19 posts • joined Wednesday 16th September 2009 22:41 GMT
Re: When are smartphones ...
Folder Organizer will do that. It was reviewed on El Reg a couple of years ago (http://www.theregister.co.uk/2011/05/31/app_of_the_week_android_folder_organizer/).
Are They Really Trying to Say Pre-ticked Is OK...
after saying that the IE tracking opt out being ticked by default wasn't legitimate?
Re: A question to hackers or security people
According to the MS advisory (http://technet.microsoft.com/en-us/security/advisory/2794220) this exploit runs in the context of the user and doesn't directly allow privilege escalation.
Re: Pondering (DuckDuckGo - US centric)
I found that until I clicked that DuckDuckGo defaults to US as your location. You can change this in settings. If you don't want to allow cookies then you can bookmark https://www.duckduckgo.com/?kl=uk-en&kad=en_GB to indicate you're in the UK and want real English.
Pass the Salt
This was my first thought - have a per user, cryptographically random, salt. In use (i.e. generating a comparison hash from an input password) the stored salt is itself modified (e.g. encrypted) before being used so that the database itself doesn't hold the information necessary to reverse engineer the password hash.
That's all very well and good but ... but ...
... those e-mails probably are from those accounts, they're not spoofed. The accounts have either been bot generated or hacked. After all, why would a spammer spoof e-mail addresses that are likely to be blocked when they can just as easily spoof @bbc.co.uk?
If site_being_ranked in (google_preferred_sites)
rank = top
isn't google_preferred_sites effectively a whitelist? To my mind the list itself is not part of the algorithm.
Personally, I wouldn't be happy to find that search results were being manipulated in this way.
I'm Also Somewhat Confused
The KB article, http://support.microsoft.com/kb/2264107, states that a DLL load will look in the directory from which the application loaded, the system directory, the 16-bit system directory and the Windows directory _before_ it looks in the CWD. So, unless it's expecting the DLL to be somewhere in PATH (which is checked after CWD), what is it that is causing the application to load a DLL from CWD? On my system, W7, I can't see anything in the PATH that might be relevant to Firefox which is listed as vulnerable.
From the Report: Page 6, Figure 2
Oracle (including Sun Microsystems and BEA Logic) ranked #1 in four out of five years overtaken by Apple in the first half of 2010, with Apple consistently ranking higher than Microsoft.
This seems to justify the headline.
More vs As
More implies an increase against a base so the cost is only 2.7 times more expensive (but 3.7 times as expensive). This is something that is increasingly prevalent in advertising - my toothpaste is apparently 2x better than it was. Do they mean that it is 3x as good as it was or really only twice as good?
User Controlled Targetted Advertising?
Would this keep everyone happy? ...
1. Adverts are tagged to indicate the areas of interest, the type of advert (static, Flash, Java etc.), the advertising source and the tag source.
2. Users can subscribe to tag filters.
3. Adblock Plus 2.
The tag source would indicate where the tag had been authorised (e.g. nowhere, the Advertising Standards Authority in the UK or some other A.S.A.).
That way the end user is in control of the types of advert displayed, is more likely to 'click through' but still has the option to disable all ads.