ENGLISHMANSDENTIST what, the septic tanks mean that the sploit is not worth paying for?
161 posts • joined 26 Oct 2009
ENGLISHMANSDENTIST what, the septic tanks mean that the sploit is not worth paying for?
I've got FF ESR 45.8.0 on Linux. No sign of any n-process to n-tab stuff (mores the pity). When will it start for me - or have i missed something?
Aren't TalkTalk doing a pretty good job of defrauding TalkTalk customers?
And shortly after that, a video surfaced of CEO Travis Kalanick berating an Uber driver who complained about falling fares. ®
Not Travis Bickell? Are you looking at me?
Letsencrypt certs don't last long, so you'll want to set up a nightly cronjob to make sure certbot looks for any certificates about to expire and renews them. The cronjob command is simply /root/letsencrypt/certbot-auto renew, which in the case of this guide would have to be run as root.
I know nothing of that script/binary yet it's worrying. Am i a reserve soldier in a botnet army just waiting to be called up? It's free, so am i the product? How much do i need to worry?
Apple's Mac operating system may be the safer choice
The comparative, since we all know there are only two OSs, right?
There's DRM by definition - it's a streaming client. What they don't like is any saving of that stream
Because they know that using a powerful OS might be used to circumvent their DRM?
Hockney's bottle-end specs must be developing a rose tint. This is more like it:
Thanks for that
The August updates brought in a series of operating system security improvements including boosts to Windows Defender and use of AppContainer, designed to raise the difficulty of having zero day exploits execute on patched systems.
Does this affect the current ranking of Defender versus other offerings? And just how good is sticking with Windows own anyway? (Genuine question)
The new attack uses the file names of sent attachments and applies that name into new attachments that appear to be PDFs but are actually images that, when clicked, send victims to phishing pages.
Could this by any chance rely on the default (!) Explorer setting that is named in my title? If so, the fooled 'technical users' can't be that technical that they would want extensions hidden, quite apart from their using Windows in the first place ...
PC spy nasty"
Windows 10 has rendered spyware stories obsolete much in the same way that the end of the Cold War has rendered spy books obsolete.
he says the plans are really just "guiding the lily."
In that case, though i applaud the sentiment, he needs to be slapped: it's "gilding the lily". Or does Kit Hall need a slap?
They think Java is free - because it’s open source so you can use it.
Really? Ever tried to get hold of all the source of the native calls into (say) Windows? i.e. the interesting stuff.
The thinking was that if China, or whoever hacked the company, could see an easier route to profit than espionage, why would they not pursue it?
Maybe because they are potentially going to get everything by cracking rather than a small subset of what you want them see when you sell it to them? Anyway, 'easier' isn't important. What is important is 'cheaper' and if that's what you really do mean, how do you know it's cheaper?
... plus, i thought that exploitation began after patching had been done, so why are patches coming into the exploits at all?
I spoke to them recently and brought up the issue of Cyanogen's doubtful future
They: "We have no news on this issue and our phone are not going to be affected as far as i'm aware"
Rooting their phones?
They: "i would certainly would advise against it as we don't support it"
You can do plenty of "content creation" on a Samsung Galaxy phone
But how many DO i wonder? Time will tell whether productivity (ok so not much Nobel prize winning content maybe) has dropped as a result of personal computers being superseded by devices centred around consumption? You consume Friendface and the like, and 'they' consume you(r data)
However in reality, that would be “practically impossible” because connecting a dynamic IP address to the ISP’s subscriber information means a “disproportionate effort in terms of time, cost and man-power, so that the risk of identification appears in reality to be insignificant.”
Really? The ISP is pretty easily identifiable by IP address and then it's a phone call to ask someone to run a database query. Unless they're doing it wrong ..
Oops - i see what they mean - as you were
If you want to get symbolic about things, should that be W|X ?
Well of course the former obviates the latter
The Grid's power consumption was eating way too much budget?
Yes - it fixed a big one for me - i no longer need to use Windows (getting worse by the day)
And not forgetting that the best of all OSs still hides "known file extensions" by default so the scammer would have just seen it as a png
is not that the police is running an outdated version of Windows but the that the police is running Windows
What? Is that some kind of cling-on?
I must be missing something obvious, since i can't see why you'd use a toy sieve of an OS for mission-critical work in the first place ..?
and why one needs flash to access audio content on BBC
What Marx probably would have said is that the current proliferation of service industries is merely an indication of the weakness of capitalism in the areas in which they emerge and that they are simply processing value created elsewhere.
... then without Windows!
>>One way to make IE and Edge safer is to disable their internet access<<
(McEnroe voice) You cannot be serious?? If you aren't, then that's quite amusing.
Utterly preposterous that their 'new' browser can suffer these kinds of vulns.
I've had the misfortune to touch about 4 Win 10 boxes and i think in every case Edge seemed to be fundamentally broken.
Don't you mean http://technojeeves.com/tech/freebsd_logo.png ?
Ideal for a defeated Trump to retire to with his family to escape the imaginary Mexican threat. He can afford it - or so he says...
That's just the ticket - juxtaposition of Arabic/Quranic marks and bacon. Clickbait? Or a bid to be the next Salman Rushdie? ;)
There are probably innumerable reasons. My own use case: play an audio file and close the laptop machine down at a time of my choice. In the meantime, i do NOT want or need to be logged in.
I don't expect some asshat to ignore my nohup and at commands and treat my like some moron
Since a capable Linux user would treat this as normal behaviour – why sit there watching a screen when there's nothing happening, it's unwelcome.
I must have read this a dozen times. And it still doesn't make a blind bit of sense ,,,
What i can't understand is, in these malware tales, why the malware vectors are almost never identified. Maybe someone can explain?
He is said to travel to the UK to install Oracle databases at hotels and restaurants.
Presumably they'll take this offence into consideration too ...
You got my upvote because you're right but they can probably count on only a minuscule number of their targets to know that, so they'll brag anyway.
Personally, if i didn't feel i was being bilked by the likes of HP or if i didn't require a degree in statistical analysis to figure out how to get value for money ( if indeed that's possible ), i'd do a lot more printing instead of avoiding it like the proverbial.
I'm more worried than unamused - i think it's time Dabbsy went to see someone
SEC warns cybersecurity is biggest threat to financial system
How does that work? Isn't that like saying safety is the biggest threat?
Energy harvested from bacteria alone isn't enough to provide a decent charge. In 2013, a team of scientists from Bristol Robotics Laboratory managed to produce a meagre 2.5mW – much lower than the 5W output of a typical phone charger – from urine-powered bacteria.
Why not combine the two approaches then? I often find I piss in the plant pots after a big night out so finding my spare phone charged in the morning would help to alleviate the hangover.
It is "basically real-time translation of Linux syscalls into Windows OS syscalls"
There should be a name for that. How about ENIW? Geddit?
Windows phone owners today are "collateral users" – they just happen to be standing in the path of a major platform update.
Windows owners today ...
And if you don't think you're standing in that path - yes you enterprise Win 7 users for instance - how sure are you that you won't see Win 10 the next time you look?
You're probably right!
The password found within the app's code allowed the hackers to access the app’s settings. From there they tapped into the phone's system settings ...
Worse than leaving a hard-coded password in the app, why on earth should breaking in to application-level code be able to lead on to (what should be) OS-level access?
Biting the hand that feeds IT © 1998–2017