Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Registry (Score 1) 58

using a non-admin account

This UAC bypass is not supposed to work for that. It only bypasses UAC by exploiting a situation where UAC normally doesn't prompt, which, as far as I know, only happens for admin accounts.

Under an admin account that contained ownership of the key, the script still failed, but I was able to manually change the key only after bypassing the UAC warning to allow Regedit to make changes to the system.

As I posted, that is an artificial restriction on regedit.exe which does not affect other applications. I'd be interested in knowing why the script failed for you. Perhaps you have anti-malware software running which already detects this script specifically. What happens if you use reg.exe to set the key from the command-line? That one does not prompt for admin rights, no matter whether you're logged into an admin account and no matter your UAC setting.

Both of these accounts were local accounts and not Microsoft Accounts

The script works for me with a local account.

Comment Re:Registry (Score 1) 58

Admin rights are not needed to modify the registry. Registry keys have ACLs, and many of them under HKEY_LOCAL_MACHINE are set to only allow modification by Administrators, but many of them under HKEY_CURRENT_USER are set to allow modification by that user. The key that this is about can be set by the user.

regedit.exe happens to ask for admin rights when the user is in the Administrators group, but other programs can be used to modify the non-admin bits of the registry.

Comment Re:Ridiculous (Score 2) 38

I'm the only one living in my house and I have a static IP address. Both my physical address and my IP address do identify me. You cannot know just by looking at them whether they identify a person, and that by itself should already be reason enough to treat them as potential personal data. That said, you're being inconsistent. Date of birth does not identify a person. Date of birth in combination with other facts may. Party affiliation does not identify a person. Party affiliation in combination with other facts may. A physical address does not necessarily identify a person. That same address in combination with other facts may. An IP address does not necessarily identify a person. That same address in combination with other facts may.

Comment Re: Yes? (Score 1) 163

Now I have some scripts from Bob my coworker uses and some custom XML APIs for PHP to get my web app up. Will they work? Probably not.

The limitations are in unimplemented or incompletely implemented syscalls. If your interpreter runs, your custom scripts are likely to run as well.

Comment Re:Yes? (Score 1) 163

You don't have to reserve memory and disk space like you do for a VM, you don't have the boot time of a VM, you can install Ubuntu's packages and have most of them actually work, even ones that haven't been tested, even without recompilation like for Cygwin, and you can safely read and write the files on the Windows side that you have access to. It's useful.

Comment Hypocrite much? (Score 2) 657

"This backlash is nonsense," said James Green, co-founder of VR developer Carbon Games. "I absolutely support him doing whatever he wants politically if it's legal. To take any other position is against American values."

Pulling support for Oculus Rift is also political and legal. If James Green doesn't support this just as well, then by his own logic, he is taking a position against American values.

Comment Re:Goto (Score 2) 674

My personal rule is that a goto should only ever go down the code and never into new blocks.

My personal rule is simpler: if the transition would make sense in a flowchart of what the code is meant to do, then it makes sense in the code. If the only way to write that transition is through the use of a goto statement, then it makes sense to use a goto statement. This generally allows a bit more than your personal rule, but requires the person writing the code to be capable of creating intelligible flowcharts. One thing your personal rule allows that mine doesn't is using goto to break out of an outer loop from within an inner loop in languages that have a break statement that supports this directly. I hope you agree that using goto in that case would not be the best approach.

Comment Re:Stop worrying (Score 1) 245

The post you responded to was about damages. If it turns out a vulnerability is found in Intel's CPUs, and you and I are using vulnerable CPUs, will Intel reimburse your and my cost (in part or in full) of patching, upgrading and/or replacing? The point of the post you responded to was if they're so confident the CPUs are "very secure", offering shouldn't do them any harm, and an unwillingness to attach a reasonable amount to that could be an indicator that the CPUs are not as secure as Intel say they are. (Note: I'm not sure yet whether I agree or disagree with that logic.)

Comment Re:1st Amendment? (Score 1) 284

Gawker had attempted to get the whole lawsuit dismissed, claiming the First Amendment allowed the publication. It was the judge, not the jury, that said no to that. If the judge had ruled otherwise, this never would have even got to a jury. But I did misspeak. The judge hadn't declared that it was illegal, merely that the Constitution didn't make it legal.

Slashdot Top Deals

On the Internet, nobody knows you're a dog. -- Cartoon caption