19 posts • joined 9 Dec 2011
Re: For all those "but router switches use BusyBox!"
That's not correct. The Cisco IOS-XE is a Linux system, running multiple instances of the old IOS in a virtualisation environment. LOTS of Cisco products are affected by the Bash bug and have currently not patch.
I think The Register has messed up with some numbers. That cannot be the real transmission speed.
Re: The really don't "get it"
That's the case with Lufthansa. Frequent Travellers get a different number to call altogether.
Re: "what happened before the big bang"
Not every celestial object has enough mass to become a black hole.
I believe they have already catched up?...
Re: Linked in replied?
Apparently they remove Leon Trotsky, but that was funny enough :-)
Re: Question about DOS attacks...
It is a very complex topic, however there is a report on the Imperva web site detailing how they blocked this attack. You may want to have a look at that.
It has been *a bit* more complicated that just using compromised machines to launch a blind DOS. The attack was sophisticate.
Hope it helps.
There is actually clear evidence that they protected convicted priests and even re-employed them to continue their offices in a different city.
The encryption algorithm has very little to do with the kind of service - 2G, 3G or 4G - you are able to receive on your mobile.
The most common encryption algorithm found today - and the one the CCC has "cracked" - is A5/1. A5/3 upgrade is available for 2G networks as well, and AFAIK it has not been challenged yet.
The problem is that old BTSes may require expensive upgrades to support A5/3. This is where the problem lies.
Re: rising processor power -> "uncrackable" sytems become crackable
GSM specifications are - and always were - very open and available publicly. The fact that people don't bother reading through hundreds of pages of specifications doesn't make them "obscurity".
On Foursquare, checking into "bed" is forbidden (although it is not enforced). Your home location is not shared in a way that it can be identified.
Re: Dear world at large
Of course they will correctly assume you live alone and no one else is there, correct?
Re: I don't see how this affects botnets.
This is not how botnets generally work.
Although some may use hardcoded IPs, the majority now keeps kind of regular expression of domain names (like bot*.net) and will more or less randomly try to resolve the names until they find one that works (like botnet1.net, botnet2.net, or botbot.net, etc.).
If the malware can resolve the name longer after it has been de-registered, we clearly have a problem.
...which is basically what the entire Bible is... admitting an ancient collection of writings, written by dozen of people in the bronze age and arranged by even more obtuse ones during the Middle Age era, has any authority over how we were actually made.
Why just NASA? it's a join venture mission.
At least once us Italians do something good, give us the credit ;-)
Bad post. There is no book - no exception - that is not worth reading. If you consider Apple and Jobs uninteresting, maybe you need it even more.
Bogus argument. 1 out of 3 schools in the USA use OpenDNS. It is often superimposed by administrators. Also, the hack described works regardless if you are a registered user or not, it only requires you to use OpenDNS's resolvers. The attacks only is required to be a registered user.
If you Treo had a phone chip, its battery would not last 3-4 days... not that difficult to understand...
Space Trader is Open Source (GPL) and has been ported to iPhone. So if this is all you need...
- Vid Antarctic ice THICKER than first feared – penguin-bot boffins
- Antique Code Show World of Warcraft then and now: From Orcs and Humans to Warlords of Draenor
- Hi-torque tank engines: EXTREME car hacking with The Register
- Review What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
- Regin: The super-spyware the security industry has been silent about