|
OSI bean dip posted:Any basic understanding of prime numbers would be enough to not let you wonder about why these are the largest pairs. I am not going to explain what is wrong in this code because if you're asking this then you shouldn't dare think about writing such. As for Truecrypt forks, if we're going to apply that level of paranoia consistently, what can we use? We can't do public code reviews on commercial, closed source FDE tools like Bitlocker and PGP. We can't rule out government intereference in Truecrypt, nor can we rule it out with commercial offerings (MS removed the Elephant diffuser from Bitlocker ), or undisclosed vulnerabilities that malicous actors are also exploiting etc etc Mr Chips fucked around with this message at 13:51 on Nov 24, 2015 |
# ¿ Nov 24, 2015 11:35 |
|
|
# ¿ Apr 27, 2024 17:30 |
|
OSI bean dip posted:. Unless you work for FireEye/Mandiant, you have no loving business using that term.
|
# ¿ Dec 18, 2015 03:32 |
|
elite_garbage_man posted:I know this was posted a while ago, but I hope it helps. cheers, thanks for answering that question (and the others who did)
|
# ¿ Dec 18, 2015 05:41 |
|
what's the path to better kernel security look like if I'm heavily RHEL6-ified (including SELinux)? Is getting grsec into the mix feasible?
Mr Chips fucked around with this message at 12:31 on Jan 20, 2016 |
# ¿ Jan 20, 2016 12:24 |
|
I'm having an annoying argument with our central IT infosec team at the moment over whether Windows client machine AV is even worth the hassle/expense. We (big public sector org) keep getting hit by web and email based malware that the AV does nothing for, yet they insist it's critical for endpoint protection.
|
# ¿ May 2, 2016 03:17 |
|
dpbjinc posted:You know, most organizations I see constantly have prompts to update Acrobat Reader and Java and whatever. You can argue about antivirus all you want, but regardless, it's not the most important step in security. At least my section is all over this - patches are up to date, Applocker/SRPs have stoped a bunch of drive-bys, Flash is the one you get in Chrome or nothing at all, that one enterprise Java 6 app is published via RDS, etc etc
|
# ¿ May 2, 2016 04:20 |
|
Is there anything more recent than Ormandy's 2012 stuff on Sophos being poo poo? Central IT at my workplace has a 'policy' that it has to be installed on all machines (including RHEL machines) and having it sitting there taking up 200+ Mbytes x 2000 VMs seems like a waste of resources.
|
# ¿ May 3, 2016 01:42 |
|
Cugel the Clever posted:How serious is this? Generally speaking, is it a reasonable assumption that other AV software is likely to have similar design and implementation flaws? Do other vendors do dumb poo poo like run things at ring0 that shouldn't be running there?
|
# ¿ May 18, 2016 01:55 |
|
Cugel the Clever posted:An honest, if inflammatory question: Does Classic Shell have legitimate use scenarios beyond autists obstinately refusing to adopt modern UI?
|
# ¿ Aug 3, 2016 23:12 |
|
Cugel the Clever posted:That's for Windows 8 users. 8.1 brought back a sane option a little more than a year later (maybe you need to toggle it in the options?). Did they actually ship that? I remember some news articles in 2014 about how they were going to ship it, but don't have any 8.1 installs to look at any more.
|
# ¿ Aug 4, 2016 05:31 |
|
Hughlander posted:Rbl applied by mac family at the router level. "Dyn is under DNS 3com can access it, cheap Chinese up camera can't." Mr Chips fucked around with this message at 00:54 on Oct 24, 2016 |
# ¿ Oct 24, 2016 00:38 |
|
Hughlander posted:Are the IOT devices on the bot net spoofing mac addresses while getting dhcp from the router? Haven't seen that in the reports... If you're got root level access on a linux based device it shouldn't be hard (unless the device has been hardened to the point it wouldn't get compromised easily). I have NFI what most of this "IOT" smart lightbulb type crap runs, however.
|
# ¿ Oct 24, 2016 01:59 |
|
apropos man posted:I noticed that ebay have disabled copy and paste in the browser edit: it seems that ublock origin is blocking the .js Ebay use in this case Mr Chips fucked around with this message at 09:30 on Feb 25, 2017 |
# ¿ Feb 25, 2017 09:27 |
|
It should be possible to knock up a quick powershell script to read the contents of a PST mounted in Outlook (there's a bunch of API classes and methods documented on MSDN for this sort of thing), but if it was me doing it I'd have to second the suggestion of using libpst+readpst
Mr Chips fucked around with this message at 11:10 on Mar 18, 2017 |
# ¿ Mar 18, 2017 03:33 |
|
EVIL Gibson posted:So that Intel bug was worse.
|
# ¿ May 7, 2017 05:54 |
|
Cylance is a load of bollocks, isn't it? The information I can get about it is horribly vague, but couple of our assistant directors are carrying on like it's a silver bullet for windows client security after going to a Dell pissup.
|
# ¿ Jul 10, 2017 05:04 |
|
Cup Runneth Over posted:What's Upguard? UpGuard is the first cyber resilience platform designed to reduce risk of outages and breaches by managing configurations, IT processes, and vendor risk.
|
# ¿ Aug 20, 2017 15:26 |
|
Gotta be a honeypot, right?
|
# ¿ Sep 30, 2017 08:02 |
|
wolrah posted:i5s are not safe. It's not yet clear if those older Dell updates address the ME CVEs, or the TXE CVEs, that were included in this disclosure. Edit: apparently Intel Manageability Engine Firmware 8.x/9.x/10.x were also affected by these CVEs, but: "The two CVE IDs above were also resolved in earlier generations of corporate versions of Intel ME, where Intel® Active Management Technology shares the same code base. " As in, this isn't the first time Intel have fixed this particular ME vulnerability. FFS. Mr Chips fucked around with this message at 05:16 on Nov 23, 2017 |
# ¿ Nov 23, 2017 04:59 |
|
Proteus Jones posted:It's like Intel didn't learn a thing from the FDIV PR disaster. Even if they did, it was a generation ago now, and they've probably unlearned it all.
|
# ¿ Jan 24, 2018 01:47 |
|
All this spectre/meltdown stuff, what's the actual risk to the kind of end-user who only uses their unpatched device for loving around on social media? A malicious JS somehow runs for days and eventually pulls a cached password out of memory?
|
# ¿ Jan 27, 2018 02:54 |
|
Cheers. For this hypothetical home user, how important is a microcode update if the OS and browser are patched?
|
# ¿ Jan 27, 2018 03:15 |
|
Speaking of KeepAss, is it reasonable to assume that the Argon2 key derivation function provides some protection against brute-force attacks?
|
# ¿ Feb 26, 2018 12:23 |
|
orange sky posted:This fuckin picture I hope they choose their security algorithms better than their image scaling ones.
|
# ¿ Apr 4, 2018 02:52 |
|
It's all well and good to that religion isn't genetic, but Judaism was under the Nuremburg laws. Nuns and priests were gassed because they had grandparents who ticked Jew on a census decades earlier.
|
# ¿ Jun 8, 2018 02:15 |
|
Apart from the low level attack the original researchers used, has anyone come up with an easy way to test from Windows to see if any drive's TCG Opal implementation is broken?
|
# ¿ Nov 8, 2018 00:49 |
|
Edit2: The Fool posted:You're too fast, see my edit. New question edit: https://imgur.com/a/19ToXVb If a Samsung Evo 850 can be configured with the ATA Master Password Capability set to Max, it's apparently not vulnerable to the attack methods the researchers use. Is setting that value a BIOS/UEFI config item? RTFMing at the moment but it will take me some time Mr Chips fucked around with this message at 04:04 on Nov 8, 2018 |
# ¿ Nov 8, 2018 00:56 |
|
D. Ebdrup posted:The real question is whether you pronounce it X or 10. Mac OS X ten point twelve
|
# ¿ Apr 18, 2020 15:59 |
|
beuges posted:When I first sent them a query about it, I got this: did they also disable shift+end and double clicking in the password field?
|
# ¿ Apr 24, 2020 07:21 |
|
|
# ¿ Apr 27, 2024 17:30 |
|
Absurd Alhazred posted:Discovery of a cosmic side-channel corruption attack: is only they'd been using a blockchain
|
# ¿ Jul 5, 2021 02:38 |