[2] I’m told, but can not verify it’s Joel Spolsky’s code that ended up in Word, and was then used by an “unknown” Microsoft person to release the first proof of concept of a “Macro-virus” on a Microsoft Tech Update CD. If anyone knows more of the details, I’m su...
(Example, no need to reinstall/maintenance-Install (buy) virus software, still has value even after a few years while windows pc's are 'worthless' I used to look at things like that. But, (and Ill exaggerate); iMac 27" computer £1600 HP 27 with similar specs, £1050 Mac...
as this has a chain reaction for which the repercussions have yet to be seen. Additionally, much like any virus, theLog4j vulnerabilitykeeps morphing and changing, which means remediations are going to be both challenging and time consuming. ...
job security for teachers and support staff, setting (and rethinking) curriculum priorities, special needs, student perspectives on the job of school, the importance of play, the psychology of group dynamics and social interaction, preparing for future rounds of a virus (or cyberattack or impact ...