1. Welcome! Please take a few seconds to create your free account to post threads, make some friends, remove a few ads while surfing and much more. ClutchFans has been bringing fans together to talk Houston Sports since 1996. Join us!

Robotics, AI and Other Tech

Discussion in 'BBS Hangout' started by Mango, Mar 13, 2025.

  1. A_3PO

    A_3PO Member

    Joined:
    Apr 29, 2006
    Messages:
    49,320
    Likes Received:
    16,138
    Hard to tell since they are both made of plastic.
     
  2. Dr of Dunk

    Dr of Dunk Clutch Crew

    Joined:
    Aug 27, 1999
    Messages:
    47,262
    Likes Received:
    34,663
  3. Amiga

    Amiga Member

    Joined:
    Sep 18, 2008
    Messages:
    26,671
    Likes Received:
    25,442
    Lol. AI didn't even need to do much here. The biggest cybersecurity threat was someone forgetting to check a permissions box. Classic human error doing more damage than any model could.

    But on a serious note. If AI can find and exploit vulnerabilities faster than humans can patch them, that same speed works in reverse. AI-powered defense should theoretically be just as fast.
     
    Mango likes this.
  4. Dr of Dunk

    Dr of Dunk Clutch Crew

    Joined:
    Aug 27, 1999
    Messages:
    47,262
    Likes Received:
    34,663
    Along those lines :

     
    Mango likes this.
  5. Dr of Dunk

    Dr of Dunk Clutch Crew

    Joined:
    Aug 27, 1999
    Messages:
    47,262
    Likes Received:
    34,663
    Kyrie is our defense (irony) :

     
    B-Bob likes this.
  6. Mango

    Mango Member

    Joined:
    Sep 23, 1999
    Messages:
    11,154
    Likes Received:
    7,137
    SQL Injection (SQLi): How to Protect against SQL Injection Attacks

    What Is SQL Injection (SQLi)?

    SQL injection (SQLi) is a cyberattack that injects malicious SQL code into an application, allowing the attacker to view or modify a database. According to the Open Web Application Security Project, injection attacks, which include SQL injections, were the third most serious web application security risk in 2021. In the applications they tested, there were 274,000 occurrences of injection.

    To protect against SQL injection attacks, it is essential to understand what their impact is and how they happen so you can follow best practices, test for vulnerabilities, and consider investing in software that actively prevents attacks.

    Consequences of a Successful SQL Injection Attack
    SQL injection attacks can have a significant negative impact on an organization. Organizations have access to sensitive company data and private customer information, and SQL injection attacks often target that confidential information. When a malicious user successfully completes an SQL injection attack, it can have any of the following impacts:

    • Exposes Sensitive Company Data: Using SQL injection, attackers can retrieve and alter data, which risks exposing sensitive company data stored on the SQL server.
    • Compromise Users’ Privacy: Depending on the data stored on the SQL server, an attack can expose private user data, such as credit card numbers.
    • Give an attacker administrative access to your system: If a database user has administrative privileges, an attacker can gain access to the system using malicious code. To protect against this kind of vulnerability, create a database user with the least possible privileges.
    • Give an Attacker General Access to Your System: If you use weak SQL commands to check usernames and passwords, an attacker could gain access to your system without knowing a user’s credentials. With general access to your system, an attacker can cause additional damage accessing and manipulating sensitive information.
    • Compromise the Integrity of Your Data: Using SQL injection, attackers can make changes to or delete information from your system.
    Because the impact of a successful SQL injection attack can be severe, it’s important for businesses to practice prevention and limit vulnerabilities before an attack occurs. To do that, you must understand how a SQL injection attack occurs, so you know what you’re up against...


    ...

    2. Inferential SQL Injection

    Inferential SQL injection is also called blind SQL injection because the website database doesn’t transfer data to the attacker like with in-band SQL injection. Instead, a malicious user can learn about the structure of the server by sending data payloads and observing the response. Inferential SQL injection attacks are less common than in-band SQL injection attacks because they can take longer to complete. The two types of inferential SQL injection attacks use the following techniques:

    • Boolean injection: With this technique, attackers send a SQL query to the database and observe the result. Attackers can infer if a result is true or false based on whether the information in the HTTP response was modified.
    • Time-based injection: With this technique, attackers send a SQL query to the database, making the database wait a specific number of seconds before responding. Attackers can determine if the result is true or false based on the number of seconds that elapses before a response. For example, a hacker could use a SQL query that commands a delay if the first letter of the first database’s name is A. Then, if the response is delayed, the attacker knows the query is true.
     
  7. daywalker02

    daywalker02 Member

    Joined:
    Jul 17, 2006
    Messages:
    105,934
    Likes Received:
    53,981
  8. daywalker02

    daywalker02 Member

    Joined:
    Jul 17, 2006
    Messages:
    105,934
    Likes Received:
    53,981
  9. The Captain

    The Captain Member

    Joined:
    Jun 18, 2003
    Messages:
    39,332
    Likes Received:
    38,967
  10. KingCheetah

    KingCheetah Atomic Playboy

    Joined:
    Jun 3, 2002
    Messages:
    60,371
    Likes Received:
    54,965
    ...
     
    #370 KingCheetah, Mar 30, 2026 at 6:58 PM
    Last edited: Mar 31, 2026 at 11:15 AM
  11. Dr of Dunk

    Dr of Dunk Clutch Crew

    Joined:
    Aug 27, 1999
    Messages:
    47,262
    Likes Received:
    34,663
  12. Dr of Dunk

    Dr of Dunk Clutch Crew

    Joined:
    Aug 27, 1999
    Messages:
    47,262
    Likes Received:
    34,663

     
    Mango and ryan_98 like this.
  13. MadMax

    MadMax Member

    Joined:
    Sep 19, 1999
    Messages:
    78,019
    Likes Received:
    28,526
    I’m so glad that I’ll be dead in the next 30 years or so..y’all keep it easy. You know where I stay :)
     
    Mango likes this.
  14. Dr of Dunk

    Dr of Dunk Clutch Crew

    Joined:
    Aug 27, 1999
    Messages:
    47,262
    Likes Received:
    34,663
    Does this qualify as "tech"?

    I'm about to tie myself to that Artemis II rocket and escape...

     
    Ottomaton and ryan_98 like this.
  15. Mango

    Mango Member

    Joined:
    Sep 23, 1999
    Messages:
    11,154
    Likes Received:
    7,137

    Is that Benny Johnson?
     
  16. Dr of Dunk

    Dr of Dunk Clutch Crew

    Joined:
    Aug 27, 1999
    Messages:
    47,262
    Likes Received:
    34,663
    Yes, I do believe so.
     
  17. KingCheetah

    KingCheetah Atomic Playboy

    Joined:
    Jun 3, 2002
    Messages:
    60,371
    Likes Received:
    54,965
    Q-Day Just Got Closer: Three Papers In Three Months Are Rewriting The Quantum Threat Timeline

    In fewer than twelve months, three research papers have sharply reduced the estimated quantum resources required to break the cryptographic systems that protect the global digital economy. Together, they represent the most significant shift in quantum threat assessment since Peter Shor published his factoring algorithm in 1994.

    The punchline: what once required 20 million qubits now requires fewer than one million for RSA, potentially fewer than 100,000 under newer architectures, and fewer than 500,000 for the elliptic curve cryptography that protects every major cryptocurrency and most digital signatures. One of the papers was so sensitive that its authors chose not to publish the actual attack circuits, instead releasing a cryptographic proof that the circuits work without revealing how they work. If you are a CISO, CTO, or policymaker still treating quantum risk as a future problem, that decision should give you pause.

    https://thequantuminsider.com/2026/...hs-are-rewriting-the-quantum-threat-timeline/
     
  18. Ottomaton

    Ottomaton Member
    Supporting Member

    Joined:
    Feb 14, 2000
    Messages:
    20,151
    Likes Received:
    17,386
    This guy/channel makes excelent AI doomcasting videos:

     

Share This Page