Comment Re:Is this real? (Score 1) 394
Now, get off my lawn.
You left your lawn 15 years ago. It's now made of plastic and kids play there.
Now, get off my lawn.
You left your lawn 15 years ago. It's now made of plastic and kids play there.
while the US delays his trial until after he's disclosed his sources under torture
poor guy. If the sources weren't stupid, they used anonymous submission and neither Assange nor anyone else at wikileaks knows the sources.
Bradley Manning -- sadly -- was stupid enough to brag/chat about his leak. That's what got him arrested and possibly killed.
Imagine a source just walking up to Assange saying: "Hi, I'm soandso, here's a dvd with some interesting stuff, but don't tell anyone you got it from me, right?". Pretty grotesque. There's guidlines on wikileaks.ch on how to submit using tor or postal.
Everyone has his price
...some inmate of a swedish prison will find strange letters on the wall saying something like 'a738f92dfd009ff3d8aab51'.
how many root servers are not controlled by the usa?
a lenovo x60 has a wacom
pretty thick, though
nah, after one day, it's a one-day.
with fifth mirror pixel
I have a Popcorn Hour A100 (old-school) that does it all except DTS audio...
? there's a software DTS decoder. comes with ffmpeg or mplayer, dunno which
I've seen decompression problems with certain matroska files, though, that look like a DTS problem and cause a fallback to trying to use hwdts output. It's a shortcoming of the mkv-demuxer (used by default in mplayer since some time). If that's what you're experiencing, using -demuxer lavf should help.
how's 1080p x264 playback with that setup?
stunning!
have a zotac ion, have perfect h264 playback at 6% cpu using
mplayer -vo vdpau -vc ffh264vdpau
That's lame... now if they used a laser,
it's a buffer overflow vulnerability. so it has nothing to do with the scriptability of pdf this time.
not to this particular exploit.
wouldn't bet my life on there being no buffer overflow in these, though.
disabling javascript wont help if you open PDFs with acrobat reader
from the metasploit module code:
Adobe CoolType SING Table "uniqueName" Stack Buffer Overflow',
This module exploits a vulnerability in the Smart INdependent Glyplets (SING) table handling within versions 8.2.4 and 9.3.4 of Adobe Reader. Prior version are assumed to be vulnerable as well.
The answer to the question of Life, the Universe, and Everything is... Four day work week, Two ply toilet paper!