post has attachment
A black-box chip in all your Intel computers with full access to everything, what could go wrong?
Patch as soon as possible people!
Add a comment...

Post has shared content
Had a recent experience like this, with a table of contents automatically generated by Word through headings. A word of advice: don't use this feature, just DON'T.
Photo
Add a comment...

Post has shared content
The things that crocodiles do these days to try and impress a girl...
Photo
Add a comment...

Post has shared content
This is just sad. Guy complains that Firefox is showing an insecure login page warning and it's affecting his customers.

https://www.reddit.com/r/programming/comments/60jc69/company_with_an_httpserved_login_form_filed_a has full laundry list of more blatant security violations.

For god's sake, http://www.oilandgasinternational.com/html/login.aspx just put in a single quote and press Enter. You get the stack trace, code lines, and a full-on SQL injection on a platter. http://i.imgur.com/Vp74mt2.png. Someone already dropped the users table earlier.

No https.

Open ports running services, like MSSQL.

ASP.net from like 2008, with published vulnerabilities.

They're storing the passwords in plaintext: "Forgot your password? Click here to receive it via email."

Facepalm x10000.
Add a comment...

Post has shared content
Will be patched in the next OTA.
Add a comment...

Post has shared content
Wait while more posts are being loaded