... plus, i thought that exploitation began after patching had been done, so why are patches coming into the exploits at all?
145 posts • joined 26 Oct 2009
Re: Cyanogen OS
I spoke to them recently and brought up the issue of Cyanogen's doubtful future
They: "We have no news on this issue and our phone are not going to be affected as far as i'm aware"
Rooting their phones?
They: "i would certainly would advise against it as we don't support it"
You can do plenty of "content creation" on a Samsung Galaxy phone
But how many DO i wonder? Time will tell whether productivity (ok so not much Nobel prize winning content maybe) has dropped as a result of personal computers being superseded by devices centred around consumption? You consume Friendface and the like, and 'they' consume you(r data)
However in reality, that would be “practically impossible” because connecting a dynamic IP address to the ISP’s subscriber information means a “disproportionate effort in terms of time, cost and man-power, so that the risk of identification appears in reality to be insignificant.”
Really? The ISP is pretty easily identifiable by IP address and then it's a phone call to ask someone to run a database query. Unless they're doing it wrong ..
Re: W^X – write or execute
Oops - i see what they mean - as you were
W^X – write or execute
If you want to get symbolic about things, should that be W|X ?
Re: Two words
Well of course the former obviates the latter
The Grid's power consumption was eating way too much budget?
Open Source fixes a Microsoft engineering problem
Yes - it fixed a big one for me - i no longer need to use Windows (getting worse by the day)
And not forgetting that the best of all OSs still hides "known file extensions" by default so the scammer would have just seen it as a png
The problem ...
is not that the police is running an outdated version of Windows but the that the police is running Windows
What? Is that some kind of cling-on?
I must be missing something obvious, since i can't see why you'd use a toy sieve of an OS for mission-critical work in the first place ..?
OCD != LCD
and why one needs flash to access audio content on BBC
What Marx probably would have said is that the current proliferation of service industries is merely an indication of the weakness of capitalism in the areas in which they emerge and that they are simply processing value created elsewhere.
Re: Noticed Flash updates....
... then without Windows!
Re: Firewall and different programs
>>One way to make IE and Edge safer is to disable their internet access<<
(McEnroe voice) You cannot be serious?? If you aren't, then that's quite amusing.
Utterly preposterous that their 'new' browser can suffer these kinds of vulns.
I've had the misfortune to touch about 4 Win 10 boxes and i think in every case Edge seemed to be fundamentally broken.
Don't you mean http://technojeeves.com/tech/freebsd_logo.png ?
Ideal for a defeated Trump to retire to with his family to escape the imaginary Mexican threat. He can afford it - or so he says...
That's just the ticket - juxtaposition of Arabic/Quranic marks and bacon. Clickbait? Or a bid to be the next Salman Rushdie? ;)
Why user processes should persist after logout?
There are probably innumerable reasons. My own use case: play an audio file and close the laptop machine down at a time of my choice. In the meantime, i do NOT want or need to be logged in.
I don't expect some asshat to ignore my nohup and at commands and treat my like some moron
Get me Hennimore!
Since a capable Linux user would treat this as normal behaviour – why sit there watching a screen when there's nothing happening, it's unwelcome.
I must have read this a dozen times. And it still doesn't make a blind bit of sense ,,,
What i can't understand is, in these malware tales, why the malware vectors are almost never identified. Maybe someone can explain?
He is said to travel to the UK to install Oracle databases at hotels and restaurants.
Presumably they'll take this offence into consideration too ...
Re: "Fifty per cent of the bill of materials of our 3D printers are printed by our 3D printers"
You got my upvote because you're right but they can probably count on only a minuscule number of their targets to know that, so they'll brag anyway.
Personally, if i didn't feel i was being bilked by the likes of HP or if i didn't require a degree in statistical analysis to figure out how to get value for money ( if indeed that's possible ), i'd do a lot more printing instead of avoiding it like the proverbial.
Re: "Captain Haddock cosplay contest at a Geography teachers’ convention"
I'm more worried than unamused - i think it's time Dabbsy went to see someone
SEC warns cybersecurity is biggest threat to financial system
How does that work? Isn't that like saying safety is the biggest threat?
Energy harvested from bacteria alone isn't enough to provide a decent charge. In 2013, a team of scientists from Bristol Robotics Laboratory managed to produce a meagre 2.5mW – much lower than the 5W output of a typical phone charger – from urine-powered bacteria.
Why not combine the two approaches then? I often find I piss in the plant pots after a big night out so finding my spare phone charged in the morning would help to alleviate the hangover.
It is "basically real-time translation of Linux syscalls into Windows OS syscalls"
There should be a name for that. How about ENIW? Geddit?
Collateral damage or cannon fodder?
Windows phone owners today are "collateral users" – they just happen to be standing in the path of a major platform update.
Windows owners today ...
And if you don't think you're standing in that path - yes you enterprise Win 7 users for instance - how sure are you that you won't see Win 10 the next time you look?
Re: Bigger fail
You're probably right!
The password found within the app's code allowed the hackers to access the app’s settings. From there they tapped into the phone's system settings ...
Worse than leaving a hard-coded password in the app, why on earth should breaking in to application-level code be able to lead on to (what should be) OS-level access?
Is that American Dad?
Hint: None of them are Apple
None of them IS Apple
We're not actually evil
You're a cybercrime kingpin. You need a new evil lackey. How much do you tell them?
Err .. "we're called Google"?
Cheap at the price
fuel consumption of around "250 mpg (equivalent)
Not bad! So a journey of 250 miles is going to cost me about £3.79 (a litre of petrol being roughly £1 at value stations) then?
Your call is important to us
feedback from our customers is really important to the team and to me personally. I read the blogs, I read the comments, I read social media ...
Pity they don't react to the reception of the spyware control-freak platform that's Windows 10
Firemen != mass noun
The year before, the same hospital saw no less than eight firemen...
You mean "no fewer"
What about management?
OTOH, they're looking for people high on the sociopathic spectrum for management. Qualities sought include:
a. no empathy with customers or regard for their best interests and wishes
b. a complete lack of conscience/remorse
c. ability to view humans as merely potential profit centres and datamines
So, as these become more popular will we see management getting fake anti-phishing (i.e. phishing) links?
Re: Reliable way to check the output
Things like stenography can be detected when comparing to original source (if available else where) etc.
You mean, say, by traces of nail polish from a secretary?
Our office currently gets about 50 emails a day which are not picked up by the a/v at the ISP, the different a/v on the gateway nor the a/v on the desktop. Many of these look like ...
All very commendable, not to say heroic. So why exactly are you still using Windows?
0000000: 8501 0c03 4c8c 9506 6833 55b6 0107 fd16 ....L...h3U.....
0000010: 2597 49f8 0cb1 3621 075c 3ce1 b32a 67b7 %.I...6!.\<..*g.
0000020: 2347 a773 fa6a 4376 3717 be53 959b 01a1 #G.s.jCv7..S....
0000030: 702d 3ff6 4375 579d 0931 7d5e dcb8 ec7a p-?.CuW..1}^...z
0000040: ca88 d7ed cab4 64cb 70be 9578 ec54 a31b ......d.p..x.T..
0000050: 24dd 40f2 e268 ba64 d843 d021 d7e9 fd2e $.@..h.d.C.!....
0000060: 8e84 a0c5 9eaf ceb7 dd42 6af4 7cb5 dcde .........Bj.|...
0000070: 66cc 8e40 580d ff4d caf3 fad6 f175 756c f..@X..M.....uul
0000080: 8e1a 83ac aab0 025c 85d9 98e5 3ea6 e7a5 .......\....>...
0000090: d0ef ac66 636b a7ca b0ed f07f dc68 0b74 ...fck.......h.t
00000a0: 0ce2 a74e 3980 55c5 64ae a648 090d 83d1 ...N9.U.d..H....
00000b0: 2a4d baa6 74d0 7dae 2b71 437c d6af aa94 *M..t.}.+qC|....
00000c0: 7c0d 4879 95ab bc8f 6302 748a 844a ceea |.Hy....c.t..J..
00000d0: d592 951b 92cb 8f12 b92b 8af8 87e8 354e .........+....5N
00000e0: cd10 ced4 931e 6eae e480 3569 677c 4f96 ......n...5ig|O.
00000f0: e1cd 235b e849 eb0b 393e e864 f7ed 1a12 ..#[.I..9>.d....
0000100: 682c 4805 c59c ed34 ad12 d474 66a1 efd2 h,H....4...tf...
0000110: 4f01 0af7 b6cc c977 1bc5 45dd 68ba b276 O......w..E.h..v
0000120: e447 423c d239 20e3 f212 182c 54a0 c345 .GB<.9 ....,T..E
0000130: 41a9 684e 6458 857c 00c0 1e09 6aa6 26b0 A.hNdX.|....j.&.
0000140: 271e 84ac fafe 649d 9872 78d1 9bef 15f8 '.....d..rx.....
0000150: d6ca 046f 6ef8 1edd fac4 55a1 95e0 e8d7 ...on.....U.....
The above is a dump of a gpg-encrypted file containing 16 famous digits. I must be missing something - where are the metadata there?
Facebook brings European cats' snaps ...
I didn't know cats take photographs ...
Bookending such a pair of tech heavy weights has sparked much debate over what the Vatican is up to.
Or what Tim (a better candidate for the appellation "Whore of Babylon") Cook is up to. Come on guys - follow the money!
Lower wool content for sec issues please
and is detected by only a handful of antivirus platforms.
Verb and noun
Then when you next login,
No, no, no! The verbal form is TWO words. What you've got is a noun
Re: Why keep reporting these stats
I myself am near a 100% Linux person
I hope the odour isn't bothering you