|
That's a very interesting article and makes a sound argument for the reasons for the success of the Linux kernel.
My forthcoming book, Launch Your Android App, is available for pre-sale at Amazon.com -- releases on April 1, 2016 (no joke).
|
|
|
|
|
You'll soon be able to run Ubuntu on Windows 10. Wiggly Worm edition?
Not a repeat, but a expansion of the news from yesterday
|
|
|
|
|
You can already run Ubuntu WITHOUT Windows 10. Why cripple it ("it" = Ubuntu)?
".45 ACP - because shooting twice is just silly" - JSOP, 2010
- You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010
- When you pry the gun from my cold dead hands, be careful - the barrel will be very hot. - JSOP, 2013
|
|
|
|
|
I prefer the old and good VM way...Both OSes have it problems, I see nothing good comes out of mixing them...
Skipper: We'll fix it.
Alex: Fix it? How you gonna fix this?
Skipper: Grit, spit and a whole lotta duct tape.
|
|
|
|
|
Just another way to try to assimilate Linux devs into the Microsoft sphere.
Decrease the belief in God, and you increase the numbers of those who wish to play at being God by being “society’s supervisors,” who deny the existence of divine standards, but are very serious about imposing their own standards on society.-Neal A. Maxwell
You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun
|
|
|
|
|
I followed that article to a blog post by Scott Hanselman[^] which contained this little gem:
Quote: After you're setup, run apt-get update and get a few developer packages. I wanted Redis and Emacs. I did an apt-get install emacs23 to get emacs. Note this is the actual emacs retrieved from Ubuntu's feed.
Of course, I have no idea how to CLOSE emacs, so I'll close the window.
I thought that was VI.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
He seems to have comprehension problems. The Emacs screen he is looking at includes:
"Exit Emacs C-x C-c"
"If you don't fail at least 90 percent of the time, you're not aiming high enough."
Alan Kay.
|
|
|
|
|
Apple Inc. refused to give the FBI software the agency desperately wanted. Now Apple is the one that needs the FBI's assistance.
The FBI announced Monday that it managed to unlock an iPhone 5c belonging to one of the San Bernardino shooters without the help of Apple. And the agency has shown no interest in telling Apple how it skirted the phone's security features, leaving the tech giant guessing about a vulnerability that could compromise millions of devices. We haven't heard the end of this fight just yet!
|
|
|
|
|
Spoiler: "they didn't."
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
Apple doesn't need the FBIs assistance. All they need to do is post a sizeable bounty for anyone that can crack their security. Once they find out how it's done, they can redesign it. Problem solved, and f*ck the FBI.
".45 ACP - because shooting twice is just silly" - JSOP, 2010
- You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010
- When you pry the gun from my cold dead hands, be careful - the barrel will be very hot. - JSOP, 2013
|
|
|
|
|
If the data is on a remote and protected server, there would be little use in hacking the phones' hardware. I assume it is about a backup on the Apple-network, because if the data was on the phone it could be retrieved.
I'm guessing the FBI wants to save face - we're still waiting for any explanation on "how" they cracked the phone
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
The entire "you must pwn the phone for us" cluster elephant was triggered when a retard at the FBI ordered the icloud password be changed; preventing the phone from being forced into backing itself up to the cloud where they could pillage the data.
At the same time they began to back down in court, the FBI paid an Israeli computer forensics company about $20k for unspecified services. Odds are pretty good that company has a zeroday that can execute on a locked phone over USB.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Nice thread title.
Except of course there is no report or quote that indicates Apple has even asked the FBI. Nor is there anything in the article that indicates that the FBI wouldn't provide it if asked.
0) I suspect Apple has at least a couple guesses.
1) Given the recent past I seriously doubt Apple would ask the FBI.
2) Likewise I seriously doubt the FBI would (or should) tell them.
3) I think there is a decent chance that the Feds are lying about the crack.
There are two types of people in this world: those that pronounce GIF with a soft G, and those who do not deserve to speak words, ever.
|
|
|
|
|
Mike Mullikin wrote: I think there is a decent chance that the Feds are lying about the crack.
Why would they do that? If they really haven't cracked it why drop the case?
Kevin
|
|
|
|
|
First of all, they were starting to lose in the court of public opinion. After playing the "terrorism" card and claiming this was a one time request the Feds had public support, but as reality set in and the media actually started reporting opposing opinions things shifted and they lost public support (in the US at least).
Secondly, a majority of legal and constitutional scholars predicted a win in actual court by Apple which sets the wrong precedent as far as the Feds are concerned.
Thirdly, others in the federal government pointed out that many federal employees use iPhones and by creating such a hack (that will eventually leak to other governments and hackers) the Feds were shooting themselves in the foot over the long haul.
Lastly, they might have finally realized that any 4 month old data that might exist on this phone is likely worthless.
Better to claim they hacked it and save their legal challenges for another day or another victim.
There are two types of people in this world: those that pronounce GIF with a soft G, and those who do not deserve to speak words, ever.
|
|
|
|
|
My guess is they put together clues and did a brute force on it.
For instance, if you save you passwords in your web browser on your PC, you can look at the passwords; such as Firefox. If the passwords are similar or the same, then you've got a pretty good chance out of 10 to guess the right one.
|
|
|
|
|
Badly configured software used on thousands of machines can let hackers into X-ray scanners, industrial control systems, doctors' servers storing medical records, and more. VNC: Vulnerable, Not Configured
|
|
|
|
|
After much ado, we are excited to announce official Windows Universal Platform App support in Ionic 2 beta.3, complete with a total UI look-and-feel and component set. Windows applications in JavaScript. What could go wrong?
|
|
|
|
|
So we are going to emulate a rich UI, in an insecure and limited environment that is intended to display text and images?
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
A white supremacist hacker sends racist documents to thousands of publicly-exposed connected printers. Welcome to the future
|
|
|
|
|
Quote: Auernheimer said he was trying to demonstrate to his fellow white supremacists the insecurity of Internet of Things devices
It is verging on soapbox material I suppose, but in my opinion this is like me explaining the Duckworth–Lewis method[^] to the spider that lives in my potting shed.
|
|
|
|
|
That's not IOT. That's printers at the default port 9100. Which is more like ID10T.
|
|
|
|
|
Another relevant point behind the attack is the fact that universities own many public IP addresses and set up their networks early - with almost every machine having a public IP address instead of a private IP address...
|
|
|
|
|
The astronomer who triggered Pluto's demotion from planetary status hopes to replace it with a new Planet Nine, and thinks his case is getting stronger. We still have no visual confirmation of the hypothesized planet, but evidence for its influence is growing. What, you mean Pluto?
|
|
|
|
|
Our 2016 survey of 3,300 IT workers shows that salaries are shaping up -- is yours? Get advice from tech pros who are making all the right moves. "You've got the looks, let's make lots of money"
|
|
|
|