Re: Observed truths were are told should be "wrong"
Hating on all BMW drivers and black people eh?
34 posts • joined 4 May 2010
Hating on all BMW drivers and black people eh?
Why would you macro TWO to be ONE + 1 and not simple 2? It's far too contrived looking for me to believe you actually had sleepless nights over this. Please tell me you simplified the code for example's sake.
115 should obviously be called Elerium-115
Why are they investigating if they tried to monetise it if it's immaterial?
Is 0.000000000000000000000000000000000000000000001 a tiny number though? It's a lot bigger than 0.000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001
Surely it's relative to the kind of numbers you'd normally be talking about. Both your example and mine are tiny compared to the normal >1 numbers we use on a day to day basis. 100 out of 650,000 is pretty small and given that when companies normally get hacked you're not normally talking about hundreds of credit card details getting stolen. The number is usually quite a lot bigger.
Not that I'm excusing them.
Pre-image, no not that I'm aware of but chosen prefix? Yes. See this https://marc-stevens.nl/research/papers/EC07-SLdW.pdf for an attack on X.509 certificates and there has been limited success with collision attacks against executables.
Anybody with access to Oracle's software can discover vulnerabilities and I'm sure there's plenty of security researchers out there who'd be tempted to sell exploits to crimeware developers or worse, imo, to governments. Bug bounties at least offer another paid alternative.
Whilst I'm certainly not part of this Apple witch hunt... How many US citizens live most of their lives "at the office"?
It's a good analogy except for the slight oversight that you don't tend to get fired for refusing to give someone the keys to their cars.
I've been thinking this for quite a while now. Being a developer with these kinds of tools running on my machine most of the time in the background just idling, I've probably avoided a whole heap of exploit kits.
I'm curious how you feel about trade sanctions etc etc
It strikes me that the market share in XP can fall as a percentage without falling as an absolute number simply by an increase in the number of non-XP systems. Some back-of-the-napkin math:
To start you have:
10 XP,10 W7, 10 W8
That's 33% market share for XP.
Then increase the others:
10 XP, 20 W7, 20 W8
XP now only has 20% market share but nobody that was using XP has actually stopped using XP.
Dang now I want to play Lure of the Temptress!
I'd like to think they were encrypted and not the only copies but I know what these civil servant types are like. No doubt somewhere out there is a postman who now knows things he shouldn't.
This guy didn't threaten to go public he just discreetly disclosed the bug to Verizon and they fixed the vuln. in 2 days. That's a damn sight faster than most companies patch bugs.
Anyone else notice that his posts lists the system he was testing on as XP SP 3?
That's why you could use this http://asuswrt.lostrealm.ca/about as phuzz already mentioned.
I can't imagine there's too many closed-source systems that get patched by 3rd parties while the vendor delays patching it themselves.
Why? It says they are uploading custody photographs so presumably these are photographs taken of people while they are held in custody but not necessarily ever convicted of something. I suspect police are capable of taking off the disguises before taking the photographs...
Last I checked HTML had IFrames not iFrames. Methinks somebody has been writing about Apple products a tad too much lately.
Many years ago I found myself with access to somebody open Wi-Fi router which had default passwords for the admin interface. With that in mind it seemed fairly obvious that manually setting the DNS server in the DHCP settings would allow me to redirect the owner of the router's traffic.
Whilst not as complex as the binder described here I was able to cobble together an infection tool that would essentially proxy requests and inject code into a binary as it was downloaded in about 2 days. I'd already written a tool years before that allowed for adding new sections to PE executables and it was only a matter of converting it to be able to work on-the-fly by buffering just enough of the PE header to know where to to the entry point for the program to before letting the rest pass through until it came time to tacking on the extra malicious code on the end.
I never actually used the code as it was more a proof-of-concept/I wonder if I could do it kind of thing but it worked in my own test environment.
Which tools and who do you get support from?
You've completely missed the point of the feature.
I think this is a brilliant idea. Having to wait so long to watch content you know is already out there but just not licensed for your country yet is really frustrating and definitely a temptation to just download it from other illegitimate sources.
I'll be honest I didn't bother to check whether the fixed exploits were already publicly known but if they weren't then I feel sorry for anyone who independently found those exploits and were planning to use them at the contest. They've just wasted a whole lot of time.
Well yes, what with it basically putting that thought into the reader's mind in its closing paragraph and all...
Said browser would (I'm pretty sure) try and use the same network interface for all of those multiple connections. The connectify program seems to just make those connections happen over a range of NICs so you effectively get more bandwidth.
Interesting news but wow there are a lot of typos in this article. Do you guys at the reg have editors?
I'm no physicist but surely the screaming being played through the phone's speaker will cause the phone itself to vibrate and thus make the microphone vibrate as well. Granted you don't get that kind of feedback during calls but I'm rather assuming you don't because of a bit of clever filtering. Does anyone with more knowledge of physics know better?
Google has not abandoned XP users at all. It has abandoned all the numpties who are daft enough to be using IE. Anyone with the brains to have switched to another browser like firefox or chrome will be just fine.
Frankly I can't believe it's taken this long. If the value of bitcoins can be reduced to 0 by one large sale that seems pretty significant. It doesn't have to be the result of a hack either. If we assume there's more than one account with that many bitcoins at present (and I'm sure there are plenty) then any one of them selling their bitcoins will crash the currency and wipeout the value of every other user with bitcoins. Seems like a dangerous game to play to me.
The article states he has a curious LAST name. I think you'll find Gavin and Kelly are first names. Read the article properly before making your snide comments in future.
Likely just in the military or some such and they have a cycling club. big woop.
Being unique and being trackable are two different things. If the bits of information that make you unique can be condensed down into a number AND those bits don't change then it can be used to track you. However, if you can keep these bits constantly changing, say by listing a fake plugin with a randomly generated name, then although you remain unique you can no longer be tracked. Granted this could start an arms race with the would be trackers, who in turn would try to filter out the fake from the real but I suspect that ultimately it wouldn't be worth it for them.
Having an old PC doesn't excuse software from crashing and just because it doesn't crash for you doesn't mean the code isn't buggy.