« on: August 12, 2015, 06:38 AM »
I updated to 40.0 via the dialog box a couple hours or so back FWIW.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
I'm still waiting on the Mint 17.2 XFCE's official release.-Deozaan (July 18, 2015, 12:27 AM)
The upgrade path from Linux Mint 17 and 17.1 to Linux Mint 17.2 is now open for all editions (Cinnamon, MATE, KDE and Xfce).
Instructions on how to perform this upgrade are available at http://blog.linuxmint.com/?p=2871
CM11 will see these updates hit as part of out of band fixes this weekend (these releases occur weekly).
Six critical vulnerabilities have left 95 per cent of Google Android phones open to an attack delivered by a simple multimedia text, a mobile security expert warned today. In some cases, where phones parse the attack code prior to the message being opened, the exploits are silent and the user would have little chance of defending their data.
My original intention was to get rid of the links under the avatar, and keep the button going to all unread-mouser (July 26, 2015, 09:47 PM)
The first time I checked Add-ons it wasn't there, so I went to YouTube.com to see what would happen...and IE froze on me (I guess the "transparent" install is a bit clumsy..). Second try the page loaded and the video played ... And the MS/Shockwave Flash Player Object now appeared in the Currently loaded add-ons list.
In retrospect...perhaps the 'Currently loaded' bit was/is key..-Stoic Joker (July 23, 2015, 07:24 AM)
If you don’t want to give up Flash-required sites on your desktop or laptop, good news: You probably can’t uninstall Flash completely anyway. Google’s Chrome and Microsoft’s Internet Explorer both include their own versions of Flash that update automatically.
In IE, you have to go deeper. Click the gear-shaped Settings icon and select “Manage add-ons,” right-click “Shockwave Flash Object” in that dialog, select “More information” and then click the “Remove all sites” button.
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded OpenType fonts.
I started to feel like traditional forums might be on their way to becoming antiquated in the way that Newsgroups are now - they still exist, people still use them, but they're relegated to a seldom-used part of the Internet where most people seldom venture.-JavaJones (July 19, 2015, 08:17 PM)
Almost a third of the world's encrypted Web connections can be cracked using an exploit that's growing increasingly practical, computer scientists warned Wednesday. They said the attack technique on a cryptographic cipher known as RC4 can also be used to break into wireless networks protected by the Wi-Fi Protected Access Temporal Key Integrity Protocol.
When you visit a website, and the browser's address bar contains a lock icon , the HTTPS protocol is used to protect your communication with this website (providing security and privacy). HTTPS supports several encryption techniques, one of them being the famous RC4 algorithm. At one point RC4 was used 50% of the time, with the latest estimate being 30%. Our RC4 NOMORE attack exposes weaknesses in this RC4 encryption algorithm. More precisely, in most situations where RC4 is used, these weaknesses can be used to reveal information which was previously thought to be safely encrypted.
Is WPA-TKIP also vulnerable?
Yes. We can break a WPA-TKIP network within an hour. More precisely, after successfully executing the attack, an attacker can decrypt and inject arbitrary packets sent towards a client. In general, any protocol using RC4 should be considered vulnerable.