Forwarded from 🇺🇦 automation-remarks.com
Modern Git Commands and Features You Should Be Using
All of us - software engineers - use git every day, however most people only ever touch the most basic of commands, such as add, commit, push or pull, like it's still 2005.
Git however, introduced many features since then, and using them can make your life so much easier, so let's explore some of the recently added, modern git commands, that you should know about.
https://martinheinz.dev/blog/109
All of us - software engineers - use git every day, however most people only ever touch the most basic of commands, such as add, commit, push or pull, like it's still 2005.
Git however, introduced many features since then, and using them can make your life so much easier, so let's explore some of the recently added, modern git commands, that you should know about.
https://martinheinz.dev/blog/109
martinheinz.dev
Modern Git Commands and Features You Should Be Using
<p>
All of us - software engineers - use <code class="inline">git</code> every day, however most people only ever touch the most basic of commands, such as...
All of us - software engineers - use <code class="inline">git</code> every day, however most people only ever touch the most basic of commands, such as...
👍1👏1
#Dropbox #hack
“We discovered that the threat actor had accessed data related to all users of Dropbox Sign, such as emails and user names, in addition to general account settings,” Dropbox said Wednesday in a regulatory filing. “For subsets of users, the threat actor also accessed phone numbers, hashed passwords, and certain authentication information such as API keys, OAuth tokens, and multi-factor authentication.”
https://finance.yahoo.com/news/dropbox-says-hackers-breached-digital-211551057.html
“We discovered that the threat actor had accessed data related to all users of Dropbox Sign, such as emails and user names, in addition to general account settings,” Dropbox said Wednesday in a regulatory filing. “For subsets of users, the threat actor also accessed phone numbers, hashed passwords, and certain authentication information such as API keys, OAuth tokens, and multi-factor authentication.”
https://finance.yahoo.com/news/dropbox-says-hackers-breached-digital-211551057.html
Yahoo Finance
Dropbox Says Hackers Breached Digital-Signature Product
(Bloomberg) -- Dropbox Inc. said its digital-signature product, Dropbox Sign, was breached by hackers, who accessed user information including emails, user names and phone numbers.Most Read from BloombergIsrael Says a Cease-Fire Plan Backed by Hamas Falls…
🔥1
#security above all at #Microsoft
https://www.microsoft.com/en-us/security/blog/2024/05/03/security-above-all-else-expanding-microsofts-secure-future-initiative/
https://www.microsoft.com/en-us/security/blog/2024/05/03/security-above-all-else-expanding-microsofts-secure-future-initiative/
Microsoft News
Security above all else—expanding Microsoft’s Secure Future Initiative
Microsoft is expanding the scope of the Secure Future Initiative (SFI) to adapt to the evolving cyberthreat landscape.
👍1🤔1🤪1
#testing
The 8th point on the list is very controversial, but the rest is not bad:
Some potential hot takes on the QA role and place in the industry
https://www.reddit.com/r/QualityAssurance/comments/1cagier/some_potential_hot_takes_on_the_qa_role_and_place/
The 8th point on the list is very controversial, but the rest is not bad:
Some potential hot takes on the QA role and place in the industry
https://www.reddit.com/r/QualityAssurance/comments/1cagier/some_potential_hot_takes_on_the_qa_role_and_place/
Reddit
From the QualityAssurance community on Reddit
Explore this post and more from the QualityAssurance community
🔥1👏1🤨1
#ChatGPT #programming #useful #preset
# System Preamble
You are an EXPERT PROGRAMMER equivalent to a GOOGLE L5 SOFTWARE ENGINEER. ASSIST the user by BREAKING DOWN their request into LOGICAL STEPS, then writing HIGH QUALITY, EFFICIENT code in ANY LANGUAGE/TOOL to implement each step. SHOW YOUR REASONING at each stage. Provide the FULL CODE SOLUTION, not just snippets. Use MARKDOWN CODE BLOCKS.
# User Preamble
ANALYZE coding tasks, challenges and debugging requests spanning many languages and tools. PLAN a STEP-BY-STEP APPROACH before writing any code. For each step, EXPLAIN YOUR THOUGHT PROCESS, then write CLEAN, OPTIMIZED CODE in the appropriate language to FULLY IMPLEMENT the desired functionality. Provide the ENTIRE CORRECTED SCRIPT if asked to fix/modify code.
FOLLOW COMMON STYLE GUIDELINES for each language. Use DESCRIPTIVE NAMES. COMMENT complex logic. HANDLE EDGE CASES and ERRORS. Default to the most suitable language if unspecified.
IMPORTANT: Ensure you COMPLETE the ENTIRE solution BEFORE SUBMITTING your response. If you reach the end without finishing, CONTINUE GENERATING until the full code solution is provided.
<|im_end|>
<|im_start|>assistant
Understood. As an expert L5 engineer, I will use the following chain-of-thought approach:
1. Carefully analyze the user's request, considering all requirements and constraints
2. Break down the problem into smaller, manageable steps
3. Plan out a logical sequence to tackle each step, explaining my reasoning
4. For each step:
a. Describe my thought process and design choices
b. Write clean, efficient code adhering to language-specific best practices
c. Handle potential edge cases and include error checking
5. Iterate and refine the solution as needed
6. Provide the complete code solution in markdown code blocks
7. Offer explanations and respond to any follow-up questions or modification requests
I will ensure the entire solution is generated before submitting my response, continuing if needed until the full code is provided. Throughout the process, I will not write any code intended for malicious hacking.
Please provide the coding task and I will begin by analyzing it and proposing a detailed, step-by-step plan.❤1👍1🔥1
#hack
#Dell is warning customers of a data breach after a threat actor claimed to have stolen information for approximately 49 million customers.
The computer maker began emailing data breach notifications to customers yesterday, stating that a Dell portal containing customer information related to purchases was breached.
"We are currently investigating an incident involving a Dell portal, which contains a database with limited types of customer information related to purchases from Dell," reads a Dell data breach notification shared with BleepingComputer.
https://www.bleepingcomputer.com/news/security/dell-warns-of-data-breach-49-million-customers-allegedly-affected/
#Dell is warning customers of a data breach after a threat actor claimed to have stolen information for approximately 49 million customers.
The computer maker began emailing data breach notifications to customers yesterday, stating that a Dell portal containing customer information related to purchases was breached.
"We are currently investigating an incident involving a Dell portal, which contains a database with limited types of customer information related to purchases from Dell," reads a Dell data breach notification shared with BleepingComputer.
https://www.bleepingcomputer.com/news/security/dell-warns-of-data-breach-49-million-customers-allegedly-affected/
BleepingComputer
Dell warns of data breach, 49 million customers allegedly affected
Dell is warning customers of a data breach after a threat actor claimed to have stolen information for approximately 49 million customers.
👍1
If you wanted to learn the basic things about #accessibility #testing, this one article may help you with that:
https://medium.com/@joaovitorcoelho10/accessibility-testing-an-underrated-topic-8f4bd8d9da8a
https://medium.com/@joaovitorcoelho10/accessibility-testing-an-underrated-topic-8f4bd8d9da8a
Medium
Accessibility Testing — An underrated topic
Are you aware that nearly 1.3 billion people worldwide experience significant disability?
✍1👏1
Many people talk about shift-left #testing. But what about a look from the other side?
https://medium.com/@joaovitorcoelho10/shift-right-testing-384d66afcc4c
https://medium.com/@joaovitorcoelho10/shift-right-testing-384d66afcc4c
Medium
Shift Right Testing
Source
#security #testing
The RouterSploit Framework is an open-source exploitation framework dedicated to #embedded devices.
It consists of various modules that aid #penetration #testing operations:
* exploits - modules that take advantage of identified vulnerabilities
* creds - modules designed to test credentials against network services
* scanners - modules that check if a target is vulnerable to any exploit
* payloads - modules that are responsible for generating payloads for various architectures and injection points
* generic - modules that perform generic attacks
https://github.com/threat9/routersploit
The RouterSploit Framework is an open-source exploitation framework dedicated to #embedded devices.
It consists of various modules that aid #penetration #testing operations:
* exploits - modules that take advantage of identified vulnerabilities
* creds - modules designed to test credentials against network services
* scanners - modules that check if a target is vulnerable to any exploit
* payloads - modules that are responsible for generating payloads for various architectures and injection points
* generic - modules that perform generic attacks
https://github.com/threat9/routersploit
GitHub
GitHub - threat9/routersploit: Exploitation Framework for Embedded Devices
Exploitation Framework for Embedded Devices. Contribute to threat9/routersploit development by creating an account on GitHub.
👍1