If this was posted by them too I was about to lose it.
henfredemars
Wow, my fellow citizens are stupid.
I think the idea is that it’s easier to manage your resources in C++ if you write your code using RAII. Linux is mainly C, not C++, which makes resource management a little bit more manual.
Rust however categorically tries to stop these problems from happening in an even stronger way. You can still write bad code in any language, but it’s supposed to be a lot more difficult to get memory corruption.
Perhaps not. They might have to swear in the new Democrat they're currently blocking for a month now, which could possibly lead to the release of some iteration of the Epstein files.
Unfortunately there is significant overlap between plain-text-password-servers and servers that can't be bothered to use antivirus. Also, the string may not work if it's not at the start of the file. AV often doesn't process the whole file for efficiency purposes.
It is effective at discouraging bots when looking at real world services today, but indeed you have found the primary downside. It does impose costs on users even if the costs are disproportionately placed on bots.
Not directly, but as other comment has mentioned, it reduces the overall security posture because it could be combined with other flaws known and unknown.
The best part is there's already a default error handler! If the program dies, you know there was an error.
You need to be able to run code on the system that has the bug. The bug is in the netfilter component, in how it's managed on that system, not in the actual traffic flows.
Yes, that's right. You cannot have a UAF situation unless you're using unsafe "escape hatch" tools.
Monkey brain touch naked booty button. I think that's the strat.
Round peg, square hole?