Open Source fixes a Microsoft engineering problem
Yes - it fixed a big one for me - i no longer need to use Windows (getting worse by the day)
136 posts • joined 26 Oct 2009
Yes - it fixed a big one for me - i no longer need to use Windows (getting worse by the day)
And not forgetting that the best of all OSs still hides "known file extensions" by default so the scammer would have just seen it as a png
is not that the police is running an outdated version of Windows but the that the police is running Windows
What? Is that some kind of cling-on?
I must be missing something obvious, since i can't see why you'd use a toy sieve of an OS for mission-critical work in the first place ..?
and why one needs flash to access audio content on BBC
What Marx probably would have said is that the current proliferation of service industries is merely an indication of the weakness of capitalism in the areas in which they emerge and that they are simply processing value created elsewhere.
... then without Windows!
>>One way to make IE and Edge safer is to disable their internet access<<
(McEnroe voice) You cannot be serious?? If you aren't, then that's quite amusing.
Utterly preposterous that their 'new' browser can suffer these kinds of vulns.
I've had the misfortune to touch about 4 Win 10 boxes and i think in every case Edge seemed to be fundamentally broken.
Don't you mean http://technojeeves.com/tech/freebsd_logo.png ?
Ideal for a defeated Trump to retire to with his family to escape the imaginary Mexican threat. He can afford it - or so he says...
That's just the ticket - juxtaposition of Arabic/Quranic marks and bacon. Clickbait? Or a bid to be the next Salman Rushdie? ;)
There are probably innumerable reasons. My own use case: play an audio file and close the laptop machine down at a time of my choice. In the meantime, i do NOT want or need to be logged in.
I don't expect some asshat to ignore my nohup and at commands and treat my like some moron
Since a capable Linux user would treat this as normal behaviour – why sit there watching a screen when there's nothing happening, it's unwelcome.
I must have read this a dozen times. And it still doesn't make a blind bit of sense ,,,
What i can't understand is, in these malware tales, why the malware vectors are almost never identified. Maybe someone can explain?
He is said to travel to the UK to install Oracle databases at hotels and restaurants.
Presumably they'll take this offence into consideration too ...
You got my upvote because you're right but they can probably count on only a minuscule number of their targets to know that, so they'll brag anyway.
Personally, if i didn't feel i was being bilked by the likes of HP or if i didn't require a degree in statistical analysis to figure out how to get value for money ( if indeed that's possible ), i'd do a lot more printing instead of avoiding it like the proverbial.
I'm more worried than unamused - i think it's time Dabbsy went to see someone
SEC warns cybersecurity is biggest threat to financial system
How does that work? Isn't that like saying safety is the biggest threat?
Energy harvested from bacteria alone isn't enough to provide a decent charge. In 2013, a team of scientists from Bristol Robotics Laboratory managed to produce a meagre 2.5mW – much lower than the 5W output of a typical phone charger – from urine-powered bacteria.
Why not combine the two approaches then? I often find I piss in the plant pots after a big night out so finding my spare phone charged in the morning would help to alleviate the hangover.
It is "basically real-time translation of Linux syscalls into Windows OS syscalls"
There should be a name for that. How about ENIW? Geddit?
Windows phone owners today are "collateral users" – they just happen to be standing in the path of a major platform update.
Windows owners today ...
And if you don't think you're standing in that path - yes you enterprise Win 7 users for instance - how sure are you that you won't see Win 10 the next time you look?
You're probably right!
The password found within the app's code allowed the hackers to access the app’s settings. From there they tapped into the phone's system settings ...
Worse than leaving a hard-coded password in the app, why on earth should breaking in to application-level code be able to lead on to (what should be) OS-level access?
Hint: None of them are Apple
None of them IS Apple
You're a cybercrime kingpin. You need a new evil lackey. How much do you tell them?
Err .. "we're called Google"?
fuel consumption of around "250 mpg (equivalent)
Not bad! So a journey of 250 miles is going to cost me about £3.79 (a litre of petrol being roughly £1 at value stations) then?
feedback from our customers is really important to the team and to me personally. I read the blogs, I read the comments, I read social media ...
Pity they don't react to the reception of the spyware control-freak platform that's Windows 10
The year before, the same hospital saw no less than eight firemen...
You mean "no fewer"
OTOH, they're looking for people high on the sociopathic spectrum for management. Qualities sought include:
a. no empathy with customers or regard for their best interests and wishes
b. a complete lack of conscience/remorse
c. ability to view humans as merely potential profit centres and datamines
So, as these become more popular will we see management getting fake anti-phishing (i.e. phishing) links?
Things like stenography can be detected when comparing to original source (if available else where) etc.
You mean, say, by traces of nail polish from a secretary?
Our office currently gets about 50 emails a day which are not picked up by the a/v at the ISP, the different a/v on the gateway nor the a/v on the desktop. Many of these look like ...
All very commendable, not to say heroic. So why exactly are you still using Windows?
0000000: 8501 0c03 4c8c 9506 6833 55b6 0107 fd16 ....L...h3U.....
0000010: 2597 49f8 0cb1 3621 075c 3ce1 b32a 67b7 %.I...6!.\<..*g.
0000020: 2347 a773 fa6a 4376 3717 be53 959b 01a1 #G.s.jCv7..S....
0000030: 702d 3ff6 4375 579d 0931 7d5e dcb8 ec7a p-?.CuW..1}^...z
0000040: ca88 d7ed cab4 64cb 70be 9578 ec54 a31b ......d.p..x.T..
0000050: 24dd 40f2 e268 ba64 d843 d021 d7e9 fd2e $.@..h.d.C.!....
0000060: 8e84 a0c5 9eaf ceb7 dd42 6af4 7cb5 dcde .........Bj.|...
0000070: 66cc 8e40 580d ff4d caf3 fad6 f175 756c f..@X..M.....uul
0000080: 8e1a 83ac aab0 025c 85d9 98e5 3ea6 e7a5 .......\....>...
0000090: d0ef ac66 636b a7ca b0ed f07f dc68 0b74 ...fck.......h.t
00000a0: 0ce2 a74e 3980 55c5 64ae a648 090d 83d1 ...N9.U.d..H....
00000b0: 2a4d baa6 74d0 7dae 2b71 437c d6af aa94 *M..t.}.+qC|....
00000c0: 7c0d 4879 95ab bc8f 6302 748a 844a ceea |.Hy....c.t..J..
00000d0: d592 951b 92cb 8f12 b92b 8af8 87e8 354e .........+....5N
00000e0: cd10 ced4 931e 6eae e480 3569 677c 4f96 ......n...5ig|O.
00000f0: e1cd 235b e849 eb0b 393e e864 f7ed 1a12 ..#[.I..9>.d....
0000100: 682c 4805 c59c ed34 ad12 d474 66a1 efd2 h,H....4...tf...
0000110: 4f01 0af7 b6cc c977 1bc5 45dd 68ba b276 O......w..E.h..v
0000120: e447 423c d239 20e3 f212 182c 54a0 c345 .GB<.9 ....,T..E
0000130: 41a9 684e 6458 857c 00c0 1e09 6aa6 26b0 A.hNdX.|....j.&.
0000140: 271e 84ac fafe 649d 9872 78d1 9bef 15f8 '.....d..rx.....
0000150: d6ca 046f 6ef8 1edd fac4 55a1 95e0 e8d7 ...on.....U.....
The above is a dump of a gpg-encrypted file containing 16 famous digits. I must be missing something - where are the metadata there?
Facebook brings European cats' snaps ...
I didn't know cats take photographs ...
Bookending such a pair of tech heavy weights has sparked much debate over what the Vatican is up to.
Or what Tim (a better candidate for the appellation "Whore of Babylon") Cook is up to. Come on guys - follow the money!
and is detected by only a handful of antivirus platforms.
Then when you next login,
No, no, no! The verbal form is TWO words. What you've got is a noun
I myself am near a 100% Linux person
I hope the odour isn't bothering you
Windows Feedback is full of upvoted "stop trying to control this for me" messages, so it appears a general problem.
If it's any consolation (see my Convergence Alert comments elsewhere) Linux is getting like that too with "Don't worry your pretty head about how systemd works or its specs - it just does" or "don't worry that systemd logging is binary and will be well and truly fscked if things get corrupted - it just won't happen" and the like.
That would have too many complications for them; they'd get sued for deceptive marketing promises faster than you can say "class action", for one thing.
But you'd think that would already have happened. It hasn't - in any significant way.
My password has twenty five symbols. Be my guest
afaicr 'mandatory' secure boot is illegal on anything other than ARM
Oops - should have been Convergence alert
Snover, you could argue, is trying to make Windows more like Linux.
And Sievers and Poettering, you could argue, are trying to make Linux more like Windows
a. you elect to carry an electronic tag
b. you elect to publish details of your tag
What could possibly go wrong?
Not having the data in the first place. Which I believe was her point about the "tokenisation" of the credit card numbers - apparently they explicitly did not save six of the digits which make them usable.
Except that they DID have (some of) the data, which means that they could be used in a social engineering attack which is most certainly a 'format' above encryption, not below it.
Only three of 55 antivirus products detect the ransomware through static VirusTotal analysis, however this is not necessarily indicative of real-world dynamic scanning results.
Why not? Have enterprises access to better/different AVs? Or is it fewer than three in the real world?