Re: The judge still did me for Indicant Exposure.
An indicator that's not exposed is pretty pointless....
2167 posts • joined 11 May 2007
An indicator that's not exposed is pretty pointless....
First name "Thickas"?
That nutter was white. Terrorists are brown!!
Does it have GPS? Didn't see it mentioned in the review.
The fact it allows you to manage app permissions is very cool! It makes you wonder why none of the big Android names have a similar feature....
"Anyone who actually needs secure email already has it." <> "it was readily available."
"It's HARD! to understand!" why you're arguing about this. Your first post clearly said that those who needed it already had it. You twist and turn like a mouthy smartarse hoisted by his own petard....
Everyone actually needs secure email.
Comparing the lovely Google with those bastards at Micro$haft!!!!
Not everyone drives.
The fundamental issue here is the statelessness of http/tcpip. I'm not sure why cookies particularly get the blame for this, any solution that requires the client to hold some state is open to hijacking. Any solution with no client state at all has to treat you like it's your first visit every time you use it. If you log in it has to store a token to keep you authenticated, and whether you pass that as a header or as a cookie it's still effectively the same thing. Cookies are not the problem, statelessness is.
Besides, if all the hacker can do is change a cookie and that compromises the app then the app is being too trusting of it's input.
It's a joke about the current VW scandal.
Like Eadon for Apple instead of linux. DFTT.
No, half of them will harp on and on about how it's not important because it was patched quickly.
(Not an apple hater particularly, just amused by the tedious excuses.)
Well Damm Mr. likes to slag other people off but doesn't post with a name, there's no excuse for posting that sort of personal attack AC. You slag someone off for being pompous then hide your own posting history. Why?
Grow a pair.
No, because this kind of lazy, sexist bollocks is not funny. Just strangely prevalent in this mostly male forum. Or maybe you're all just as ironic as I am.....
Because once, some time ago, a woman was in charge.
Ha! Good one! It's 2015 and a text file can hack your Apple Watch.
With windows 10 data slurping it's no different.
... but knowing and having faith that the system will give you the right raise.
Now pull your knickers up and go and make me a cup of tea!
I love it.
Most Android users don't get security patches however long they wait.
A lot of windows devices are attached and are in the latest up to date fully patched state (as long as you don't count Windows 10 as a patch, obv...). We're discussing OSs, not all the additional code on the devices.
Not to mention the 50% of iDevices that are up to date.
You new here Aimee? At El Reg the glass is ALWAYS half empty.
Regular security patches?
Chrome OS takes 6GB? Don't lightweight Linux's run in under a gig? How did they manage to use that much?
The discussion is about searching when you don't know who you want to give your business to. If you've decided already why would you be searching?
All out of "Gandalf's Memory Stick" and "Wizard's Sleeve" then?
Fuck fairness to Google.
This is a slippery slope elReg, I'm not sure why you thought this was necessary. Are all security articles to come with links to associated best practices? This just makes it look like you're worried Google might get upset with you. Never seems to bother you with Apple or MS (but then, they don't effectively own internet search)...
No, I think you'll find that while the cattle are lowing and baby jesus awakes, no crying he makes.
Surely they'd have been in a worse position if they hadn't been cloudy and the data centre taken out was their only one.
Duh! Look around you.
I guess you believe "everything just exploded into being" is a better explanation than "god made everything explode into being". They both sound pretty similar to me...
No. The mms thing shuts down the attack vector from an unopened mms but doesn't fix the underlying vulnerability which is in android's video player.
I keep Refreshers on mine.
People react differently to the same thing. Apparently you all feel fine with some random bloke who's close enough to bluetooth a picture of his cock to your phone. Me, i'd be a little freaked out by that. I can imagine some people might feel violated by it.
You don't get to decide how other people feel and when you say they're wrong all you're really saying is "i don't do empathy".
Sounds so much better than "Google made an OS without thinking about security patches and they've just realised that that might be a problem."
But back in the days when some people thought drunk driving was acceptable you might have been.
...but at some point one has to move to more interesting, rewarding (or not) real-world activities.
Jesus, could you patronise that up a bit for me Grandad?
Yeah, it's not like this is a Windows issue.
That just blocks an attack vector though, doesn't it? I though Stagefright was a video system problem. If so then other methods of playing videos would still be vulnerable.
is open to answer and close to hang up!
If you don't want stupid headlines you're on the wrong site.
Google analytics is pretty much everywhere.
You mean like every browser does until you check the "don't ask me again" box?
Sounds like IE has a security hole and Edge doesn't. Why would you want your browser to be able to allow remote access to your machine?
They don't have to be the default to be used.
Biting the hand that feeds IT © 1998–2017