dotdi

joined 1 year ago
[–] [email protected] 60 points 4 weeks ago (7 children)

As somebody with a degree in bioinformatics, I have never seen something more true in my whole life.

Some more lies from my time in academia:

  • “Planning and executing medical trials” = 6 months of statistics
  • “Machine Learning” = 6 months of statistics
  • “Pattern Recognition” = 6 months of statistics
  • “Health Data Science” = 6 months of statistics
  • Biostatistics = lol jk just 6 months of statistics
[–] [email protected] 15 points 1 month ago (1 children)

Having some financial trouble and I’m unsure if the money will run out before the next paycheck.

[–] [email protected] 21 points 1 month ago (3 children)

It’s the Data Science craze all over again. Hope we’re done with this soon.

[–] [email protected] 3 points 1 month ago

Same. I use it on desktop too

[–] [email protected] 16 points 1 month ago

Tor itself was not breached. Rather, the suspects were using an outdated, long-retired app that did not employ some of the protections that are now available, and this, in turn, allowed investigators to carry out the attack.

[–] [email protected] 13 points 2 months ago

I said it before and I’ll say it again: we need to work harder so that this asshole can buy his 2nd yacht. Have some compassion.

[–] [email protected] 1 points 2 months ago

Hard drives (SSDs, etc) are not the only durable storage that can be written to

[–] [email protected] 312 points 2 months ago (43 children)

I am outraged, a plea deal to avoid life imprisonment? What the fuck did I just read?!

This guy trafficked, raped and tortured her, and other underage women. Police did jack shit. And she was supposed to be watching him just walk away? Grotesque.

[–] [email protected] 1 points 3 months ago* (last edited 3 months ago) (2 children)

Yes, I have been eyeing a soft switch into cybersecurity. Maybe not head-over-heels and maybe not entirely, but I do plan to have a significant part of my work to be in infosec.

For context, I am currently working as Tech Lead/Software Architect for a company that has a security-focused product (with an, as of today, 0 incident track record), but I work on design and scalability most days. When involved in security-related tasks, I mostly coordinate and sometimes implement security critical code under the guidance of our (small) security team.

I do have enough insight to have a positive impact on security related discussions on higher levels (think “lol, this proposed change opens up the endpoint to being exploited by x or y”) but not enough to discuss our cryptographic primitives.

In order to get my feet wet, I started doing THM (quite actively, yet I’ve hit a rut with the Windows-focused buffer overflow rooms), and I can say I enjoy it more than I expected.

However, I am unsure what concrete steps I should take after THM.

I’ve been thinking of working towards the OSCP exam, but honestly the certification landscape is quite confusing.

[–] [email protected] 92 points 3 months ago

“It is difficult to get a man to understand something, when his salary depends on his not understanding it.”

― Upton Sinclair

[–] [email protected] 4 points 3 months ago (1 children)
[–] [email protected] 0 points 3 months ago (1 children)
view more: next ›