16 posts • joined 4 May 2010
Apple on the brain much?
Last I checked HTML had IFrames not iFrames. Methinks somebody has been writing about Apple products a tad too much lately.
Perhaps some novelty but...
Many years ago I found myself with access to somebody open Wi-Fi router which had default passwords for the admin interface. With that in mind it seemed fairly obvious that manually setting the DNS server in the DHCP settings would allow me to redirect the owner of the router's traffic.
Whilst not as complex as the binder described here I was able to cobble together an infection tool that would essentially proxy requests and inject code into a binary as it was downloaded in about 2 days. I'd already written a tool years before that allowed for adding new sections to PE executables and it was only a matter of converting it to be able to work on-the-fly by buffering just enough of the PE header to know where to to the entry point for the program to before letting the rest pass through until it came time to tacking on the extra malicious code on the end.
I never actually used the code as it was more a proof-of-concept/I wonder if I could do it kind of thing but it worked in my own test environment.
Re: And the price for being able to develop for all MS products with support ?
Which tools and who do you get support from?
Re: Edge Snapping == Fail
You've completely missed the point of the feature.
I think this is a brilliant idea. Having to wait so long to watch content you know is already out there but just not licensed for your country yet is really frustrating and definitely a temptation to just download it from other illegitimate sources.
There's some unhappy folks out there now.
I'll be honest I didn't bother to check whether the fixed exploits were already publicly known but if they weren't then I feel sorry for anyone who independently found those exploits and were planning to use them at the contest. They've just wasted a whole lot of time.
Re: Anyone else thinking...
Well yes, what with it basically putting that thought into the reader's mind in its closing paragraph and all...
Re: "with HTTP using multiple connections these days"????
Said browser would (I'm pretty sure) try and use the same network interface for all of those multiple connections. The connectify program seems to just make those connections happen over a range of NICs so you effectively get more bandwidth.
Interesting news but wow there are a lot of typos in this article. Do you guys at the reg have editors?
Two phones or a flawed experiment surely
I'm no physicist but surely the screaming being played through the phone's speaker will cause the phone itself to vibrate and thus make the microphone vibrate as well. Granted you don't get that kind of feedback during calls but I'm rather assuming you don't because of a bit of clever filtering. Does anyone with more knowledge of physics know better?
Misleading as ever
Google has not abandoned XP users at all. It has abandoned all the numpties who are daft enough to be using IE. Anyone with the brains to have switched to another browser like firefox or chrome will be just fine.
Quite revealing really.
Frankly I can't believe it's taken this long. If the value of bitcoins can be reduced to 0 by one large sale that seems pretty significant. It doesn't have to be the result of a hack either. If we assume there's more than one account with that many bitcoins at present (and I'm sure there are plenty) then any one of them selling their bitcoins will crash the currency and wipeout the value of every other user with bitcoins. Seems like a dangerous game to play to me.
Time to replace those glasses?
The article states he has a curious LAST name. I think you'll find Gavin and Kelly are first names. Read the article properly before making your snide comments in future.
Probably nothing special
Likely just in the military or some such and they have a cycling club. big woop.
Who cares if you're unique?
Being unique and being trackable are two different things. If the bits of information that make you unique can be condensed down into a number AND those bits don't change then it can be used to track you. However, if you can keep these bits constantly changing, say by listing a fake plugin with a randomly generated name, then although you remain unique you can no longer be tracked. Granted this could start an arms race with the would be trackers, who in turn would try to filter out the fake from the real but I suspect that ultimately it wouldn't be worth it for them.
Yep, just cover your eyes and ears and make stupid noises and the problem will go away
Having an old PC doesn't excuse software from crashing and just because it doesn't crash for you doesn't mean the code isn't buggy.
- Product round-up Too 4K-ing expensive? Five full HD laptops for work and play
- Review We have a winner! Fresh Linux Mint 17.1 – hands down the best
- Vid Antarctic ice THICKER than first feared – penguin-bot boffins
- 'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
- You stupid BRICK! PCs running Avast AV can't handle Windows fixes