I'm curious how you feel about trade sanctions etc etc
24 posts • joined 4 May 2010
I'm curious how you feel about trade sanctions etc etc
It strikes me that the market share in XP can fall as a percentage without falling as an absolute number simply by an increase in the number of non-XP systems. Some back-of-the-napkin math:
To start you have:
10 XP,10 W7, 10 W8
That's 33% market share for XP.
Then increase the others:
10 XP, 20 W7, 20 W8
XP now only has 20% market share but nobody that was using XP has actually stopped using XP.
Dang now I want to play Lure of the Temptress!
I'd like to think they were encrypted and not the only copies but I know what these civil servant types are like. No doubt somewhere out there is a postman who now knows things he shouldn't.
This guy didn't threaten to go public he just discreetly disclosed the bug to Verizon and they fixed the vuln. in 2 days. That's a damn sight faster than most companies patch bugs.
Anyone else notice that his posts lists the system he was testing on as XP SP 3?
That's why you could use this http://asuswrt.lostrealm.ca/about as phuzz already mentioned.
I can't imagine there's too many closed-source systems that get patched by 3rd parties while the vendor delays patching it themselves.
Why? It says they are uploading custody photographs so presumably these are photographs taken of people while they are held in custody but not necessarily ever convicted of something. I suspect police are capable of taking off the disguises before taking the photographs...
Last I checked HTML had IFrames not iFrames. Methinks somebody has been writing about Apple products a tad too much lately.
Many years ago I found myself with access to somebody open Wi-Fi router which had default passwords for the admin interface. With that in mind it seemed fairly obvious that manually setting the DNS server in the DHCP settings would allow me to redirect the owner of the router's traffic.
Whilst not as complex as the binder described here I was able to cobble together an infection tool that would essentially proxy requests and inject code into a binary as it was downloaded in about 2 days. I'd already written a tool years before that allowed for adding new sections to PE executables and it was only a matter of converting it to be able to work on-the-fly by buffering just enough of the PE header to know where to to the entry point for the program to before letting the rest pass through until it came time to tacking on the extra malicious code on the end.
I never actually used the code as it was more a proof-of-concept/I wonder if I could do it kind of thing but it worked in my own test environment.
Which tools and who do you get support from?
You've completely missed the point of the feature.
I think this is a brilliant idea. Having to wait so long to watch content you know is already out there but just not licensed for your country yet is really frustrating and definitely a temptation to just download it from other illegitimate sources.
I'll be honest I didn't bother to check whether the fixed exploits were already publicly known but if they weren't then I feel sorry for anyone who independently found those exploits and were planning to use them at the contest. They've just wasted a whole lot of time.
Well yes, what with it basically putting that thought into the reader's mind in its closing paragraph and all...
Said browser would (I'm pretty sure) try and use the same network interface for all of those multiple connections. The connectify program seems to just make those connections happen over a range of NICs so you effectively get more bandwidth.
Interesting news but wow there are a lot of typos in this article. Do you guys at the reg have editors?
I'm no physicist but surely the screaming being played through the phone's speaker will cause the phone itself to vibrate and thus make the microphone vibrate as well. Granted you don't get that kind of feedback during calls but I'm rather assuming you don't because of a bit of clever filtering. Does anyone with more knowledge of physics know better?
Google has not abandoned XP users at all. It has abandoned all the numpties who are daft enough to be using IE. Anyone with the brains to have switched to another browser like firefox or chrome will be just fine.
Frankly I can't believe it's taken this long. If the value of bitcoins can be reduced to 0 by one large sale that seems pretty significant. It doesn't have to be the result of a hack either. If we assume there's more than one account with that many bitcoins at present (and I'm sure there are plenty) then any one of them selling their bitcoins will crash the currency and wipeout the value of every other user with bitcoins. Seems like a dangerous game to play to me.
The article states he has a curious LAST name. I think you'll find Gavin and Kelly are first names. Read the article properly before making your snide comments in future.
Likely just in the military or some such and they have a cycling club. big woop.
Being unique and being trackable are two different things. If the bits of information that make you unique can be condensed down into a number AND those bits don't change then it can be used to track you. However, if you can keep these bits constantly changing, say by listing a fake plugin with a randomly generated name, then although you remain unique you can no longer be tracked. Granted this could start an arms race with the would be trackers, who in turn would try to filter out the fake from the real but I suspect that ultimately it wouldn't be worth it for them.
Having an old PC doesn't excuse software from crashing and just because it doesn't crash for you doesn't mean the code isn't buggy.