Oh good lord, WHY?! Smart phones are currently just not usable for anything security critical. No updates == no security. *rants on and on about...
GrSec policy violations will appear in the kernel message logs. Look at dmesg and/or /var/log/messages.
The hack was via Wordpress... Hmm. I wonder if it was actually zero-day, or just a misconfiguration and/or WP not being up to date. It'd be...
This would have serious bandwidth impact, I'd think. Especially (but not exclusively) on asymmetric lines. I kind of doubt it's real. That said,...
@rossnixon Awesome. Thanks! :D
I don't have a Windows system handy at the moment, so I can't answer this myself right now... Say you download an archive, which contains an...
@Rasheed187 Yeah, the above is a realistic argument for whitelisting IMO, at least in office environments. You can't make it impossible to get...
Hmm. If NOD32 has its own LSM, it might provide access control too, so you wouldn't need to mess around with AppArmor. (As for the merits of...
Not necessarily that old. FYI I'm typing this on a 32-bit netbook that I bought in ~2009. It's quite usable under Linux, for most day-to-day...
Hmm. Decent quality PCs do last a while. Maybe the market is saturated.
Hi @gorhill Unfortunately it looks like the fake-uBlock stuff is back on the Google web store, and using your new logo now. Please see below....
We've been over that here on Wilders at some length. It can help, but is not anywhere near a complete solution. At some point you'll want to...
Fysbis is a backdoor (and a pretty crude one). Something else would be used to actually deliver it, probably an exploit kit; which might be...
Or, why everything in Linux-land is not quite hunky-dory: https://blogs.gnome.org/mcatanzaro/2016/02/01/on-webkit-security-updates/ This, IMO,...
@amarildojr re fonts being executable: this is because TrueType font bytecode is Turing-complete. (And the above vulnerability is an example of...
It doesn't. This is not a kernel vulnerability. It is strictly userspace, will not bypass mandatory access control, and does not provide root...
Effective permissions for that are the normal set of DAC ones. AppArmor restrictions are applied in addition to DAC; Wine won't be able to write...
Just something I figured out: as of Ubuntu 14.04.3, with kernel 3.19.x, you can use wildcards in AppArmor profiles. This way they can apply to...
Awesome. And about freaking time. Thanks for mentioning this @amarildojr
I get the feeling the NSA is a law unto itself these days... @Minimalist Feb 4, huh? They'll probably scramble to destroy the documents.
@deBoetie Thank you. (And also ewww.) The stuff on the attack can be found here:...
@deBoetie I didn't know that actually. Sigh. Nice to know I'm a target just by virtue of my career path. :( But yeah, I figured any TLA would have...
Wow. WOW. There must be a serious lack of defensive coding going on there. :eek:
@roark37 Honestly I would just shell out the money for another GB of RAM. That will make the PC much more useful, and much more pleasant to use,...
Hmm.... I'm having trouble getting the initial reverse TCP stage to run in the Comodo sandbox at all. The setup seems a bit on the fragile side;...
Separate names with a comma.