Miért akar saját disztribet a kormány?
- Tovább (Miért akar saját disztribet a kormány?)
- 3931 megtekintés
There's no f*cking explanation of why we'd even want this crap. Not in the commit message, not in the pull request, not *anywhere*.
"A Magyar Telekom friss közleménye szerint novembertől országszerte elérhetővé teszik lakossági, valamint vállalati ügyfeleik számára is az 1000 Mbps gyorsaságú vezetékes netet azokon a területeken, ahol már kiépítették az ehhez szükséges optikai hálózatot. Ez a lakosságra nézve azt jelenti, hogy ötszázezer háztartásban lehet előfizetni vagy váltani a NetMánia 1000 csomagra, ami névleg 1000 Mbit/s le- és 200 Mbit/s feltöltési sebességet kínál, 300 Mbit/s garantált le- és 50 Mbit/s feltöltési sebesség mellett."
További részletek itt.
As an example of Android’s misunderstood security, Ludwig used the infamous series of critical bugs known as Stagefright, which were found last year. Ludwig noted that despite the alarm and the potential danger to practically all Android users, they have yet to see a real-life hack on an Android phone done exploiting Stagefright.
“At this point we still don’t have any confirmed instances of exploitation in the wild,” he said.
[ Google Security Engineer Claims Android Is Now As Secure as the iPhone ]
Michael Tsai’s Roundup of Commentary on the New MacBook Pros and the State of the Mac
Dozens and dozens of links here. Rather astounding how much backlash last week’s event has generated. I can’t recall an Apple event that generated such a negative reaction from hard-core Mac users. I’m working on a longer piece with my full thoughts on what’s going on, but for now, Tsai’s list of links is must-read stuff.
Ezúttal 7db Solaris exploit érkezett:
https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e…
https://www.myhackerhouse.com/hacker-halloween-inside-shadow-brokers-le…
https://en.wikipedia.org/wiki/Equation_Group
Our research team has uncovered new way to leverage mechanisms of the underlying Windows operating system in order to inject malicious code. Threat actors can use this technique, which exists by design of the operating system, to bypass current security solutions that attempt to prevent infection. We named this technique AtomBombing based on the name of the underlying mechanism that this technique exploits.
AtomBombing affects all Windows version. In particular, we tested this against Windows 10.
Unfortunately, this issue cannot be patched since it doesn’t rely on broken or flawed code – rather on how these operating system mechanisms are designed
[ AtomBombing: A Code Injection that Bypasses Current Security Solutions ]
Ian Beer of Google Project Zero, who found a deep-down vulnerability in the XNU kernel, first reported it to Apple in February this year, and it took until now to clean it up properly.
[ How Google's Project Zero made Apple refactor its kernel ]