I'd be a bit happier if google would at least re-enable the permissions manager since older devices like the nexus 4 won't be receiving this...
@TheWindBringeth Thanks, I've been playing around with surrogates after reading:...
http://www.forbes.com/sites/thomasbrewster/2015/10/01/stagefright-2-the-sound-of-malware/?utm_campaign=yahootix&partner=yahootix
Firefox 41 removes plugins.enumerable_names; from the about:config Anyone using the plugin to block enumeration should notice that it no longer...
Thanks itman for sharing, Certainly, I would consider restricting downloads and execution within protected user spaces as a necessary mitigation...
Check your network location types (home, work or public). I've had issues in the past with windows sharing because the home group by default is...
I must admit that I've been lurking around the grsecurity discussion now for a couple weeks, despite being a total linux newbie. My studies are in...
Well I share your trepidation about trusting Google or any third-party for that matter. I guess I sort of envisioned a torbook for the masses that...
Thanks, I'm bookmarking this since Windows will be including powershell in every new OS moving forward. Every bit helps.
What I am referencing is a black-hat lecture on powershell. In the presentation, the attacker substituted powershell.exe with their own...
It's occurred to me, but a lot of the anonymity guides recommend setting up a virtual machine, often running a full desktop operating systems...
Sorry to hear that. Windows 10 installed itself on one of my neighbors computers. They had reserved the update and when prompted to install they...
Most core technological advancements have benefited from government research and support. We now know that the government is willing to exploit...
Just started learning about powershell commands yesterday, but I thought I'd add in case anyone didn't know that powershell.exe is merely an...
I'm usually reluctant to install third-party software when built-in tools like notepad work fine. But since I've started learning to program, I've...
Thanks svenfaw, I have been unable to reproduce the problem since the restart, even after I reenabled comodo. I'm going through comodo's settings...
This is absolutely unacceptable, home wireless networks and public hotspots already have enough interference and latency problems. Not to mention...
Hey thanks, that is good to know, but now I'm more perplexed. I started testing about 6:30pm and was online pretty late until 1:30 am. I...
I use a passphrase to secure my android phone. It's a bit inconvenient, but its a requirement after enabling built-in encryption. I've input the...
Okay, so I'm test driving your application. I password protected a text file called test with the password for the d-value. After existing...
Not sure if you've done this yet, but in the about:config, search autoplay, locate: media.autoplay.enabled; set false
I think the simplest answer is that Firefox is highly customizable. Some other points: (1) familiarity: Mozilla was my escape from internet...
I'd much rather plug-in a specialized thumb drive or use a keyfile as a second layer over using my mobile device. I don't use two factor...
The obvious concern here is that a company like Google could link your online activity on a personal computer (i.e., IP address, websites visited,...
I agree with you that its better to manage and store personal or sensitive data yourself than risk exposing that data across third-party systems....
Separate names with a comma.