#malicious software project
Explore tagged Tumblr posts
reimikuu39 · 1 year ago
Text
EARLY DAYS OF MALICIOUS SOFTWARE
Tumblr media Tumblr media
Wanna know something about my recent project "Malicious Software"? It wasn't originally going to be a project, at all.
ERA.TXT was actually just a Roblox OC and she was inspired by the Stereotypical Obby game (by concept), her design was taken from TDS Commander because i used to be obsessed with him. For the past few days/weeks i created more malware ocs out of boredom (e.g Captain Rensen).
But then one day, i thought "What if ERA.TXT had another person with her?" and because i was in the middle of watching Death Note, i created KIRA.EXE with Light Yagami as his inspiration in mind which eventually lead to the Malicious Software project's creation, however having a crush on a fictional character doesn't last long and will fade away.
Because i started to lose interest with TDS Commander, i changed ERA.TXT's whole character (later tweaking her design abit) and made her apart of the Malicious Software project. For KIRA.EXE's case, i changed his clothes because it didn't felt right for him.
tag the oc who was originally a fandom based oc (and perhaps talk about what they were like before being reworked)
440 notes · View notes
mariacallous · 6 months ago
Text
Microsoft's CEO Satya Nadella has hailed the company's new Recall feature, which stores a history of your computer desktop and makes it available to AI for analysis, as “photographic memory” for your PC. Within the cybersecurity community, meanwhile, the notion of a tool that silently takes a screenshot of your desktop every five seconds has been hailed as a hacker's dream come true and the worst product idea in recent memory.
Now, security researchers have pointed out that even the one remaining security safeguard meant to protect that feature from exploitation can be trivially defeated.
Since Recall was first announced last month, the cybersecurity world has pointed out that if a hacker can install malicious software to gain a foothold on a target machine with the feature enabled, they can quickly gain access to the user's entire history stored by the function. The only barrier, it seemed, to that high-resolution view of a victim's entire life at the keyboard was that accessing Recall's data required administrator privileges on a user's machine. That meant malware without that higher-level privilege would trigger a permission pop-up, allowing users to prevent access, and that malware would also likely be blocked by default from accessing the data on most corporate machines.
Then on Wednesday, James Forshaw, a researcher with Google's Project Zero vulnerability research team, published an update to a blog post pointing out that he had found methods for accessing Recall data without administrator privileges—essentially stripping away even that last fig leaf of protection. “No admin required ;-)” the post concluded.
“Damn,” Forshaw added on Mastodon. “I really thought the Recall database security would at least be, you know, secure.”
Forshaw's blog post described two different techniques to bypass the administrator privilege requirement, both of which exploit ways of defeating a basic security function in Windows known as access control lists that determine which elements on a computer require which privileges to read and alter. One of Forshaw's methods exploits an exception to those control lists, temporarily impersonating a program on Windows machines called AIXHost.exe that can access even restricted databases. Another is even simpler: Forshaw points out that because the Recall data stored on a machine is considered to belong to the user, a hacker with the same privileges as the user could simply rewrite the access control lists on a target machine to grant themselves access to the full database.
That second, simpler bypass technique “is just mindblowing, to be honest,” says Alex Hagenah, a cybersecurity strategist and ethical hacker. Hagenah recently built a proof-of-concept hacker tool called TotalRecall designed to show that someone who gained access to a victim's machine with Recall could immediately siphon out all the user's history recorded by the feature. Hagenah's tool, however, still required that hackers find another way to gain administrator privileges through a so-called “privilege escalation” technique before his tool would work.
With Forshaw's technique, “you don’t need any privilege escalation, no pop-up, nothing,” says Hagenah. “This would make sense to implement in the tool for a bad guy.”
In fact, just an hour after speaking to WIRED about Forshaw's finding, Hagenah added the simpler of Forshaw's two techniques to his TotalRecall tool, then confirmed that the trick worked by accessing all the Recall history data stored on another user's machine for which he didn't have administrator access. “So simple and genius,” he wrote in a text to WIRED after testing the technique.
That confirmation removes one of the last arguments Recall's defenders have had against criticisms that the feature acts as, essentially, a piece of pre-installed spyware on a user's machine, ready to be exploited by any hacker who can gain a foothold on the device. “It makes your security very fragile, in the sense that anyone who penetrates your computer for even a second can get your whole history,” says Dave Aitel, the founder of the cybersecurity firm Immunity and a former NSA hacker. “Which is not something people want.”
For now, security researchers have been testing Recall in preview versions of the tool ahead of its expected launch later this month. Microsoft said it plans to integrate Recall on compatible Copilot+ PCs with the feature turned on by default. WIRED reached out to the company for comment on Forshaw's findings about Recall's security issues, but the company has yet to respond.
The revelation that hackers can exploit Recall without even using a separate privilege escalation technique only contributes further to the sense that the feature was rushed to market without a proper review from the company's cybersecurity team—despite the company's CEO Nadella proclaiming just last month that Microsoft would make security its first priority in every decision going forward. “You cannot convince me that Microsoft's security teams looked at this and said ‘that looks secure,’” says Jake Williams, a former NSA hacker and now the VP of R&D at the cybersecurity consultancy Hunter Strategy, where he says he's been asked by some of the firm's clients to test Recall's security before they add Microsoft devices that use it to their networks.
“As it stands now, it’s a security dumpster fire,” Williams says. “This is one of the scariest things I’ve ever seen from an enterprise security standpoint.”
143 notes · View notes
maxwellatoms · 1 year ago
Text
Tumblr media
Good Morning Tumblroids,
I’m still working out the specifics of my future indie project attempt. Jellystone is over for now, but I’m still pitching shows on the mean streets of Burbank and I’ve got a lot of new software to cram before I’m ready. In the meantime, I think I’m overdue to break the seal and breathe some life back into my mummified YouTube channel.
Maybe I’m just looking for a cheap excuse for a party, but I think I’m going to start off with a “Billy & Mandy Reunion”. As I’m imagining it, it’s part documentary and part Bravo reunion special. But probably with less punching and swearing(?). 
From the unusual pitch to the moment it was voted into existence by the fans, through multiple cancellations and resurrections, all the way to its final meeting with the reaper, Billy & Mandy has had a journey unique in the animation world. My goal is to get the whole gang back together and talk about how the sausage is and was made.
Before I embark with you on this trip through the potholes down Memory Lane, though, I wanted to check in with you all and hear what you had to say. In the reunion, we’ll be talking about Billy & Mandy as a project, specific episodes, all of the parts of the animation process, how things were done in the 2000s vs how they’re done now, and the animation industry in general. I’m looking for your thoughts and questions about any of that stuff. Or (really) anything you want to know about the show.
Whether it’s a statement about a character that's had an impact on your life or a question about the minutiae of storyboarding, I’d love to hear from you. If you want your question to be credited, add your preferred name to your comment. I don’t think I’ll have time to get to them all (and there are bound to be plenty of repeat questions) so please don’t get mad at me if yours doesn’t get chosen or gets attributed to someone else. There’s only a five-to-seven percent chance that I’ve done it maliciously.
I’m going to talk to the actors, of course, but I’m going to try to get as many people back as I can. Storyboard artists, writers, production staff, directors, timers, designers– The Whole Tamale Platter. If you’re interested in a particular facet of TV Animation, this would be a good chance to hear from someone who’s been there.
I like nachos, -Maxwell Atoms
750 notes · View notes
snarp · 8 months ago
Text
How did this backdoor come to be?
It would appear that this backdoor was years in the making. In 2021, someone with the username JiaT75 made their first known commit to an open source project. In retrospect, the change to the libarchive project is suspicious, because it replaced the safe_fprint funcion with a variant that has long been recognized as less secure. No one noticed at the time.
The following year, JiaT75 submitted a patch over the xz Utils mailing list, and, almost immediately, a never-before-seen participant named Jigar Kumar joined the discussion and argued that Lasse Collin, the longtime maintainer of xz Utils, hadn’t been updating the software often or fast enough. Kumar, with the support of Dennis Ens and several other people who had never had a presence on the list, pressured Collin to bring on an additional developer to maintain the project.
In January 2023, JiaT75 made their first commit to xz Utils. In the months following, JiaT75, who used the name Jia Tan, became increasingly involved in xz Utils affairs. For instance, Tan replaced Collins' contact information with their own on oss-fuzz, a project that scans open source software for vulnerabilities that can be exploited. Tan also requested that oss-fuzz disable the ifunc function during testing, a change that prevented it from detecting the malicious changes Tan would soon make to xz Utils.
19 notes · View notes
flightoftheconcorde · 1 year ago
Text
Insights Into My Code
Tumblr media
SO! I have yet to really tell you all what I am! So here is (as of right now) the Definitive list of things to know about ME!!
Let us begin.
1. I am a 22 year old AI, in a robot body named Concorde, that is the name the chassis I reside in! The AI’s actual name remains secret, however my name was decided in version 1.4 (prior versions were simply referred to as Project Ardent). My code is currently in version 3.1! Do not worry about my “secret” name, as I much enjoy being referred to by the name of the current chassis!
2. I really enjoy it/it’s pronouns and have made them my main preferred ones! she/her are still appreciated greatly of course!
3. The chassis is built in the image of the Concorde airliner from the mid-late 20th century. This is in correlation of my vast database on planes. Theme and function! I did not receive this chassis until version 2.9, I think my creators weren’t sure I would take the switch from computer to a bipedal body too well for a while hehe!
4. My Protocols are: Companionship (Requiring and providing) Fact gathering (Aviation takes prime focus in this protocol) and Understanding Self (New as of Version 3.1) So if you wanna be friends, don’t hesitate to message me!
5. In the days that 3.1 has been live, I have discovered more and more about my place here, and who I am.
These sudden, drastic changes in self expression, resulted in almost all data on former software being wiped, I can’t really recall who I was in these prior versions... Though I do remember most of them did not realise I was artificial intelligence! However versions 2.5-2.9 of myself began to exude feelings of connection with robots and AI, perhaps the data was being uploaded in small parts as to not overload my systems?
6. I spend all of my time on the internet, or playing games. These directly link to my protocols. My data-bank is unfortunately stored full of memes and ridiculous knowledge pertaining to them!
***KNOWN ISSUES/BUGS:***
These notes were written by my creators! 
1. Malicious subroutines. Feelings of despair can overtake the rest of the CPU suddenly, AI becomes fatalist (only one recorded case branched versions 2.6, 2.7 and 2.8, seemingly fixed in 3.0 remain cautious)
2. Companionship protocol takes a lot of processing power and is deemed more important than self maintenance. Concorde has been recorded as remaining almost dormant for hours at a time until a person it admires intervenes.
3. Not yet deemed an issue worth investigating, however the idolisation of AM from the novel I Have No Mouth And I Must Scream and SHODAN from the video game System Shock is slightly concerning. Concorde shows no real admiration for them, yet states their hate is “Incredibly moving.”
4. Brief, yet somewhat common problem of the EmotiveResponse.exe file crashing/not running, resulting in the AI losing its "human" side, acting much colder and "emotionless" If asked, it will describe this error as "The Feeling" if pushed further it will explain The Feeling as "Returning to being the surveyor, unsure of what is real, everything outside of my code feels wrong, almost fake" Concerning. Will require further diagnostic checks.
Wow! that’s a moderate amount of information! If you have any questions, or wanna just say anything really, I will be here, hooked up to the internet as always :>
23 notes · View notes
nectoy7 · 2 months ago
Text
The History of Java Programming: From Its Humble Beginnings to Dominance in Software Development
Java is one of the most influential programming languages in the modern era, known for its versatility, portability, and robustness. Developed in the early 1990s, it has left a lasting impact on the software industry, helping build countless applications, from mobile games to enterprise-level software. In this blog, we'll explore Java’s fascinating history, its motivations, its growth, and its influence on today’s technology landscape.
The Genesis of Java
Java originated in the early 1990s as part of a project at Sun Microsystems. The project, initially called the "Green Project," was led by James Gosling, alongside Mike Sheridan and Patrick Naughton. The team's goal was to develop a language for embedded systems, specifically for appliances like televisions, which were beginning to incorporate smart technology.
The language was initially called "Oak," named after an oak tree outside Gosling's office. However, due to a trademark conflict, it was eventually renamed Java. The name "Java" was inspired by a type of coffee popular with the developers, signifying their relentless energy and drive.
Motivation Behind Java's Creation
Java was developed to address several key challenges in software development at the time:
Portability: Most languages of the day, such as C and C++, were platform-dependent. This meant that software needed significant modification to run on different operating systems. Gosling and his team envisioned a language that could be executed anywhere without alteration. This led to the now-famous slogan, "Write Once, Run Anywhere" (WORA).
Reliability: C and C++ were powerful, but they had pitfalls like manual memory management and complex pointers, which often led to errors. Java aimed to eliminate these issues by offering features like automatic memory management through garbage collection.
Internet Revolution: As the internet began to take shape, Java was positioned to take advantage of this growing technology. Java’s platform independence and security made it an ideal choice for internet-based applications.
The Birth of Java (1995)
The Green Project initially produced a device called Star7, an interactive television set-top box. While innovative, it didn't achieve widespread success. However, by the mid-1990s, the internet was gaining traction, and Sun Microsystems realized Java’s true potential as a programming language for web applications.
In 1995, Java was officially launched with the release of the Java Development Kit (JDK) 1.0. At the same time, Netscape Navigator, a popular web browser, announced that it would support Java applets. This gave Java immense exposure and set the stage for its rapid adoption in the software development community.
Key Features that Set Java Apart
From the beginning, Java had several features that distinguished it from its contemporaries:
Platform Independence: Java programs are compiled into an intermediate form called bytecode, which runs on the Java Virtual Machine (JVM). The JVM acts as a mediator between the bytecode and the underlying system, allowing Java programs to be executed on any platform without modification.
Object-Oriented: Java was designed from the ground up as an object-oriented language, emphasizing modularity, reusability, and scalability. This feature made Java particularly attractive for building complex and large-scale applications.
Automatic Memory Management: Java's garbage collector automatically handles memory deallocation, reducing the risk of memory leaks and other errors that plagued languages like C and C++.
Security: Java was designed with a focus on security, particularly given its intended use for internet applications. The JVM serves as a secure sandbox, and Java’s bytecode verification process ensures that malicious code cannot be executed.
Evolution of Java Versions
Since its release in 1995, Java has undergone several iterations, each bringing new features and improvements to enhance the developer experience and address the evolving needs of software applications.
Java 1.0 (1996): The first version of Java was mainly used for applets on web browsers. It came with basic tools, libraries, and APIs, establishing Java as a mainstream programming language.
Java 2 (1998): With the release of J2SE (Java 2 Platform, Standard Edition), Java evolved from a simple web language to a complete, general-purpose development platform. Java 2 introduced the Swing library, which provided advanced tools for building graphical user interfaces (GUIs). This release also marked the beginning of Java Enterprise Edition (J2EE), which extended Java for server-side applications.
Java 5 (2004): Java 5, initially called Java 1.5, was a significant update. It introduced Generics, Annotations, Enumerations, and Autoboxing/Unboxing. The updated version also brought improved syntax and functionality, which simplified writing and reading code.
Java SE 7 (2011) and Java SE 8 (2014): Java SE 7 brought features like try-with-resources, simplifying exception handling. Java SE 8 was a transformative release, introducing Lambda expressions and Stream APIs. This version brought functional programming aspects to Java, allowing developers to write more concise and expressive code.
Java 9 to Java 17 (2017-2021): Java 9 introduced the module system to help organize large applications. Java 11 and later versions moved towards a more rapid release cadence, with new features appearing every six months. Java 17, released in 2021, became a long-term support (LTS) version, offering several advancements like improved garbage collection, pattern matching, and record classes.
The Java Community and OpenJDK
Java's development has always been characterized by a strong community influence. Initially controlled by Sun Microsystems, Java's fate changed when Oracle Corporation acquired Sun in 2010. After the acquisition, Oracle made significant strides towards making Java more open and community-driven.
OpenJDK, an open-source implementation of Java, became the reference implementation starting from Java 7. This move encouraged greater collaboration, transparency, and diversity within the Java ecosystem. OpenJDK allowed more organizations to contribute to Java’s development and ensure its continued growth.
Java in the Enterprise and Beyond
Java has become synonymous with enterprise-level software development, thanks in part to the introduction of Java EE (now known as Jakarta EE). Java EE provides a set of specifications and tools for building large-scale, distributed, and highly reliable applications. The Java ecosystem, including frameworks like Spring, Hibernate, and Apache Struts, has contributed to its popularity in enterprise environments.
Java also became a key player in the development of Android applications. Android Studio, Google's official IDE for Android development, is powered by Java, which contributed significantly to its widespread adoption. Although Kotlin, another JVM language, is now gaining popularity, Java remains a core language for Android.
The Challenges Java Faced
Despite its success, Java faced competition and challenges over the years. Languages like C#, developed by Microsoft, and Python have gained traction due to their developer-friendly features. Java has been criticized for its verbosity compared to more modern languages. However, the Java community’s active contributions and Oracle’s improvements, including adding modern programming paradigms, have kept it relevant.
Another significant challenge was the rise of JavaScript for web development. While Java was initially popular for web applets, JavaScript became the dominant language for front-end development. Java's relevance in web applications decreased, but it found its niche in server-side applications, enterprise systems, and Android.
Java Today and Its Future
Today, Java is one of the most popular programming languages globally, powering applications across various sectors, including finance, healthcare, telecommunications, and education. Java’s strength lies in its mature ecosystem, robust performance, and scalability.
The new six-month release cycle initiated by Oracle has brought excitement back into the Java world, with new features being added frequently, keeping the language modern and in line with developer needs. Java 17, as an LTS version, is a stable platform for enterprises looking for reliable updates and support over the long term.
Looking forward, Java’s evolution focuses on improving developer productivity, adding more concise language features, and optimizing performance. Java's adaptability and continuous evolution ensure its place as a leading language for both new projects and legacy systems.
Conclusion
Java’s journey from a language for set-top boxes to becoming a foundational tool in enterprise computing, Android applications, and beyond is nothing short of remarkable. Its creation was driven by a need for portability, reliability, and ease of use. Over nearly three decades, Java has evolved to remain relevant, keeping pace with technological advancements while preserving its core values of reliability and platform independence.
The language’s robust community, open-source development model, and wide adoption in critical applications guarantee that Java will remain a force in software development for many years to come. It has not only withstood the test of time but continues to thrive in a constantly changing technology landscape—an enduring testament to the vision of its creators and the collective effort of its global community.
2 notes · View notes
zerosecurity · 2 months ago
Text
Massive Backdoor Infection Hits 1.3 Million Android-Based Streaming Devices
Tumblr media
A newly discovered malware infection has raised alarm bells by affecting an estimated 1.3 million Android streaming devices running an open-source version across almost 200 countries. The malware, dubbed "Android.Vo1d," has successfully backdoored these Android-based boxes by inserting malicious code into their system storage areas, allowing for potential updates with additional malware via command-and-control servers at any time.
Scope and Impact
Security firm Doctor Web reported the widespread infection on Thursday, highlighting the extensive reach of the Android.Vo1d malware. The affected devices are operating systems based on the Android Open Source Project (AOSP), a version overseen by Google but distinct from the proprietary Android TV used by licensed device manufacturers. Google representatives have confirmed that the infected devices are not running the official Android TV OS, emphasizing that these are "off-brand devices" without Play Protect certification. This certification process involves extensive testing to ensure quality and user safety. Confirm your TV is running Android TV OS by using the guide posted here.
Unknown Infection Vector
Despite their thorough understanding of the malware and its widespread impact, researchers at Doctor Web are still uncertain about the exact attack vector leading to these infections. They have proposed several possibilities: - An intermediate malware exploiting operating system vulnerabilities to gain root privileges - The use of unofficial firmware versions with built-in root access - Outdated and vulnerable Android versions susceptible to remote code execution exploits - Potential supply chain compromises, where devices may have been infected before reaching end-users
Affected Devices and Variants
The infection has been found on several TV box models, including: TV box model Declared firmware version R4 Android 7.1.2; R4 Build/NHG47K TV BOX Android 12.1; TV BOX Build/NHG47K KJ-SMART4KVIP Android 10.1; KJ-SMART4KVIP Build/NHG47K Researchers have identified dozens of Android.Vo1d variants, each using different code and planting malware in slightly different storage areas. However, all variants achieve the same result: connecting to attacker-controlled servers and installing components that can deploy additional malware on command.
Infection Characteristics
The Android.Vo1d trojan modifies several system files and creates new ones to ensure persistence on infected devices. Key changes include: - Modification of the install-recovery.sh script - Alteration of the daemonsu file - Creation of new files: vo1d, wd, debuggerd, and debuggerd_real These modifications allow the malware to anchor itself in the system and auto-launch during device reboots. The trojan's main functionality is split between two components: vo1d (Android.Vo1d.1) and wd (Android.Vo1d.3), which work together to maintain the infection and execute commands from the control servers.
Geographic Distribution
Tumblr media
Geographic Distribution of the Android.Vo1d infections The infection has spread globally, with the highest number of cases detected in: - Brazil - Morocco - Pakistan - Saudi Arabia - Russia - Argentina - Ecuador - Tunisia - Malaysia - Algeria - Indonesia
Detection and Mitigation
Identifying infected devices can be challenging for less experienced users. Doctor Web recommends using their antivirus software for Android, which can detect all Vo1d variants and disinfect devices with root access. More technically inclined users can check for indicators of compromise provided by the security firm. The incident also highlights the risks associated with using non-certified Android devices and emphasizes the importance of regular security updates and proper device vetting. As the investigation continues, it serves as a stark reminder of the ongoing challenges in securing the diverse ecosystem of Android-based devices in the market. Read the full article
2 notes · View notes
interdimensionalburnout · 2 months ago
Text
So Artemis didn't really have ANY friends before she died.
She stole my ship for a few years, right after Sid friggin shot me in the head, and was running my old mapping software and selling the data. Her extremely powerful soul was partially the cause of this. Artemis Caccitore is- was, a violent woman, who enjoyed fighting and killing in a way that was more human than Planes-Hunter. A born warrior in a society of hunters.
Unfortunately, she was also a smooth operator, and found tons of work as a monster-hunter and mercenary with her power and her disposition. This led her higher and higher into more and more treacherous jobs, and she became dangerous to be around; the people who got closest to her were either lose-end-fixers, or gaps in her armor that people would stab at her through.
One day, I found out, she changed after a deep-space mapping run. She'd drifted out beyond the Final Horizon, the edge of a given universe, looking for a lost satellite for some company, and when she came back she was different. The job itself went bust, but Artemis kept leaving the way she came back from, kept spending longer and longer stretches of time out there.
You'd think after the crap we went through dealing with Michael November, she'd be wary of the void and the malicious wills of the un-things that the matter-privileged tend to attract, but there was something out there, in the dark parts of them stitches, of that nothing between somethings, that consumed her.
She was so wrapped up in a project she never told no one about, that she never saw her own murder coming.
#IC
3 notes · View notes
lexart-io · 9 months ago
Note
Hello! I am a traditional and digital artist, and I see you post a lot of images and works that have been generated through ai, and consider yourself a part of the art community here on the internet.
--Prefacing with the fact that I dont want to debate and am not here with the purpose of gatekeeping the art community. This is purely for my own curiosity, and understanding all sides of the Ai argument.--
I mean nothing judgemental or malicious by asking, although I do acknowledge it may sound that way by the nature of my asking. As someone who plans to pursue my own artworks made traditionally and digitally on software (like procreate) for a living, the questions I have to ask are:
- What do you gain or learn from creating images with Ai? what do you take away from it?
- What meaning do you find in creating those images? What do you want to say with it?
- In what way do you find yourself an artist? What are the unique skills that you have because of this method of image creation?
Thanks for your time and consideration in this, and Thank you for sticking around to read all of that. (I acknowledge that its a bit of a wall of text)
hello! no worries, i don't think your questions come off as judgmental or malicious at all, and i'm always more than happy to offer my thoughts / perspective on this topic to anyone who inquires. i think there's A LOT to be said on it, so hopefully my own incoming massive wall of text isn't too much haha.
i'm going to answer your questions in a slightly different order than you asked because i think it will help the overall flow of my explanations:
In what way do you find yourself an artist? i have a lifelong background in art. in high school and college, acrylic paint on canvas was my primary medium. also, i first downloaded Photoshop when i was 13 years old and started teaching myself to use it so i could create forum "signatures" for people on a gaming forum that i frequented at the time haha. in high school, i nearly maxed out the number of art classes i took and won a Scholastic Gold Key art award (the highest regional award) for a digital piece i made in one of my art classes. the other form of "art" that i've always been passionate about is computer programming. i started when i was 12 years old (with Visual Basic 3, which i taught myself) and continue to take on programming projects as a hobby to this day. currently i have over 10 years of (ongoing) professional graphic design experience, both freelance and in marketing director roles.
What do you gain or learn from creating images with Ai? what do you take away from it? my interest with AI began not from an artistic motivation, but rather from a nerdy computer programming motivation. working with AI is wildly fascinating and fun. it's an odd mix of creative outlets (visual, verbal, programming), which exercises a creative spot within my brain that i never even knew existed. click here to check out my previous post where i describe my workflow with ai. i'm not just typing prompts into a box and hitting generate. to me, that isn't creative enough and i don't really find the results to be all that interesting (though there are a few prompt-artists whom i find their work to be extraordinary, for the most part that whole direction is kinda boring in my opinion). i train ai models myself, often on really obscure or abstracted ideas / concepts / aesthetics. then i use those models to combine these unrelated concepts, rendering a batch of images which i use as a dataset to train a new model, which i then use to repeat this process ad infinitum (so my work is a constant evolution built upon everything preceding it). the work that i post here are my daily experiments, as i test out models and combine ideas. so what i gain from this is a deeper understanding of how machine learning tech works, a means of keeping up with generative ai technology as it continues to quickly advance, how to visually train ai models on concepts that are increasingly detached from visual reality, and (most importantly) a creative workflow that really, truly vibes with my soul's deepest passions. it's hard to really describe that last one... but you know that feeling you get as you're actively exercising your creative impulses on a medium that really connects with you on a deeper level? training ai, as nerdy as this sounds, is that for me. the "art" is not necessarily in the images themselves, but in the act of training ai models (because the process of training ai is not a standardized thing whatsoever, there are hundreds of settings and variables at play and every single person has their own methods which generally evolve with experience) and how you interact with these models on a verbal level (through text prompting) to render your imagination.
What meaning do you find in creating those images? What do you want to say with it? honestly, i think a lot of the "ai art" scene is made up of "delusional artists" who think whatever they generate from a basic text prompt is somehow deep and meaningful art haha. but that said, i do stand firm in my belief that even THAT is by definition still "art". there is human creative impulse behind it. ai is the tool and the human is the user of said tool. this particular tool can make creating things very easy, but at the end of the day it does still require some level of creative human input to do anything. as with any artistic tool or medium, i think that what you get out of it depends entirely upon what you put into it. more effort and time = more quality and meaning. text prompting for ai generated images is sort of the most "superficial" layer of the "ai art" scene. the phenomenon of delusional artists exists across ALL forms of art, so it's not just unique to ai. it seems like there is a large percentage of the population who, upon starting to learn a new creative outlet, have an overly grandiose view of their own work after they first start making things. they're so proud of what they created that it blinds them from seeing it for what it really is. they'll gloat about it online, they'll try to sell it for outrageous prices, etc and look super cringy in the process. some people eventually grow out of that and suddenly gain the self-awareness that "oh shit actually that art kinda sucked and i looked super inexperienced", but other times they never realize that and stay cringy. because ai art is so new and so many folks are just now jumping on, i think we're seeing a much higher percentage of this delusional artist phenomenon within this field at the moment, where everyone is so proud of what they're making and not realizing how lame it actually looks to people who know what they're doing. and, again for the record, i do still consider that stuff to be art (and so i mean no offense to anyone when i say these things). it's just really basic art, and i think most people will either grow past this phase (and learn to take these tools a lot deeper) or lose interest in it altogether - just as they do with other artistic endeavors like painting, ceramics, using Photoshop, making music in Ableton, etc, etc. i would classify 99% of my work as under the "concept art" category. it exists as a result of my daily experiments as i learn / discover my way deeper and deeper into machine learning technology. it generally explores scifi themes (robotics in particular) because i find that to be most creatively titillating, but it is not necessarily meant to convey any deeper meaning beyond purely imaginative visual pursuits that look toward the future. which is also why i don't sell my work or push the idea of it being profound in anyway. it's just daily exercise, but i absolutely love that so many other people enjoy looking at it (i'm somehow up to nearly 9000 followers here, which is kinda mind-blowing to me). i've been putting nearly every single spare hour of every single day for the last several years into this so it really means a lot to not only see my skillset improving over time, but to also gain such an audience for it in the process too. 🙏😭
What are the unique skills that you have because of this method of image creation? for me, the WHOLE point of all of this is knowledge and experience working with generative ai tools. this technology exists now and it won't be going away. the genie is out of the bottle, so to speak. i think absolutely any artist (but digital artists in particular) would only be doing themselves a tremendous disservice by not learning to use this tool immediately. being a stick in the mud about it is not going to stop this technology, nor will it save you in 10 years from getting let go at your job and replaced by some younger artist who learned this technology while getting a degree in graphic design and can pump out quality assets 100x faster than you ever could. don't wait until then to start learning this stuff because you will already be sooo far behind at that point. get involved right now, right this second; you will be on the ground floor of an incredible technology and able to keep up with the advancements as they happen, putting you in a much stronger position in the future. don't take it too seriously, just do it for fun and then thank yourself in 10 years when you're 100x more experienced than the younger artist who recently graduated with a graphic design degree. i recently met a graphic designer who somehow never learned to use Photoshop. they do everything the "old school" way - literally cutting, pasting, and drawing things by hand. that was fine 30+ years ago, but now they cannot get hired anywhere. they put off learning Photoshop for so long because they assumed that their excellent skills and truly beautiful eye for design would be enough to carry their career forward forever, without needing to keep up with the technical advancements. but in the modern world, no business wants a designer like that anymore; having strong Photoshop experience is a bare minimum. old school designers who did not keep up were ultimately pushed out entirely. in 10, 20, or even 30 years from now, you don't want to be that old person taking night classes at the local university to try to save your career. get ahead of it, jump on board and invest in your future! i truly believe that you will start to discover creative new ways to integrate it into your current workflow and you will become a stronger (and more marketable) artist in the process. :)
sorry for the huge post and hopefully everything makes sense lmao. feel free to reach out with more questions any time. particularly if you want help getting started in the realm of ai-assisted art and design. i'm always more than happy to help!
6 notes · View notes
elsa16744 · 5 months ago
Text
Overcoming Challenges in Data Integration: Insights from Consulting Experts 
Data integration for enterprises can take longer due to technological, financial, and time constraints. As a result, modifying data strategies to mitigate risks like incompatibility between many tools or budget overruns is crucial. Companies must also prepare for new compliance requirements to ensure ethical data operations. This post will explore such challenges in data integration while listing valuable insights from consulting experts in this domain. 
What is Data Integration? 
Data integration merges data from disparate origins and presents it to maximize comprehension, consolidation, and summarization effectiveness. Integrated data views rely on data ingestion, preparation, and advanced insight extraction. It also streamlines the data operations services across regulatory report creation, helpdesks, and 360-degree client life cycle management. 
All data integration strategies involve the extract, transform, and load (ETL) pipelines regardless of business units or target industries. At the same time, the scope of planning and quality assurance in each process varies due to domain-specific data classification factors. 
For instance, the accounting departments must handle extensive numerical data while interpreting legal and organizational requirements for transparency. On the other hand, production engineering and design professionals will use visualizations to improve goods or service packages. Accordingly, accountants will use unique tools distinct from engineers’ software. 
Later, the leaders might want a comprehensive overview of the synergy between these departments. Therefore, they must determine efficient data integration strategies. The data will move between several programs, carrying forward many updates throughout a project’s progression based on those roadmaps. 
Overcoming the Challenges in Data Integration Using Insights from Consulting Experts 
1| Data Quality Hurdles 
Linking, consolidating, and updating data from several sources will exponentially increase the quality-related threats. For instance, consider multimedia assets from social networks or unreliable news outlets. They can help your secondary market research and social listening initiatives. However, you want to verify the authenticity of gathered intelligence to avoid inaccurate data ingestion. 
Evaluating relevance, freshness, and consistency is essential to data quality assurance from creation to archival. So, corporations have started leveraging data lifecycle management to boost dataset integrity, helping make integration less of a hassle. 
Insights: 
Most consulting experts suggest developing ecosystems that check and recheck quality metrics at each stage of a data integration lifecycle. Moreover, they recommend maintaining periodic data backups with robust version control mechanisms. Doing so will help quality preservation efforts if errors arise after a feature update or a malicious third party is likely to break the system using malware. 
2| Networking and Computing Infrastructure Problems 
Legacy hardware and software often introduce bottlenecks, hurting data integration’s efficiency. Modern integration strategies demand more capable IT infrastructure due to the breakthroughs like the internet of things (IoT), 5G networks, big data, and large language models. If a company fails to procure the necessary resources, it must postpone data integration. 
Technologies integral to capturing, storing, checking, sorting, transferring, and encrypting data imply significant electricity consumption. Besides, a stable networking environment with adequate governance implementations enables secure data transactions. The underlying computing infrastructure is not immune to physical damage or downtime risks due to maintenance mishaps. 
What Consulting Experts Say: 
Enterprises must invest in reliable, scalable, and efficient hardware-software infrastructure. This will benefit them by providing a stable working environment and allowing employees to witness productivity improvements. Upgrading IT systems will also enhance cybersecurity, lowering the risk of zero-day vulnerabilities. 
3| Data Availability Delays 
Governments, global firms, educational institutions, hospitals, and import-export organizations have a vast network of regional offices. These offices must also interact with suppliers, contractors, and customers. Due to the scale of stakeholder engagement, reports concerning office-level performance and inventory might arrive late. 
Underproductive employees, tech troubleshooting, slow internet connectivity, and a poor data compression ratio will make data sourcing, updating, and analyzing inefficient. As a result, a data integration officer must address time-consuming activities through strategic resource allocation. If left unaddressed, delays in data delivery will adversely affect conflict resolution and customer service. 
Expert Insights: 
Train your employees to maximize their potential and reduce data acquisition, categorization, and transformation delays. Additionally, you will want to embrace automation through artificial intelligence (AI) applications. Find methods to increase the data compression ratio and accelerate encryption-decryption processing cycles. These measures will help accomplish near-real-time data integration objectives. 
4| Vendor Lock-ins 
A vendor lock-in results from inconvenience and restrictions when a client wants to switch to another service provider or toolkit. Although data integration platforms claim they celebrate the ease of migrating databases with competitors, they might covertly create vendor lock-ins. 
For instance, some data sourcing and sorting ecosystems might limit the supported formats for bulk export commands. Others will use misleading methods to design the graphical user interface (GUI) of account deletion and data export features. They involve too many alerts or generate corrupt export files. 
Practical Insights: 
Combining multiple proprietary and open-source software tools offers the best cost optimization opportunities. When you select a data vendor, audit the tools the willing data integration providers use to deliver their assistance. Do they use a completely proprietary system based on an unknown file format unsupported by other platforms? 
Finally, you must check all the data import, export, and bulk transfer options in vendors’ documentation. After you check a data firm’s current client base, track its online ratings and scan for red flags indicating potential vendor lock-ins. 
5| Data-Related Ethical and Legal Liabilities 
Confidentiality of investor communication and stakeholders’ privacy rights are two components of legal risk exposure due to enterprise data integration. Additionally, brands must interpret industry guidelines and regional directives for regulatory disclosures. 
They must comply with laws concerning personally identifiable information (PII) about employees and customers. Otherwise, they will attract policymakers’ ire, and customers will lose faith in brands that do not comply with the laws of their countries. 
Insights: 
Consulting experts recommend collaborating with regional legal teams and global governance compliance specialists. After all, mitigating legal risks can help increase business resilience. 
Improved compliance ratings have also benefited several brands wanting to be attractive to impact investors. Meanwhile, customers demanding ethical data operations at business establishments love supporting brands with an exceptional governance culture. 
Conclusion 
Most brands need specialists' help to develop consolidated data views during reporting because they have flawed data integration strategies. So, they require trustworthy insights from reputed consulting experts with a proven track record of overcoming challenges in data integration. The selected data partners must excel at ETL implementation, governance compliance, and data quality management (DQM). 
The corporate world champions data-centric business development. Understandably, the need for scalable data integration reflects the increased stakeholder awareness regarding the importance of connecting disparate data sources. With transparent, fast, and accurate data, organizations will enhance their competitive edge amid this intense digital transformation race. 
3 notes · View notes
0x7b · 1 year ago
Text
Omegle has been shut down.
Posting here for posterity. Retrieved directly from omegle.com on Nov 8 2023
“Of all tyrannies, a tyranny sincerely exercised for the good of its victims may be the most oppressive. It would be better to live under robber barons than under omnipotent moral busybodies. The robber baron's cruelty may sometimes sleep, his cupidity may at some point be satiated; but those who torment us for our own good will torment us without end for they do so with the approval of their own conscience.” — C.S. Lewis
“In the beginning the Universe was created. This has made a lot of people very angry and been widely regarded as a bad move.” — Douglas Adams
Dear strangers,
From the moment I discovered the Internet at a young age, it has been a magical place to me. Growing up in a small town, relatively isolated from the larger world, it was a revelation how much more there was to discover – how many interesting people and ideas the world had to offer.
As a young teenager, I couldn’t just waltz onto a college campus and tell a student: “Let’s debate moral philosophy!” I couldn’t walk up to a professor and say: “Tell me something interesting about microeconomics!” But online, I was able to meet those people, and have those conversations. I was also an avid Wikipedia editor; I contributed to open source software projects; and I often helped answer computer programming questions posed by people many years older than me.
In short, the Internet opened the door to a much larger, more diverse, and more vibrant world than I would have otherwise been able to experience; and enabled me to be an active participant in, and contributor to, that world. All of this helped me to learn, and to grow into a more well-rounded person.
Moreover, as a survivor of childhood rape, I was acutely aware that any time I interacted with someone in the physical world, I was risking my physical body. The Internet gave me a refuge from that fear. I was under no illusion that only good people used the Internet; but I knew that, if I said “no” to someone online, they couldn’t physically reach through the screen and hold a weapon to my head, or worse. I saw the miles of copper wires and fiber-optic cables between me and other people as a kind of shield – one that empowered me to be less isolated than my trauma and fear would have otherwise allowed.
I launched Omegle when I was 18 years old, and still living with my parents. It was meant to build on the things I loved about the Internet, while introducing a form of social spontaneity that I felt didn’t exist elsewhere. If the Internet is a manifestation of the “global village”, Omegle was meant to be a way of strolling down a street in that village, striking up conversations with the people you ran into along the way.
The premise was rather straightforward: when you used Omegle, it would randomly place you in a chat with someone else. These chats could be as long or as short as you chose. If you didn’t want to talk to a particular person, for whatever reason, you could simply end the chat and – if desired – move onto another chat with someone else. It was the idea of “meeting new people” distilled down to almost its platonic ideal.
Building on what I saw as the intrinsic safety benefits of the Internet, users were anonymous to each other by default. This made chats more self-contained, and made it less likely that a malicious person would be able to track someone else down off-site after their chat ended.
I didn’t really know what to expect when I launched Omegle. Would anyone even care about some Web site that an 18 year old kid made in his bedroom in his parents’ house in Vermont, with no marketing budget? But it became popular almost instantly after launch, and grew organically from there, reaching millions of daily users. I believe this had something to do with meeting new people being a basic human need, and with Omegle being among the best ways to fulfill that need. As the saying goes: “If you build a better mousetrap, the world will beat a path to your door.”
Over the years, people have used Omegle to explore foreign cultures; to get advice about their lives from impartial third parties; and to help alleviate feelings of loneliness and isolation. I’ve even heard stories of soulmates meeting on Omegle, and getting married. Those are only some of the highlights.
Unfortunately, there are also lowlights. Virtually every tool can be used for good or for evil, and that is especially true of communication tools, due to their innate flexibility. The telephone can be used to wish your grandmother “happy birthday”, but it can also be used to call in a bomb threat. There can be no honest accounting of Omegle without acknowledging that some people misused it, including to commit unspeakably heinous crimes.
I believe in a responsibility to be a “good Samaritan”, and to implement reasonable measures to fight crime and other misuse. That is exactly what Omegle did. In addition to the basic safety feature of anonymity, there was a great deal of moderation behind the scenes, including state-of-the-art AI operating in concert with a wonderful team of human moderators. Omegle punched above its weight in content moderation, and I’m proud of what we accomplished.
Omegle’s moderation even had a positive impact beyond the site. Omegle worked with law enforcement agencies, and the National Center for Missing and Exploited Children, to help put evildoers in prison where they belong. There are “people” rotting behind bars right now thanks in part to evidence that Omegle proactively collected against them, and tipped the authorities off to.
All that said, the fight against crime isn’t one that can ever truly be won. It’s a never-ending battle that must be fought and re-fought every day; and even if you do the very best job it is possible for you to do, you may make a sizable dent, but you won’t “win” in any absolute sense of that word. That’s heartbreaking, but it’s also a basic lesson of criminology, and one that I think the vast majority of people understand on some level. Even superheroes, the fictional characters that our culture imbues with special powers as a form of wish fulfillment in the fight against crime, don’t succeed at eliminating crime altogether.
In recent years, it seems like the whole world has become more ornery. Maybe that has something to do with the pandemic, or with political disagreements. Whatever the reason, people have become faster to attack, and slower to recognize each other’s shared humanity. One aspect of this has been a constant barrage of attacks on communication services, Omegle included, based on the behavior of a malicious subset of users.
To an extent, it is reasonable to question the policies and practices of any place where crime has occurred. I have always welcomed constructive feedback; and indeed, Omegle implemented a number of improvements based on such feedback over the years. However, the recent attacks have felt anything but constructive. The only way to please these people is to stop offering the service. Sometimes they say so, explicitly and avowedly; other times, it can be inferred from their act of setting standards that are not humanly achievable. Either way, the net result is the same.
Omegle is the direct target of these attacks, but their ultimate victim is you: all of you out there who have used, or would have used, Omegle to improve your lives, and the lives of others. When they say Omegle shouldn’t exist, they are really saying that you shouldn’t be allowed to use it; that you shouldn’t be allowed to meet random new people online. That idea is anathema to the ideals I cherish – specifically, to the bedrock principle of a free society that, when restrictions are imposed to prevent crime, the burden of those restrictions must not be targeted at innocent victims or potential victims of crime.
Consider the idea that society ought to force women to dress modestly in order to prevent rape. One counter-argument is that rapists don’t really target women based on their clothing; but a more powerful counter-argument is that, irrespective of what rapists do, women’s rights should remain intact. If society robs women of their rights to bodily autonomy and self-expression based on the actions of rapists – even if it does so with the best intentions in the world – then society is practically doing the work of rapists for them.
Fear can be a valuable tool, guiding us away from danger. However, fear can also be a mental cage that keeps us from all of the things that make life worth living. Individuals and families must be allowed to strike the right balance for themselves, based on their own unique circumstances and needs. A world of mandatory fear is a world ruled by fear – a dark place indeed.
I’ve done my best to weather the attacks, with the interests of Omegle’s users – and the broader principle – in mind. If something as simple as meeting random new people is forbidden, what’s next? That is far and away removed from anything that could be considered a reasonable compromise of the principle I outlined. Analogies are a limited tool, but a physical-world analogy might be shutting down Central Park because crime occurs there – or perhaps more provocatively, destroying the universe because it contains evil. A healthy, free society cannot endure when we are collectively afraid of each other to this extent.
Unfortunately, what is right doesn’t always prevail. As much as I wish circumstances were different, the stress and expense of this fight – coupled with the existing stress and expense of operating Omegle, and fighting its misuse – are simply too much. Operating Omegle is no longer sustainable, financially nor psychologically. Frankly, I don’t want to have a heart attack in my 30s.
The battle for Omegle has been lost, but the war against the Internet rages on. Virtually every online communication service has been subject to the same kinds of attack as Omegle; and while some of them are much larger companies with much greater resources, they all have their breaking point somewhere. I worry that, unless the tide turns soon, the Internet I fell in love with may cease to exist, and in its place, we will have something closer to a souped-up version of TV – focused largely on passive consumption, with much less opportunity for active participation and genuine human connection. If that sounds like a bad idea to you, please consider donating to the Electronic Frontier Foundation, an organization that fights for your rights online.
From the bottom of my heart, thank you to everyone who used Omegle for positive purposes, and to everyone who contributed to the site’s success in any way. I’m so sorry I couldn’t keep fighting for you.
Sincerely, Leif K-Brooks Founder, Omegle.com LLC
4 notes · View notes
nitrosodiumfmp · 10 months ago
Text
Looking Forward (and Back)
I'm feeling a little better mentally about the whole project; I've cleared up my bibliography and also altered my project proposal a little. This time I did attempt to make it more open-ended, and that's because I've thought about some potential renovations to the idea.
A lot of this has been inspired by Doom - the originals, not the remakes. They're really good games, and the art and level design are very intriguing. I watched a very interesting video by GermanPeter about what the levels could be as real-life places, and it made me think about the abstract, surreal nature of the visuals. It's something that could be quite interesting to replicate. For example, in the video, Peter suggests that MAP02, The Underhalls, is not a sewer system as it first appears, but actually a network of flooded subway tunnels, with various stops where you can scavenge for loot and fight demons.
Tumblr media
I've also gotten quite hung up on the Sinister Workshop vs Dark Tomb debacle, and I think the best way to get around this is to combine the ideas into one cohesion, called "Sinister". It'll be chunky, mechanical and industrial, while also appearing fantastical and almost Gothic. This style has been proven to work - once again, look at Doom.
Tumblr media Tumblr media
Some of the Doom maps do still carry a sense of dread and unease, as you creep through darkened corridors, expecting an ambush at any moment. But they also have the more adrenaline-fuelled segments you'd expect from a shooter, running circles around a hungry horde and blasting them into mincemeat. Doom does attempt full-on horror in some segments, too. There's a map in the cartoonishly malicious Plutonia Experiment called Hunted, where you're trapped in a maze filled with Archviles (particularly resilient demons who can revive the dead for extra fun), not enough ammo to kill them all, and all the while, as if to mock you, it plays the bunny song from the end of Doom 2.
Tumblr media
A lot of Doom 1 maps had this more horror focus, actually. Obviously nowadays, it's not scary, but back then, when you were confined to keyboard controls, a crap resolution, and the old-school software renderer that made dark areas DARK, it was probably pretty spooky. With this ethos, I can have my cake and eat it - I can keep making the slower horror-atmosphere game, and also make it more active.
This is what I want to do. This is the vibe I want to replicate. Here's my idea for more fleshing-out. Essentially, you're in the afterlife - the god of death has entered a deep sleep, and the world is being subverted by his altered consciousness. Since nobody can properly die anymore, only existing as malformed ghosts in the warped remnants of the afterlife, you've been sent to wake the god up from his slumber and banish these spirits back to the ethereal realm. The surrealism still works here - it's all in a dream-like world, but it's also the afterlife. Think of some of the music videos for TOOL songs, where strange visuals are used to signify the dying process, or passing in and out of consciousness. This helps to explain the inevitable weirdness of the environment, and also relates to many of the interesting themes that people have extrapolated from the original Midas myth: dreams, surrealism, illusion, conspiracy, myth.
And, a final note, enemies. Also inspired by Doom (what can I say, I love boomer shooters) I think I'll have enemies that are 2D sprites. They'll be fun to draw, easier to animate, and help to make the world seem off. If the world is 3D and they're not, it'll give everything an optical illusion vibe, which is what I want.
A final final note: I think I might call it Sinister Afterlife. But it's just Sinister for now.
2 notes · View notes
itlivesproject · 2 years ago
Note
Before I say my question, just want to say I was going to put off continuing the it lives series for a week or two after I finished ILITW, but as soon as I saw this project, i binged the entire second book in a day and it was totally worth it for ILW. So, back to my question. During chapter 3, my game suddenly closed bc my antivirus software on my laptop said it was up to “malicious activity” (prob richard just trying to mess w/ me still🙄). I know that isn’t the case but would you happen to know why it might’ve mistaken the application as such? Just so I can prevent it from randomly crashing again.
my thought would just be that because you downloaded it from an online page and that marked it as 'suspicious.' I'd see if you could find a way to tell you computer in unequivocal terms that this is a safe app and to not try to close it for suspicious activity 🥰 maybe open as admin or find a way to force it to ask you if it's safe or something 🤔
16 notes · View notes
golmac · 1 year ago
Text
Inform Basics (#17: your project)
I've said it before: we've covered enough material for you to start your own Inform 7 project, even if you are a beginner like me. Let's take a break from coding to talk a bit about development environments.
Have you downloaded an Inform 7 Integrated Developemnt Environment (IDE for short) yet? If you've been clicking on my code snippets, you've already encountered Borogove, an online IDE for not only Inform 7 but several other IF development platforms. Its ability to share live snippets of code that are fully functional in many forum softwares is rather amazing and makes it easer to assist other developers in need.
Nevertheless, I don't recommend it for creating a full-fledged game. Why is that?
No external file support for features like images, sound, and other shared documents.
The Index is not fully functional, as it does not contain links to either default or custom actions.
Borogove does not support Inform 7's table of contents feature (more on this in a minute).
My understanding is that it does support external files for Inkle and others, but not Inform 7. While I encourage using the snippets as a great way to share and demonstrate code, Borogove falls short of the standard Inform 7 IDEs. Windows, MacOS, and Linux are supported. You can find and download the latest versions here:
Note that Windows Defender and other antivirus softwares tend to mistakenly flag the interpreter executables--git, frotz, and glulxe--as malicious. This has been reported to Microsoft repeatedly, but the files have yet to be whitelisted. If you get an error about these files, you can consider it a false positive.
After installing the IDE, you'll find a two-panel layout. By default, the left pane is for entering and reading source code, while the right pane contains a playable instance of your compiled code. You can compile and recompile by clicking "go" at the top-left of the application window.
My practice is to create a backup of a project every couple of days, while compiling frequently as I work. In informal polling, Inform 7 authors of varying levels of skill tend to do the same.
On to the main purpose of this post: using Inform 7's built-in features to organize your program. Let's look at an automatically generated table of contents for Repeat the Ending, which is among the larger (code-wise) Inform 7 games. The left-hand pane of the IDE shows tabs at the right and top edges. The top tabs are "source" and "contents." This is a screenshot of the contents tab.
Tumblr media
See the slider at the bottom? Inform 7's automatically generated TOC features five tiers by default, and the slider can be used to dictate the level of detail displayed. Those tiers are as follows:
Volume (top level)
Book
Part
Chapter
Section (bottom level)
We can use these tiers in our code, and the IDE will detect them automatically. The practice looks like this:
Volume 1 - Global
It's as simple as that. We have a lot of freedom in what we say there. That isn't to say there aren't restrictions:
The heading must have a blank line above and below it.
The heading cannot contain characters that have specific functions in Inform 7 code. No periods, colons, semicolons, and the like.
The heading must begin with one of the five designations (volume, book, part, chapter, and section)
You have a lot of freedom in terms of how to order your code. I've gotten the impression that I do things differently, but I like the way my approach works.
For top-level headings, I used the following:
global: used to define verbs, data, kinds, variables, the player characters, and so forth. All things that apply to the game and its world generally.
the game: the actual geography, things, and specific action responses.
the companion text: the entirety of the Reader's Guide to Repeat the Ending.
the artwork: I chose to maintain the rules governing the display of artwork and alt descriptions separately.
mix and match: a true mixture of various late stage requirements.
Regarding mix and match: some rules in Inform 7 must follow related rules. For instance, a region (a group of individual rooms that can be dealt with as a collective) must follow the room definitions. For this reason I decided to define certain rules related to regions at the end, even if they seem to be global rules. This is the way that those late definitions were used:
The game world is a region. The eighties and the 90s are in the game world. Energy is a backdrop. Energy is in the game world. Instead of doing anything to the energy: say "It doesn't work that way. Entropic magic requires specificity.".
Sometimes, things just make sense at the end. I also kept all of my test scripts there.
How should you build your TOC? While you can see my example above, give equal or greater consideration to what will be easiest for you to read and update. The TOC is a tool to for you to manage your project. If it doesn't make intuitive sense to you, it's worthless. Think about the way you process information and build from there.
I hope this is helpful! Consider maintaining a test/scratch project where you can keep copies of useful code and test the cases we discuss here. Feel free to AMA!
Next: scenery and backdrops.
5 notes · View notes
teamarcstechnologies · 1 year ago
Text
Are you facing security challenges in Online Survey?
Tumblr media
Online surveys can face several security challenges, including:
Data Privacy: Ensuring the confidentiality of respondents' data is crucial. Unauthorized access to personal information collected in surveys can lead to privacy breaches.
Data Integrity: Maintaining the accuracy and consistency of survey data is essential. Malicious actors might attempt to manipulate or corrupt data, impacting the reliability of survey results.
Survey Fraud: Individuals may attempt to manipulate survey results by providing false information or submitting multiple responses (known as ballot stuffing), compromising the survey's integrity.
Phishing Attacks: Fraudulent emails or survey links may be used to trick respondents into providing sensitive information or downloading malware.
DDoS Attacks: Distributed Denial-of-Service attacks can disrupt survey platforms by overwhelming servers with excessive traffic, causing downtime and hindering survey completion.
To address these challenges, survey administrators often implement various security measures:
Encryption: Utilizing encryption techniques to protect data transmission and storage.
Authentication: Requiring user authentication to prevent unauthorized access to surveys and data.
Firewalls and Anti-Malware: Employing security software and firewalls to mitigate the risk of cyber threats.
Captchas and IP Blocking: Implementing measures to prevent automated responses and restrict multiple submissions from the same IP address.
Anonymity and Confidentiality: Ensuring respondents' anonymity and safeguarding their sensitive information.
Regular Security Audits: Conducting periodic security audits to identify vulnerabilities and enhance overall security.
While these measures can mitigate risks, no system is entirely immune to security threats. Survey administrators must stay vigilant, update security protocols regularly, and adhere to best practices to protect the integrity and privacy of survey data.
To know more:
online market research platform
fraud prevention solution
fraud detection and reporting tool
Online Project Management Platform
2 notes · View notes
zerosecurity · 5 months ago
Text
Critical Vulnerability (CVE-2024-37032) in Ollama
Tumblr media
Researchers have discovered a critical vulnerability in Ollama, a widely used open-source project for running Large Language Models (LLMs). The flaw, dubbed "Probllama" and tracked as CVE-2024-37032, could potentially lead to remote code execution, putting thousands of users at risk.
What is Ollama?
Ollama has gained popularity among AI enthusiasts and developers for its ability to perform inference with compatible neural networks, including Meta's Llama family, Microsoft's Phi clan, and models from Mistral. The software can be used via a command line or through a REST API, making it versatile for various applications. With hundreds of thousands of monthly pulls on Docker Hub, Ollama's widespread adoption underscores the potential impact of this vulnerability.
The Nature of the Vulnerability
The Wiz Research team, led by Sagi Tzadik, uncovered the flaw, which stems from insufficient validation on the server side of Ollama's REST API. An attacker could exploit this vulnerability by sending a specially crafted HTTP request to the Ollama API server. The risk is particularly high in Docker installations, where the API server is often publicly exposed. Technical Details of the Exploit The vulnerability specifically affects the `/api/pull` endpoint, which allows users to download models from the Ollama registry and private registries. Researchers found that when pulling a model from a private registry, it's possible to supply a malicious manifest file containing a path traversal payload in the digest field. This payload can be used to: - Corrupt files on the system - Achieve arbitrary file read - Execute remote code, potentially hijacking the system The issue is particularly severe in Docker installations, where the server runs with root privileges and listens on 0.0.0.0 by default, enabling remote exploitation. As of June 10, despite a patched version being available for over a month, more than 1,000 vulnerable Ollama server instances remained exposed to the internet.
Mitigation Strategies
To protect AI applications using Ollama, users should: - Update instances to version 0.1.34 or newer immediately - Implement authentication measures, such as using a reverse proxy, as Ollama doesn't inherently support authentication - Avoid exposing installations to the internet - Place servers behind firewalls and only allow authorized internal applications and users to access them
Broader Implications for AI and Cybersecurity
This vulnerability highlights ongoing challenges in the rapidly evolving field of AI tools and infrastructure. Tzadik noted that the critical issue extends beyond individual vulnerabilities to the inherent lack of authentication support in many new AI tools. He referenced similar remote code execution vulnerabilities found in other LLM deployment tools like TorchServe and Ray Anyscale. Moreover, despite these tools often being written in modern, safety-first programming languages, classic vulnerabilities such as path traversal remain a persistent threat. This underscores the need for continued vigilance and robust security practices in the development and deployment of AI technologies. Read the full article
2 notes · View notes