20 posts • joined 16 Sep 2009
Re: "In Windows 8 you don't have a thing that prevents you installing from "Unknown sources".
@Tom 13: Not sure what your point is - unless you'd already run the command prompt as elevated or had changed the default ACLs this would generate a UAC prompt.
Re: When are smartphones ...
Folder Organizer will do that. It was reviewed on El Reg a couple of years ago (http://www.theregister.co.uk/2011/05/31/app_of_the_week_android_folder_organizer/).
Google voice search gave me a link to the Wikipedia entry for "Who is Pussy Galore". Hate to think what I'd get if it mistook Who for What.
Are They Really Trying to Say Pre-ticked Is OK...
after saying that the IE tracking opt out being ticked by default wasn't legitimate?
Re: A question to hackers or security people
According to the MS advisory (http://technet.microsoft.com/en-us/security/advisory/2794220) this exploit runs in the context of the user and doesn't directly allow privilege escalation.
Re: Pondering (DuckDuckGo - US centric)
I found that until I clicked that DuckDuckGo defaults to US as your location. You can change this in settings. If you don't want to allow cookies then you can bookmark https://www.duckduckgo.com/?kl=uk-en&kad=en_GB to indicate you're in the UK and want real English.
Re: "which makes one wonder why O2 wants any of the old analogue TV spectrum at all"
The grammar nazi in me says that either way it should be fewer base stations.
Try Ctrl + Right
Or should that be Ctrl "Right"?
Sorry - That Doesn't Wash
Is the Location Data Encrypted For Transmission? If it isn't, or if the UUID is stored unencrypted on the phone, then I can spam with the UUID and Google are none the wiser.
Pass the Salt
This was my first thought - have a per user, cryptographically random, salt. In use (i.e. generating a comparison hash from an input password) the stored salt is itself modified (e.g. encrypted) before being used so that the database itself doesn't hold the information necessary to reverse engineer the password hash.
Manchester - Too Far From a Server
Tried to play the Spore demo but I'm too far from their servers apparently. Is this a Watford Gap issue?
Is it just me ...
who read IFI as iffy?
That's all very well and good but ... but ...
... those e-mails probably are from those accounts, they're not spoofed. The accounts have either been bot generated or hacked. After all, why would a spammer spoof e-mail addresses that are likely to be blocked when they can just as easily spoof @bbc.co.uk?
It's A Trojan
It masquerades as something else that the user actually wants and which needs installing as admin. Pwned.
If site_being_ranked in (google_preferred_sites)
rank = top
isn't google_preferred_sites effectively a whitelist? To my mind the list itself is not part of the algorithm.
Personally, I wouldn't be happy to find that search results were being manipulated in this way.
I'm Also Somewhat Confused
The KB article, http://support.microsoft.com/kb/2264107, states that a DLL load will look in the directory from which the application loaded, the system directory, the 16-bit system directory and the Windows directory _before_ it looks in the CWD. So, unless it's expecting the DLL to be somewhere in PATH (which is checked after CWD), what is it that is causing the application to load a DLL from CWD? On my system, W7, I can't see anything in the PATH that might be relevant to Firefox which is listed as vulnerable.
From the Report: Page 6, Figure 2
Oracle (including Sun Microsystems and BEA Logic) ranked #1 in four out of five years overtaken by Apple in the first half of 2010, with Apple consistently ranking higher than Microsoft.
This seems to justify the headline.
Photo Gallery already has facial recognition.
More vs As
More implies an increase against a base so the cost is only 2.7 times more expensive (but 3.7 times as expensive). This is something that is increasingly prevalent in advertising - my toothpaste is apparently 2x better than it was. Do they mean that it is 3x as good as it was or really only twice as good?
User Controlled Targetted Advertising?
Would this keep everyone happy? ...
1. Adverts are tagged to indicate the areas of interest, the type of advert (static, Flash, Java etc.), the advertising source and the tag source.
2. Users can subscribe to tag filters.
3. Adblock Plus 2.
The tag source would indicate where the tag had been authorised (e.g. nowhere, the Advertising Standards Authority in the UK or some other A.S.A.).
That way the end user is in control of the types of advert displayed, is more likely to 'click through' but still has the option to disable all ads.
- iPad is an iFAD: Now we know why Apple went running to IBM
- Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
- Climate: 'An excuse for tax hikes', scientists 'don't know what they're talking about'
- Black Hat anti-Tor talk smashed by lawyers' wrecking ball
- +Analysis Microsoft: We're building ONE TRUE WINDOWS to rule us all