li Scientific Replication is Harder Than YouThink -and Can Be Hilarious By www.neatorama.com Published On :: Mon, 11 Nov 2024 06:08:19 -0800 Science experiments are not considered completely valid unless they can be replicated. Replicating an experiment is pretty much impossible unless you've been steeped in the various factors of scientific theory. And even if you are thoroughly trained in those factors, it's easy to lose track when you're doing a casual experiment at home. That goes double when your aim is to debunk something that you find obviously wrong. Sage the Bad Naturalist jumped into such a debunking experiment with both feet, and then got entangled in them. She spent an entire year trying to replicate a dubious TikTok, which turned into an embarrassing adventure in how not to do science. But negative results are still results, and the goal of science is always to learn something. She bravely admits all the things she did wrong, because scientists have to have humility to be accepted. What's funniest is how many things went wrong, and how they all piled up to the end. What she ended up with is an amusing and rather charming video on the dangers of throwing your heart (and time) into debunking something you saw on the internet. -via Metafilter Full Article
li The <i>S.S. Relief</i>--A Floating Outhouse in California By www.neatorama.com Published On :: Tue, 12 Nov 2024 06:13:20 -0800 Altas Obscura tells us about the S.S. Relief--the formal name for an outhouse that floats in Lake Casitas near Ventura, California. The artificial lake is an important water reservoir for the thirsty people of southern California, so the Casitas Municipal Water District takes its cleanliness very seriously.The lake is popular among boaters and fishermen. After a few hours out on the water, people need to relieve themselves. They can then paddle up to the S.S. Relief, which is a 2-seater outhouse that floats on the surface of the water. The waste is contained on the barge, so there's no contamination of the lake's purity. Full Article
li How Harlan Ellison Claimed <i>The Terminator</i> By www.neatorama.com Published On :: Tue, 12 Nov 2024 14:57:21 -0800 Prolific science fiction author Harlan Ellison wrote two episodes of the TV series The Outer Limits, "Soldier" and "Demon with a Glass Head." They both ran during the show's second season in 1964. In 1984, Ellison heard that James Cameron was working on a film that seemed quite similar to the plot of "Soldier," which you can watch in full. Hemdale Productions wouldn't let him see the script. When he saw The Terminator, Ellison was ready to sue. The lawsuit never came about, because Hemdale Productions settled the case, for money, screen credit in subsequent releases of the film, and a gag order. To this day, people argue over whether The Terminator was at all plagiarized and if so, how much. Read what Ellison had to say about the case at the time and the reaction from James Cameron at Den of Geek. You've probably already seen The Terminator, and it's up to you to watch The Outer Limits episode if you want to form your own opinion. Full Article
li 20 of Our Favorite Reactions to Marijuana Legalization in California, Maine, Massachusetts and Nevada By cheezburger.com Published On :: Thu, 10 Nov 2016 10:00:00 -0800 Full Article twitter news marijuana laws reactions smoking weed funny politics
li Key to Life FAIL By cheezburger.com Published On :: Sat, 05 Mar 2011 10:00:00 -0800 Full Article lol witty reply your friends are laughing at you
li Mythbusters v. Dealiest Catch By cheezburger.com Published On :: Wed, 08 May 2013 05:00:00 -0700 Full Article crabs discovery channel mythbusters failbook
li Girl Texts Guy Insult in an Attempt to Flirt, and Ends up Getting Stonewalled after Some Serious Awkwardness By cheezburger.com Published On :: Sun, 18 Sep 2016 10:00:00 -0700 It all starts with the anything-but-smooth introduction... Full Article FAIL tinder Awkward insult dating
li 35 Funny Texting FAILs Full of Cringe to Lighten Your Mood By cheezburger.com Published On :: Thu, 08 Jun 2017 08:00:00 -0700 Full Article FAIL cringe texting
li Our ancestor Lucy may have used tools more than 3 million years ago By www.livescience.com Published On :: Tue, 12 Nov 2024 17:29:35 +0000 An analysis looking at the hand bones of australopithecines, apes and humans reveals that tool use likely evolved before the Homo genus arose. Full Article Archaeology
li 03 – The Internet Musician – Five Things You Must Believe To Go Indie By theinternetmusician.com Published On :: Sun, 15 Jan 2012 02:22:30 +0000 Show notes for Episode #3: Subscribe to the Internet Musician Podcast with iTunes: Also in this episode, I discuss the five things you must believe cultivate your DIY music attitude, including: 1. The business has been lying to you. Major label artists are not getting rich off of record sales. Radio is fake. Don’t belive […] Full Article Podcast DIY music attitude internet musician podcast music marketing on the internet
li 06 – The Internet Musician – Music Licensing for Indie Artists By theinternetmusician.com Published On :: Wed, 28 Mar 2012 11:40:59 +0000 Show Notes for Episode 6: Following my recent appearance on the Film and TV Music Licensing Panel at the MidAtlantic Music Conference here in Charlotte, NC, I definitely have music licensing on my mind. It’s always been a passion of mind…one of those areas of music marketing that I’ve researched exhaustively for years. It’s also […] Full Article Podcast get your music licensed monetization music for tv and film music licensing podcast episode 6
li Google’s AI Tool Big Sleep Finds Zero-Day Vulnerability in SQLite Database Engine By thehackernews.com Published On :: Mon, 04 Nov 2024 15:34:00 +0530 Google said it discovered a zero-day vulnerability in the SQLite open-source database engine using its large language model (LLM) assisted framework called Big Sleep (formerly Project Naptime). The tech giant described the development as the "first real-world vulnerability" uncovered using the artificial intelligence (AI) agent. "We believe this is the first public example of an AI agent finding Full Article
li Cyber Threats That Could Impact the Retail Industry This Holiday Season (and What to Do About It) By thehackernews.com Published On :: Mon, 04 Nov 2024 16:30:00 +0530 As the holiday season approaches, retail businesses are gearing up for their annual surge in online (and in-store) traffic. Unfortunately, this increase in activity also attracts cybercriminals looking to exploit vulnerabilities for their gain. Imperva, a Thales company, recently published its annual holiday shopping cybersecurity guide. Data from the Imperva Threat Research team’s Full Article
li German Police Disrupt DDoS-for-Hire Platform dstat[.]cc; Suspects Arrested By thehackernews.com Published On :: Mon, 04 Nov 2024 17:32:00 +0530 German law enforcement authorities have announced the disruption of a criminal service called dstat[.]cc that made it possible for other threat actors to easily mount distributed denial-of-service (DDoS) attacks. "The platform made such DDoS attacks accessible to a wide range of users, even those without any in-depth technical skills of their own," the Federal Criminal Police Office (aka Full Article
li Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System By thehackernews.com Published On :: Tue, 05 Nov 2024 09:00:00 +0530 Google has warned that a security flaw impacting its Android operating system has come under active exploitation in the wild. The vulnerability, tracked as CVE-2024-43093, has been described as a privilege escalation flaw in the Android Framework component that could result in unauthorized access to "Android/data," "Android/obb," and "Android/sandbox" directories, and their respective Full Article
li Synology Urges Patch for Critical Zero-Click RCE Flaw Affecting Millions of NAS Devices By thehackernews.com Published On :: Tue, 05 Nov 2024 15:04:00 +0530 Taiwanese network-attached storage (NAS) appliance maker Synology has addressed a critical security flaw impacting DiskStation and BeePhotos that could lead to remote code execution. Tracked as CVE-2024-10443 and dubbed RISK:STATION by Midnight Blue, the zero-day flaw was demonstrated at the Pwn2Own Ireland 2024 hacking contest by security researcher Rick de Jager. RISK:STATION is an " Full Article
li FBI Seeks Public Help to Identify Chinese Hackers Behind Global Cyber Intrusions By thehackernews.com Published On :: Tue, 05 Nov 2024 22:45:00 +0530 The U.S. Federal Bureau of Investigation (FBI) has sought assistance from the public in connection with an investigation involving the breach of edge devices and computer networks belonging to companies and government entities. "An Advanced Persistent Threat group allegedly created and deployed malware (CVE-2020-12271) as part of a widespread series of indiscriminate computer intrusions designed Full Article
li INTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime By thehackernews.com Published On :: Wed, 06 Nov 2024 15:43:00 +0530 INTERPOL on Tuesday said it took down more than 22,000 malicious servers linked to various cyber threats as part of a global operation. Dubbed Operation Synergia II, the coordinated effort ran from April 1 to August 31, 2024, targeting phishing, ransomware, and information stealer infrastructure. "Of the approximately 30,000 suspicious IP addresses identified, 76 per cent were taken down and 59 Full Article
li Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps By thehackernews.com Published On :: Wed, 06 Nov 2024 19:29:00 +0530 Cybersecurity researchers are warning that a command-and-control (C&C) framework called Winos is being distributed within gaming-related applications like installation tools, speed boosters, and optimization utilities. "Winos 4.0 is an advanced malicious framework that offers comprehensive functionality, a stable architecture, and efficient control over numerous online endpoints to execute Full Article
li Malicious PyPI Package ‘Fabrice’ Found Stealing AWS Keys from Thousands of Developers By thehackernews.com Published On :: Thu, 07 Nov 2024 14:37:00 +0530 Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) that has racked up thousands of downloads for over three years while stealthily exfiltrating developers' Amazon Web Services (AWS) credentials. The package in question is "fabrice," which typosquats a popular Python library known as "fabric," which is designed to execute shell commands remotely over Full Article
li Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems By thehackernews.com Published On :: Thu, 07 Nov 2024 14:38:00 +0530 Cisco has released security updates to address a maximum severity security flaw impacting Ultra-Reliable Wireless Backhaul (URWB) Access Points that could permit unauthenticated, remote attackers to run commands with elevated privileges. Tracked as CVE-2024-20418 (CVS score: 10.0), the vulnerability has been described as stemming from a lack of input validation to the web-based management Full Article
li China-Aligned MirrorFace Hackers Target EU Diplomats with World Expo 2025 Bait By thehackernews.com Published On :: Thu, 07 Nov 2024 15:10:00 +0530 The China-aligned threat actor known as MirrorFace has been observed targeting a diplomatic organization in the European Union, marking the first time the hacking crew has targeted an entity in the region. "During this attack, the threat actor used as a lure the upcoming World Expo, which will be held in 2025 in Osaka, Japan," ESET said in its APT Activity Report for the period April to Full Article
li CISA Alerts to Active Exploitation of Critical Palo Alto Networks Vulnerability By thehackernews.com Published On :: Fri, 08 Nov 2024 10:47:00 +0530 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched critical security flaw impacting Palo Alto Networks Expedition to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2024-5910 (CVSS score: 9.3), concerns a case of missing authentication in the Expedition migration tool that Full Article
li New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus By thehackernews.com Published On :: Fri, 08 Nov 2024 12:45:00 +0530 Cybersecurity researchers have flagged a new malware campaign that infects Windows systems with a Linux virtual instance containing a backdoor capable of establishing remote access to the compromised hosts. The "intriguing" campaign, codenamed CRON#TRAP, starts with a malicious Windows shortcut (LNK) file likely distributed in the form of a ZIP archive via a phishing email. "What makes the CRON# Full Article
li Malicious NPM Packages Target Roblox Users with Data-Stealing Malware By thehackernews.com Published On :: Fri, 08 Nov 2024 17:23:00 +0530 A new campaign has targeted the npm package repository with malicious JavaScript libraries that are designed to infect Roblox users with open-source stealer malware such as Skuld and Blank-Grabber. "This incident highlights the alarming ease with which threat actors can launch supply chain attacks by exploiting trust and human error within the open source ecosystem, and using readily available Full Article
li Webinar: Learn How Storytelling Can Make Cybersecurity Training Fun and Effective By thehackernews.com Published On :: Fri, 08 Nov 2024 22:53:00 +0530 Let’s face it—traditional security training can feel as thrilling as reading the fine print on a software update. It’s routine, predictable, and, let’s be honest, often forgotten the moment it's over. Now, imagine cybersecurity training that’s as unforgettable as your favorite show. Remember how "Hamilton" made history come alive, or how "The Office" taught us CPR (Staying Alive beat, anyone?)? Full Article
li HPE Issues Critical Security Patches for Aruba Access Point Vulnerabilities By thehackernews.com Published On :: Mon, 11 Nov 2024 15:27:00 +0530 Hewlett Packard Enterprise (HPE) has released security updates to address multiple vulnerabilities impacting Aruba Networking Access Point products, including two critical bugs that could result in unauthenticated command execution. The flaws affect Access Points running Instant AOS-8 and AOS-10 - AOS-10.4.x.x: 10.4.1.4 and below Instant AOS-8.12.x.x: 8.12.0.2 and below Instant AOS-8.10.x.x: Full Article
li New GootLoader Campaign Targets Users Searching for Bengal Cat Laws in Australia By thehackernews.com Published On :: Mon, 11 Nov 2024 17:25:00 +0530 In an unusually specific campaign, users searching about the legality of Bengal Cats in Australia are being targeted with the GootLoader malware. "In this case, we found the GootLoader actors using search results for information about a particular cat and a particular geography being used to deliver the payload: 'Are Bengal Cats legal in Australia?,'" Sophos researchers Trang Tang, Hikaru Koike, Full Article
li Life Begins By www.aquarionics.com Published On :: Tue, 26 Jan 2021 20:12:01 +0000 One of my strongest memories of my childhood is a fridge magnet. It was a small white cube… Full Article Uncategorized
li Building community offline By www.cygnoir.net Published On :: Sat, 02 Nov 2024 22:52:53 -0800 I was overwhelmed by the response to my last post, and so grateful for the reminder that there is still connection to be found online, I just need to push through my own self-consciousness to find it. And I have many good models for this behavior, people who are quick with a kind and supportive word, people who do not shy away from nuance. Today I spent the day offline in the company of people like this, a small group of friends that gathers once a month to share our love of stationery: pens, ink, paper, notebooks, planners, postal mail, and the like. We sit around a big table and journal together while chatting, snacking, and drinking lattes carefully crafted by FunkyPlaid. The middle of the table soon fills with stickers, stamps, inks, and washi tapes that we’ve brought to share with each other. As I look around the table at these treasured people, I think about how much work goes into building community. Healthy communities take intention, upkeep, energy, and shared values. This gathering happens every month because we invest all of this into making it happen. As hosts, FunkyPlaid and I make sure people feel cared for with food and drink in a clean and welcoming space. As guests, everyone brings what they want to share, and expresses interest in what they are interested in (and refrains from expressing disdain for what they aren’t). It’s a lot of work, joyful work. And this work results in a day each month to anticipate, and memories to hold close the rest of the month. I hope never to take this community for granted. Full Article
li Law enforcement operation takes down 22,000 malicious IP addresses worldwide By catless.ncl.ac.uk Published On :: Full Article
li FBI says hackers are sending fraudulent police data requests ot tech giants to steal people's private information By catless.ncl.ac.uk Published On :: Full Article
li 1700 letters from the tax office: Daylight exit messed up By catless.ncl.ac.uk Published On :: Full Article
li WNBA is totally annoying, here’s how to fix it for Caitlin Clark’s arrival By blog.penelopetrunk.com Published On :: Sun, 14 Apr 2024 00:29:32 +0000 Professional women’s basketball is a cesspool of mediocrity full of women gatekeeping so the sport can’t change. Fortunately, incoming rookie Caitlin Clark is worth more than the entire WNBA due to her sponsorships. This means that unlike other players, Clark doesn’t work for the WNBA she works for her sponsors and her fans. Also, Clark […] The post WNBA is totally annoying, here’s how to fix it for Caitlin Clark’s arrival appeared first on Penelope Trunk Careers. Full Article Managing up
li What explains the outsized success of autistic applicants to college By blog.penelopetrunk.com Published On :: Thu, 25 Apr 2024 18:26:44 +0000 Z went to a Duke recruiting weekend where accepted kids can get a feel for the university. He hung out with some kids who decided to go to Harvard and Stanford, and a bunch of kids who decided on Duke. What was similar about all of them? They talked openly about having autism. At lunch […] The post What explains the outsized success of autistic applicants to college appeared first on Penelope Trunk Careers. Full Article Diversity
li She Bought a Little Kitten, Now She Has a Giant Cat By englishrussia.com Published On :: Sat, 22 Jan 2022 10:35:26 +0000 The post She Bought a Little Kitten, Now She Has a Giant Cat appeared first on English Russia. Full Article animals Photos
li Life In Moscow Before the Revolution By englishrussia.com Published On :: Mon, 24 Jan 2022 13:26:21 +0000 The post Life In Moscow Before the Revolution appeared first on English Russia. Full Article Culture History Photos Society moscow old photos
li Life in a Russian Women’s Jail By englishrussia.com Published On :: Thu, 27 Jan 2022 02:33:25 +0000 The post Life in a Russian Women’s Jail appeared first on English Russia. Full Article Photos Russian People Society russian-women women
li Sepia Art of Rinat Voligamsi By englishrussia.com Published On :: Mon, 31 Jan 2022 11:57:36 +0000 The post Sepia Art of Rinat Voligamsi appeared first on English Russia. Full Article Art Culture History art
li Almost 7 Million Dollars for a Flat in Nizhny Novgorod, Russia By englishrussia.com Published On :: Thu, 03 Feb 2022 14:35:56 +0000 The post Almost 7 Million Dollars for a Flat in Nizhny Novgorod, Russia appeared first on English Russia. Full Article Photos crazy interior
li How Does a Modern Communist Girl Look Like? By englishrussia.com Published On :: Tue, 15 Feb 2022 13:43:48 +0000 The post How Does a Modern Communist Girl Look Like? appeared first on English Russia. Full Article Funny Photos Russian People crazy funny girls women
li Russian 40 Miles Military Convoy Moves Towards Kiev By englishrussia.com Published On :: Tue, 01 Mar 2022 04:15:23 +0000 The post Russian 40 Miles Military Convoy Moves Towards Kiev appeared first on English Russia. Full Article Photos Russian army army kiev military ukraine
li Russian Designer Creates Realistic Images of Great Historical Figures By englishrussia.com Published On :: Wed, 09 Mar 2022 10:21:31 +0000 The post Russian Designer Creates Realistic Images of Great Historical Figures appeared first on English Russia. Full Article Culture History Photos art
li Ukrainian Politician Has Got His Own Gilded Railway Car By englishrussia.com Published On :: Wed, 23 Mar 2022 13:19:11 +0000 The post Ukrainian Politician Has Got His Own Gilded Railway Car appeared first on English Russia. Full Article Photos Society crazy
li Soviet Life on the Photos of Vladimir Bogdanov By englishrussia.com Published On :: Thu, 24 Mar 2022 13:54:22 +0000 The post Soviet Life on the Photos of Vladimir Bogdanov appeared first on English Russia. Full Article History Photos Society photography
li Wicker Kremlin By englishrussia.com Published On :: Fri, 08 Apr 2022 08:04:57 +0000 The post Wicker Kremlin appeared first on English Russia. Full Article Art Culture Photos art
li Evils of Politicians in the Satirical Art of Semen Skrepetsky By englishrussia.com Published On :: Sun, 10 Apr 2022 12:26:53 +0000 The post Evils of Politicians in the Satirical Art of Semen Skrepetsky appeared first on English Russia. Full Article Art Culture Society art politics
li Soviet Helicopters By englishrussia.com Published On :: Tue, 26 Apr 2022 14:19:59 +0000 The post Soviet Helicopters appeared first on English Russia. Full Article History Photos Technology helicopters soviet ussr