Comment Re:What's the goal of it? (Score 1) 688
Gadahi/Kadaffy/Qaddafi/whatever did say he declared a ceasefire. Meanwhile, Libyan tanks continued to roll into Benghazi to "disarm to protesters".
Gadahi/Kadaffy/Qaddafi/whatever did say he declared a ceasefire. Meanwhile, Libyan tanks continued to roll into Benghazi to "disarm to protesters".
If the domain changes hands, that's going to break a lot of XML files containing xsi:schemaLocation attributes and DTD references pointing to documents within http://java.sun.com/xml/ns/j2ee/ .
You should just put a big banner across the top of the screen that reads: "BIG BROTHER IS WATCHING YOU." The government in 1984 gave full disclosure as well.
That said, they are your children, and by extension it's probably your computer as well (or at the very least, your Internet connection), so you're well within your rights to monitor how it is used. It isn't really even necessary to actually do any monitoring. As long as they believe they're being monitored, the effect should be the same.
If any of you had bothered to read TFA, you'd notice that sharing your address and phone number is entirely optional for the user on a per-app basis. They just split the "Request for Permission" dialog into two options instead of one: 1. Access my basic information (the only option up until now) and 2. Access my contact information. Why anyone would actually choose the second option is beyond me (maybe they anticipate someone developing some sort of app that sends notifications via text messages), but it's not as if they're forcing you to share the information, or even making it likely that you'd accidentally share it.
Huh... are you against eating mutton?
Drive-by downloads are not typically downloaded by your browser (except in the case of exploits targeting vulnerabilities in the browser itself). They are usually downloaded by browser plugins (such as Flash, Adobe Reader, various ActiveX controls, etc.) that contain vulnerabilities that are exploited (either via JavaScript or by specially crafted media files), and the payload of the exploit (the "shellcode") downloads and executes some Trojan EXE. It has absolutely nothing to do with downloads that are initiated by your browser via Java Script (which must always be authorized by the user in all major browsers, generally via a Save/Open/Cancel dialog).
I bought a Brother printer a few months ago when my Canon printer became irreparably clogged. It has worked quite well for me so far. The ink even comes in individual per-color cartridges.
I wonder how many times this vulnerability was used to deliver malware.
If you look at the pictures in TFA, you'll note that they've moved Print Screen to share space with the Insert key. To invoke Print Screen instead of Insert, you have to hold down the Fn key.
according to TFA:
Malware description
Threatname: Backdoor.Win32.Buzus.croo
Aliases: Trojan-PWS.Win32.Lmir (Ikarus, a-squared); TR/Hijacker.Gen (AntiVir); Trojan/Win32.Buzus.gen (Antiy-AVL); W32/Agent.S.gen!Eldorado (F-Prot, Authentium); Win32:Rootkit-gen (Avast); Generic15.CBGO (AVG); Trojan.Generic.2823971 (BitDefender, GData); Trojan.Buzus.croo (Kaspersky, QuickHeal); Trojan.NtRootKit.2909 (DrWeb); Trj/Buzus.AH (Panda).
That's the trojan that's being installed by the exploits served up by the injected IFRAME. It is not the vulnerability that is allowing the IFRAME to be injected to begin with.
ISP contacts customer, says "you appear to have a virus that is doing bad things on the network. Please fix it." or pops a web page with the same message and probably a link to an antivirus solution.
Popping up a web page would be an extraordinarily bad idea, given how many popup/banner ads, malicious web pages, and adware are already out there selling fake antivirus software.
Oh noes! If only we had a way to detect and filter text that looks like spam....
I wish the Tomcat developers would read RFCs. Or perhaps they consider it a "feature" that I can undeploy my webapp by hitting my browser's Back button while logged into the Manager application....
They can define the term "bit" to mean whatever they want for that legal document. However, if they make any promises about bandwidth, the same definitions apply. So, if, for example, they are guaranteeing you 10 megabits/second bandwidth, that had better mean you can download a 100MB file in 10 seconds.
fortune: No such file or directory