Re: Nothing new here
13 posts • joined 12 Mar 2010
Hadn't thought of that!
Anonymous Bullard, some may be implemented as a ShowWindow hack, but the functionality has been around since at least NT4 to create proper desktops and this is the method that the SysInternals tool used. Documented at http://msdn.microsoft.com/en-us/library/windows/desktop/ms682573(v=vs.85).aspx
Now I know what the rest of the articles on El Reg seem like to "normal" people.
The anonymous replies seem to miss the point. Other platforms have had a spate of bugs which allow anyone to pick up a handset and bypass the lock screen, giving them somewhere between "full" and "pretty substantial" access to the device with no prior access or action required.
This flaw requires an attacker to persuade a user to install software and then, later, physically access the device and take advantage of the lock-screen bypass software they've installed. Doesn't seem in quite the same class to me?? As others have said, if you're in a position to be able to persuade the target to install software you could just persuade them to install software to access the data / feature you're interested in and forget about having to physically retrieve the handset later.
I'm not sure it counts as Raymond's airtight hatchway because it sounds like a local privilege escalation.
All done here, with the exception of Exchange, which is still the only software I can find with decent calendaring and push support. Looking forward to your views.
Layer 4 connections per-second-per-Watt = Layer 4 connections per Joule.
"1,046 requests per second per watt"
"1,046 requests per Joule"?
"Thompson is right to prostate himself in front of his customers"
Care to proof-read that??
"... Opteron was delayed for six months because of an error in a table lookaside buffer (TLB) on the chips..."
Thanks for trying to explain the TLA, but it's actually a transaction lookaside buffer.
That would be a million in any language.
Biting the hand that feeds IT © 1998–2017