I think if you had enabled the tls-auth option it prevents the attack.
Wow, that's surprising. Chrome eats memory on Ubuntu 12.04. Using version 34, with 19 tabs open, I'm using 2.9GB of private memory and 1GB proportional. This page is using 150MB for me. Maybe it's a 64-bit thing? After a day or so memory usage will approach 6-8GB.
I've found gmail to be particularly bad. My gmail tab is at 400MB right now, but within 24 hours it will balloon to 1GB and then keep growing. I think it usually ends up around 2-2.5GB after a few days, but I've seen it higher. I think there must be some kind of JS memory leak or something.
That said, it's not usually that big of a deal for me. I have 16GB of RAM, most of which is just cache unless I load a VM. Chrome's memory leaks do force me to close the browser and restart it though when I need to free up a few GB for running multiple simultaneous VMs.
Except when they deny you without telling you why, with no real appeal process, because you can't JUST get pre-check, you have to get one of the other certifications instead. The most common one is Global Entry, which allows expedited customs. Have you ever forgotten to declare something small coming back into the country and they find it (even if it's not prohibited)? Then you're permanently banned from this program. Ever had someone ship you something from overseas and accidentally misdeclare customs (outside your control)? Banned. I found out I was banned after paying the $100 non-refundable fee for the latter reason because a seller didn't fill out the customs form properly.
They need to offer a way to only get pre-check without going through one of the other programs.
It used to suck battery on my older phones, but on my last 2 phones (current being Galaxy S4) it doesn't even register most of the time. Bluetooth is integrated into the same chip as wifi, so if you leave wifi on then it shouldn't really use any extra power.
No they don't. I had Power Mac G5, 3Ghz. I got it as soon as it came out. It was liquid cooled. I never put serious load on this system, I used it as a workstation but rarely was it ever running at 100% CPU usage. One day I noticed it shut off and wouldn't turn back on. Turns out the coolant had leaked out over the logic board, frying it. I had paid $3500 for the setup, it was 2 years old. Did some research and apparently the o-rings in the first few runs were known to be defective, and they silently switched to a different supplier later on because of it. They still refused to fix it unless I paid $1500 for a new logic board (maybe more depending on if more needed replaced). Not only that, the monitor I bought for it had the proprietary Apple connector, so was useless on any non-Apple computer.
I had been a huge Apple fan before this happened, but that was the last time I bought anything Apple.
The system is basically automated WPA2 Enterprise. I read that a few airports in the US (Chicago) are starting to have this through Boingo. Normally Boingo is pay, but it's free for use through this service, so I'm guessing the carriers are paying a fee to them. It makes sense to authenticate the devices to make sure it's "allowed" to be on it.
Agreed. I had a Thinkpad T400 and now a T430. I love them. Everything is user replaceable, and they don't look out of style after you've had it for 2 years since the design barely changes.
That said, the speakers are lacking. On Linux I have to crank the volume up to 200% often. I don't know of a way to do this in WIndows (partner has a T410 with WIndows).
You can use Whonix in virtualbox. It basically replicates this setup, where you have a gateway VM and a workstation VM. The workstation can only access the Internet through the gateway. So if the workstation is compromised it still can't leak your IP.
Ohio doesn't have any type of annual inspection either.
Why can't you install Google Apps on AOSP? Can't you just flash the gapps zip?
Just add your self-signed root CA to the browser. I have a root CA I use to sign all my certs, and I add the root to my laptop, servers, and mobile devices. That way they validate.
No, the browser in the Tor Bundle used to have NoScript enabled by default. They sometime since then changed it to be disabled by default. Last I checked it's still disabled by default.
The solution to this is to run Tor (specifically the Tor bundle) in a combination VM (or container, such as Docker) and AppArmor/SELinux profile. So no changes are stored; it reverts to the original image each time it's run. Furthermore, you can the restrict access of everything other than the tor daemon to only be able to access the tor SOCKS port on localhost, and block all UDP (no DNS).
That way even if rooted with a 0-day, it can't really give up your identity and it won't persist. Sure, they could probably chain 0-days together to try to escape the VM/container and sandbox, but it would certainly make it quite a bit more difficult for them.
There are pre-made Docker containers and AppArmor profiles for the Tor bundle already. They just need modified/combined to let you use both at once.
I don't think Chrome uses my Ubuntu keystore. It never asks for a password when opening Chrome, and it never requested access to the keystore. I'm using 12.04.
I had a 32GB card on my SGS4, but I quickly started running out of space from nandroid backups (the huge system image for the S4 doesn't help...I was running low on space with only 2-3 backups). Combined with TitaniumBackup backups and other data, and it just wasn't enough. Ended up having to upgrade to a 64GB card.