Re: We really need a reference Usain
That is quite a lot of him. Of they were all carrying a DVD it would leave gfast for dead.
2545 publicly visible posts • joined 7 May 2012
Easy, there's a USB port in the dash. Open the door, plug it in and it will start to draw power. This should provide enough charge to fire up the phone. You can then launch the app, open the door, plug it in and it will start to draw power. This should provide enough charge to fire up the phone. You can then launch the app, open the door........ Stack overflow
A good point. This sort of authentication is not designed to be a primary authentication because you really couldn't tell whether to let them use the computer until after a length of time. Generally speaking, you want someone to authenticate before they start using it, so I see this more like a mechanism to protect workstations where the user has wandered off without locking it. As a secondary measure, it would most likely be quite forgiving to minimise the false positive rates, or could work with tertiary measures like activating the webcam for facial recognition when it has a doubt.
The point about the arc refers to the fact that it is very difficult to move your mouse in an absolutely straight fashion due to how people usually hold their mouse. The size of that arc would depend on a number of factors, such as how you grip the mouse, your usual posture and what part of your wrist is still in contact with the desk, the size of your hands etc. Also, the basic direction you move would influence the extremeness of the arc (which would go back to whether you hold it square on or at an angle).
As a result, (in answer to your question) a relatively simple calculation could create a believable profile for pressing minimise or close. The end point and clicks would be chosen by the attacker, but the mouse movements would not raise any alarms because they emulate the speed and direction such a user is likely to take. The easiest attack vector I can think of is to send some exec a "free mouse" and embed the attack code within it.
Wouldn't this be fooled by recording of mouse movements. I can imagine the following data points without specialist mouse hardware.
* the rate of acceleration and deceleration as you move from the original cursor point to the target.
* the angle of the arc of movement between the two points.
* the delay between movement ceasing and clicking
* double click profile (time between each click and how still you can keep the mouse)
OK, so plug those into some algorithm and give a score as to how likely it is the same user.
Now do all that again and imagine some malware software is recording your mouse movement profile (could even be embedded in a freebee mouse). A vnc style piece of software could after not too much time now allow you to perform an action but instead emulate the recorded profile in those actions.
Not as trivial as a rainbow table, but if these techniques take off you can bet such tools will become available.
The creators of the transaction are not only the customer. Equally without the vendor, no such information would exist. The vendor will provide a receipt if you want your own record of the transaction.
More interesting, unless you opt out, Google will track your location via your android smartphone through location history. They would be in an amazing position to track the movements of customers over time through various businesses. If they play those cards right, they could well and truly beat the financial markets at their own games.
The problem isn't so much the browser (or they would just update it in Google play or advise you to use another browser). The problem is that the WebKit rendering engine is used by apps to integrate web content into a regular app. Most commonly, this is how the ad supported apps show those ads, but there are also things like phonegap which lets you wrap an html5 website and deploy it to the various app stores in what appears to the user to be a regular app on their platform.
We are in a state where a dodgy advertisement on a free game is a relatively easy attack vector but Google won't fix it.
Not good enough Google!
(Posted from my Nexus 5 running lollipop)
>That said, 8EiB is about a couple orders of magnitude or so higher than even today's high-end RAM usage.
And the fart of a flea is also a couple of orders of magnitude quieter than a jumbo jet at take off.
The 64 bit address space is really big [citation needed].
The Titan supercomputer at oak ridge is the current largest by RAM. If you decided that you needed you needed a million times more RAM to play the latest version of Crysis, you are still an order of magnitude from running out.
Shirley they could have used more understandable units of measure. I mean we all know that hair driers need a lot of energy [citation needed] so saying that could mean anything.
Why not just state the number in terms of how it compares to the power used by a London bus to drive one beard second.
Hey, I am not defending them, just pointing out the real world problem. I am sure the newer machines have some sort of counter measures (like how server class machines have alarms that record when the case is open, wouldn't be too hard to do the same when the service door was opened).
My guess is that the bean counters figured that the countermeasures would cost more to retrofit than they will lose to these sort of scams.
>Yep. I guess 'Woman Made To Prove Laptop Worked At Airport' wouldn't be as interesting a headline
Why does it matter if it works? What if it broke whist travelling? Let's say or wonderfully reliable SSD just gave up without warning and now you just see some text about missing boot devices? Are you supposed to their away your otherwise fine laptop? Are you supposed to fart around trying to sort out warranty claims whilst abroad?
Officialdom gone mad is the kindest way to put it. Time for hidden volumes when travelling to France I suppose...
It is also because in one of those cases that is over 50% of the advertised space. A reasonable consumer expects a degree of space used by OS paraphernalia but not in that magnitude. They also expect that a 32GB device from manufacturer A holds roughly the same amount of their stuff as a 32GB device from manufacturer B.
>I could quite easily imagine the two current smart phone market leaders doing a Nokia/RIM
Mind you at least one of these can always fall back to selling forklifts, washing machines, HIFIs, refrigerators, vacuum cleaners, printers, cameras, air conditioners, bulldozers, CPU fans, hard drives, SSD, SD cards and a few dozen other lines. Even if they don't sell another phone ever again, they are not going to be like Nokia or RIM.