並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 12 件 / 12件

新着順 人気順

the florida project movieの検索結果1 - 12 件 / 12件

  • 2019: July - October Political Notes - Richard Stallman

    Richard Stallman's personal political notes from 2019: July - October These are my personal opinions and do not speak for the GNU Project, the FSF, or anyone else. [ 2023 July - October | 2023 March - June | 2022 November - February | 2022 July - October | 2022 March - June | 2021 November - February | 2021 July - October | 2021 March - June | 2020 November - February | 2020 July - October | 2020

    • Thinking Fast and Slow – Replicability-Index

      2011 was an important year in the history of psychology, especially social psychology. First, it became apparent that one social psychologist had faked results for dozens of publications (https://en.wikipedia.org/wiki/Diederik_Stapel). Second, a highly respected journal published an article with the incredible claim that humans can foresee random events in the future, if they are presented without

        Thinking Fast and Slow – Replicability-Index
      • Paul Le Roux - Wikipedia

        Early life[edit] Le Roux was born on 24 December 1972, at Lady Rodwell Maternity Home in Bulawayo, Zimbabwe and given up for adoption. His birth certificate gives his first name as "unknown" and makes no mention of his father.[4][6][7] His biological mother's identity has not been disclosed; one source claims she was a poor teenager, while another states that his maternal grandmother was married t

          Paul Le Roux - Wikipedia
        • HuggingFaceFW/fineweb · Datasets at Hugging Face

          "},"dump":{"kind":"string","value":"CC-MAIN-2013-20"},"url":{"kind":"string","value":"http://%20jwashington@ap.org/Content/Press-Release/2012/How-AP-reported-in-all-formats-from-tornado-stricken-regions"},"date":{"kind":"string","value":"2013-05-18T05:48:54Z"},"file_path":{"kind":"string","value":"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-

            HuggingFaceFW/fineweb · Datasets at Hugging Face
          • Trademarks in Open Source

            Trademarks in Open Source Introduction Cases Unmanaged Trademarks: Naked Licensing FreecycleSunnyvale v. Freecycle Network Discussion Common Law Trademarks Planetary Motion, Inc. v. Techsplosion, Inc. Discussion Fair Use Defense to Trademark Infringement: Nominative Use Playboy Enters. v. Welles Discussion License Terms’ Bearing on Trademark Use MIT Discussion BSD-3-Clause Discussion PHP-3.0 Discu

            • Sodinokibi Ransomware gang threatens to disclose data from Kenneth Cole fashion firm

              APT41: The threat of KeyPlug against Italian industries | Critical SQL Injection flaws impact Ivanti Endpoint Manager (EPM) | Chinese actor 'Unfading Sea Haze' remained undetected for five years | A consumer-grade spyware app found in check-in systems of 3 US hotels | Critical Veeam Backup Enterprise Manager authentication bypass bug | Cybercriminals are targeting elections in India with influence

                Sodinokibi Ransomware gang threatens to disclose data from Kenneth Cole fashion firm
              • Experts discovered millions of .git folders exposed to public

                Crooks manipulate GitHub's search results to distribute malware | BatBadBut flaw allowed an attacker to perform command injection on Windows | Roku disclosed a new security breach impacting 576,000 accounts | LastPass employee targeted via an audio deepfake call | TA547 targets German organizations with Rhadamanthys malware | CISA adds D-Link multiple NAS devices bugs to its Known Exploited Vulner

                  Experts discovered millions of .git folders exposed to public
                • Cryptojacking campaign uses Shodan to scan for Docker hosts to hack

                  Security Affairs newsletter Round 466 by Pierluigi Paganini – INTERNATIONAL EDITION | Over 92,000 Internet-facing D-Link NAS devices can be easily hacked | More than 16,000 Ivanti VPN gateways still vulnerable to RCE CVE-2024-21894 | Cisco warns of XSS flaw in end-of-life small business routers | Magento flaw exploited to deploy persistent backdoor hidden in XML | Cyberattack disrupted services at

                    Cryptojacking campaign uses Shodan to scan for Docker hosts to hack
                  • New EvilQuest ransomware targets macOS users ...

                    Google fixes fifth actively exploited Chrome zero-day this year | Russia-linked APT28 targets government Polish institutions | Citrix warns customers to update PuTTY version installed on their XenCenter system manually | Dell discloses data breach impacting millions of customers | Mirai botnet also spreads through the exploitation of Ivanti Connect Secure bugs | Zscaler is investigating data breac

                      New EvilQuest ransomware targets macOS users ...
                    • A flaw in LastPass password manager leaks credentials from previous site

                      Magento flaw exploited to deploy persistent backdoor hidden in XML | Cyberattack disrupted services at Omni Hotels & Resorts | HTTP/2 CONTINUATION Flood technique can be exploited in DoS attacks | US cancer center City of Hope: data breach impacted 827149 individuals | Ivanti fixed for 4 new issues in Connect Secure and Policy Secure | Jackson County, Missouri, discloses a ransomware attack | Goog

                        A flaw in LastPass password manager leaks credentials from previous site
                      • Two kids found a screensaver bypass in Linux Mint

                        Dirty stream attack poses billions of Android installs at risk | ZLoader Malware adds Zeus's anti-analysis feature | Ukrainian REvil gang member sentenced to 13 years in prison | HPE Aruba Networking addressed four critical ArubaOS RCE flaws | Threat actors hacked the Dropbox Sign production environment | CISA adds GitLab flaw to its Known Exploited Vulnerabilities catalog | Panda Restaurant Group

                          Two kids found a screensaver bypass in Linux Mint
                        • GitHub flaw could have allowed attackers to takeover repositories of other users

                          BatBadBut flaw allowed an attacker to perform command injection on Windows | Roku disclosed a new security breach impacting 576,000 accounts | LastPass employee targeted via an audio deepfake call | TA547 targets German organizations with Rhadamanthys malware | CISA adds D-Link multiple NAS devices bugs to its Known Exploited Vulnerabilities catalog | US CISA published an alert on the Sisense data

                            GitHub flaw could have allowed attackers to takeover repositories of other users
                          1