My HTC One M8 has an Extreme Power Saving mode which replaces the Launcher, drops all network connections, and only allows a few basic functions to work. Not sure how long it will last, but easily over a week.
Or use a VM with snapshots or change logs, and when done, roll back all changes, so no matter how much the browser tries to stash, all gets eradicated.
It also works well to deal with compromised browsers, especially if the VM is run in its own NAT segment, so the compromised instance can't gain knowledge of network topology.
I actually paid for Netscape because it was a good browser at the time.
If the Mozilla Foundation needs cash, maybe a commercial browser may not be a bad idea, especially if it had enterprise level items like being able to be shipped as a
This may not mean much to the average consumer, but a supported browser version that can be managed by IT quite well might be a good revenue source, especially with it being platform independent.
Similar with Thunderbird and SeaMonkey. Other than Outlook and mail.app, there are not many good MUAs out there these days. Eudora is dead, and the Bat and Lotus Notes are niche products. Having an alternative to Outlook might be a good thing for businesses, especially if enterprise level management/update functionality could be added in.
If it is sitting empty on Windows 8.1, it is being used for read/write cache by the OS. Same with Linux.
With RAM as relatively inexpensive as it is today, one shouldn't have less than 16-32 GB of RAM on a desktop, especially if one is using virtualization, sandboxing, or other type of container usage to keep their Web browser separate from their sensitive stuff [1].
[1]: In fact, it doesn't hurt to keep different things in separate VMs, and with SSD and a decent amount of RAM, the performance loss is negligable, while one gains a lot in security. Plus, it is easy to move to new hardware... just copy the VM's images to the new machine.
In psuedo-skeptic world a thousand peer reviewed studies aren't worth a single paid Frank Spencer pro-fossil fuel shill piece in the WSJ.
This is another GLOBAL WARMING hoax!!!!! Ice is always melting!!!!!
I like Android's customizability and the ability to replace things. For example, I toss the launcher and go with Nova's. The keyboard app gets replaced, and I use a custom texting app that supports encryption.
Plus, I have more privacy on Android with XPrivacy. For example, a lot of apps pull your ad info, IMEI, hardware serial number, and anything they can find for behavioral tracking. With XPrivacy, the app will happily get a number... but it will be a random one. I can also ad block on the IP level.
Newer phones respond to fstrim/blkdiscard, so one can use those tools to fire off TRIM commands, zeroing all data. For example, if one wants to ensure
The good news is that there are apps (which require root) which will modify SELinux so that the SD card is usable. Since most SD cards are using FAT32, there isn't any real way to enforce permissions, so for security reasons, the card wound up being locked from most apps completely.
Of course, it would be nice if the SD card could be formatted with ext4, so permissions could be enforced.
Another option, which was part of Linux, but pulled out a long time ago, was the UMSDOS filesystem. What this did was put Linux permissions and ACLs atop of FAT/FAT32. Yes, this was a kludge... but it worked without having any changes to the filesystem (other than the marker files) in place. This might be a way to go, since it would allow the phone to enforce app permissions on a filesystem that normally doesn't support it.
The Windows format command does this. If one uses it on a BitLocker encrypted volume, it will go and zero the parts on the volume that hold the BitLocker master key, so even if someone later has a recovery password, the data is still completely gone. Same with secure erase on a number of SSDs.
Since Android is sitting on a SSD, it might be wise to move to a smarter wiping system. One that would wipe the dm-crypt data, core places of the filesystem, and after that, TRIM the entire data partition before formatting and rebuilding it. The TRIM command helps ensure that the data present isn't recoverable at the drive level, and likely will get utterly destroyed when the drive erases the TRIMmed pages.
I read about some newer phones using a chip to store the encryption key for
Maybe the ideal is a small bit of storage that is used, and if it is erased, the erasure is guarenteed (where there is no way to recover previously stored data.) Then, the master key is stored there. On initial bootup, the phone prompts the user for the PIN, decrypts the key stored on that small bit of storage for the master key to
Then there is the external SD card. Unlike
Of course, something like phonebookfs could be used so that someone looking at the encrypted file stash on the SD card can't tell between real data and randomly generated chaff, but that may not be something for mainstream phones.
The school owned the camera he used. Therefore all work from that camera belongs to the school.
No. It does not work like that. If you borrow my guitar and write a hit song, it's your song, the copyright is yours. If you borrow my camera and take a Pulitzer-winning photo, it's your photo, the copyright is yours. Copyright goes to the creator of a work, not to the owner of any tools incidental to the creation.
Argumentum ad dictionarum is at the very least an informal fallacy. Attempting to argue about what really is a specialized definition of the word "tool" with a general definition you find on Google is tantamount to a fallacious appeal to authority.
There is an actual definition of the word tool. We are under no obligation whatsoever to use your private definition.
And you're not an expert, so your criticisms are largely meaningless.
Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?