mojority off those games are safe you do know that right if you see them on the xbox one or play on xbox one halo is safe the condemned are fallout new vegase is safe bio shock games are safe gta games are safe microsoft them selfs said that any backwards compatable game is safer after july 29th you can buy them even the border lands games are safe .oh saints row games are safe you can play all of them on xbox one . assassin creed games are all safe
The fast travel via scanner system is really good. In the city you can just pop open the scannner, find an icon for any poi you want to travel to and click to travel to it.
I make videos on a whim. Most of them are afterthoughts. If I get to one or two people and inspire them, the effort was worth it. I hate the sound of my voice recorded.
Erm No, it’s not getting any better. This game has always been a solid 1/10, and I’ve been saying it for years. Seriously, every update just makes it worse. It’s like they don’t even care about the players. This game is worse than Starfield, worse than E.T., and yes, even worse than RDR2. I can’t believe people still defend it. Anyone who says otherwise is just sick in the head. It’s like they’re blind to all the flaws. The graphics are outdated, the gameplay is clunky, and don’t even get me started on the bugs. It’s a disaster from start to finish. I’ve played a lot of bad games in my time, but this one takes the cake. It’s like they went out of their way to make it as bad as possible. If you’re still playing this, I honestly don’t know what to say. Just do yourself a favor and find something better to play. There are so many good games out there, why waste your time on this trash?
You sound like a Dragon's Dogma II player. You are insecure cause you love a broken game that you paid 90 dollars for, so now everyone else has to suffer as well.
The bigger question how such thing was deployed on such a large scale automatically. Security updates Ok, but automatically everywhere at every possible point? This is poor risk management,
”Just delete one file” except you need to have the unique bitlocker recovery key for each machine and unless you can remote into the BIOS you need physical access… This is to say that the fix was anything but easy. It was easy as far as fixes conserning BSOD of all machines on friday is concerned. Really it was a blessing in disguise that this happened on friday. Probably lessened the time pressure on IT significantly, as having some systems still down on saturday or sunday didn’t mean huge productivity losses. If this happened on monday it would be an all-nighter to have shit running on tuesday, as each office hour lost meant all projects and tasks falling behind. I’d much rather work a weekend than squeeze weekends worth of work between the most stressful workdays one can experience without breaking out the big disaster scenarios. Scenarios like a huge physical damage in server room, cybersec breaches, some network failures worse than I can quickly even imagine. It would probably be easier to lose a domain controller and migrate to a whole new one because you don’t have backups. At least in that scenario writing a script on a USB-drive that does the magic and simply prompts for DA-credentials would be fairly straight-forward. Also the workstations might not be completely useless for employees, so they wouldn’t have to fall back on phone, pen and paper.
What do you mean would "it" happen. I am on Linux since 1996 and I did not even notice that something is supposedly wrong until I read about it. Don't use cloud services. Pay cash. Reject subscription based payments and all cloud hosted apps.
Pay cash... when the country reduces printing cash, what are you going to do about it? Print your own? With the devaluation of currencies making coins is more expensive than is their actual value. That to just make them. Manipulating with them, transport, storage, all comes at an additional cost.
"don't use cloud services" It's impossible to create and maintain a large software company in 2024 without using cloud VMs with a load balancer and scaling. This didn't effect consumer computers of any kind as it was an enterprise anti-virus. Many tasks can only be done by large clusters of cloud machines (training LLMs, distributed computing overall, so on) in a reasonable timeframe. Even paying cash requires you to go to a bank which uses a cloud service to withdraw your funds. It's good to have cash on you and backup plans as an individual though.
@@hagenzwosta you are guessing wrong. Why USA? Other countries are not looking how to reduce cost of running public affairs? Or who do you think prints money? Elf on the shelf? 😂
Large mono-system install, that requires OS-kernel-level (pre/mid filesystem loading) hooks is the problem. On linux, Crowdstrike moved to eBPF (if the filter fails, it doesn't kill the system, to reduce damage), but any mono-OS system/service that had (or required) this level of integration, with such a small test/validation window, could do this much damage. Related: Because anti-virus on windows got so bad, and caused so many instability issues (including boot fails), eventually MS started putting it into the OS. MS is having to do the same with the other parts of EDR now, because that's easier than fixing the reasons why AV (and EDR in general) is so needed on their platforms.
I am not entirely sure but I feel like eBPF would not be an equivalent system. The Crowdstrike Falcon sounds more like SELinux level of kernel component. Because servers serve things to the rest of the network, the priorities and risks concerning them are pretty different. If a company was 100% on Linux workstations I don’t think reducing damage would be the desired outcome if the EPP somehow failed. The host should be considered untrusted. In many environments the desired behaviour would be pretty radical: the host should prevent the employee from entering credentials in the first place, let alone unencrypt user data. The host should have very limited access to the network or out of it, if any at all. The point of end-point protection when it comes to workstations is to authenticate and verify the host-system, during every moment the host is part of the network. These are much more loosely monitored assets than servers, and much, much more exposed to attack vectors. Maybe Linux could provide more nuanced handling of such failures to authenticate a user, but we would still be talking about some recovery target before ever reaching the greeter. For the intented, legitimate user of said workstation the system is simply bricked.
This is the crazy thing that ever happened what next the Screens in new york city will go out like what happened at the international airports and other place
I filled up on garbage but it's cause i want to have a large 360 collection for the future. I'm sitting on 283 games right now and slowly collecting more, i've got about 20 sports titles in the lot.
I feel like you kind of glossed over that whole thing about how you found this in an envelope that someone on reddit left. All that stuff about "class something or other media" seems very interesting. Any chance you could upload the files?