2351
Me make booboo in previous post try, forgot to read fine print about file types allowed.
So here's the link to a .pdf file of 46 pictures you've probably never seen before.-dantheman (November 19, 2014, 07:50 AM)
I'm confused -
there's no problem adding PDF files to posts - or is it too big?
Is there a link to a site with the photos?-tomos (November 19, 2014, 08:36 AM)
Negative Electrostatic Charisma?-app103 (November 15, 2014, 02:21 PM)
Played fine for me in IE 11.-Stoic Joker (November 14, 2014, 06:56 AM)
I think the source is the latest Window Update(last Wednesday). It only seems to be a small problem and only here.-Arizona Hot (November 14, 2014, 10:24 AM)
Just got the updates caught up and tried again. It still plays. Although I had to disable MS EMET to get IE to load for some (very strange) reason.-Stoic Joker (November 14, 2014, 12:25 PM)
Just got the updates caught up and tried again. It still plays. Although I had to disable MS EMET to get IE to load for some (very strange) reason.-Stoic Joker (November 14, 2014, 12:25 PM)
^ Too bad Washington DC didn't have Alaska's problem...
-Renegade (November 14, 2014, 05:37 AM)
Played fine for me in IE 11.-Stoic Joker (November 14, 2014, 06:56 AM)
Microsoft Fixes Bug in Windows - After 19 Years
Microsoft Corp issued patches on Tuesday to fix a bug in its Windows operating system that remained undiscovered for 19 years.
The bug, which is present in every version of Microsoft Windows from Windows 95 onward, allows an attacker to remotely take over and control a computer.
IBM Corp's cybersecurity research team discovered the bug in May, describing it as a "significant vulnerability" in the operating system.
"The buggy code is at least 19 years old and has been remotely exploitable for the past 18 years," IBM X-Force research team said in its blog on Tuesday.
http://www.nbcnews.c...ter-19-years-n247191
Around that same time, two researchers from Carnegie Mellon, Alexander Volynkin and Michael McCord, were preparing for a presentation at hacker conference Black Hat about work they’d done to easily “break Tor.” They were vague about the details but promised that their work wasn’t just theoretical: “Looking for an IP address for a Tor user? Not a problem. Trying to uncover the location of a Hidden Service? Done. We know because we tested it, in the wild.” In a summary of the talk on the conference website, the researchers claimed that it was possible to “de-anonymize hundreds of thousands of Tor clients and thousands of hidden services within a couple of months,” and that they would discuss examples of their own work identifying ”suspected child pornographers and drug dealers.”