ATTENTION: You are viewing a page formatted for mobile devices; to view the full web page, click HERE.

Main Area and Open Discussion > Living Room

Interesting "stuff"

<< < (17/441) > >>

Arizona Hot:
Interesting "stuff"

Always-on voice search from your desktop “Ok Google” comes to Google.com  Ars Technica

Anyone here tried this out?

sword:
@Arizona Hot ^reply #77, Nov 23:
Re: "Anyone here planning to convert an existing XP machine to Linux..."
Yes, my Toshiba Satellite laptop has been disconnected from the Internet for 22 months so I'm no longer bothered with updates. It has WordPerfect, ViaVoice_8 Preferred, backup files, printers and scanner. If the hard drive fails or XP becomes useless I will use a live Linux CD/DVD on it or try a copy of ReactOS, if they finish that ;D.

Arizona Hot:
Yesterday's update to Sandboxie 4.02 introduces a much requested feature: full 64-bit protection. Sandboxie previously offered protection on 64-bit systems through its Experimental Protection feature which used semi-official kernel interfaces for that. Since those interfaces were not fully documented the feature was tagged as experimental.

The release of Sandboxie 4.02 changes that as the program is now offered full protection for 32-bit and 64-bit versions of the Windows operating system. The developer has removed the Experimental Protection features as a consequence in the latest version of Sandboxie

--- End quote ---

Anyone here not using Sandboxie on a Win 7 machine because it wouldn't be fully protected?  The current version is 4.06.

40hz:
using Sandboxie on a Win 7 machine
-Arizona Hot (November 29, 2013, 09:39 PM)
--- End quote ---

You'd be far better off running a VM rather than a sandbox if at all possible. Especially if system security is your main concern. Just my :two:

Arizona Hot:
In other words, it's a thumb of a nose to government eavesdroppers at the National Security Agency. Twitter didn't explicitly mention that bit in its Friday blog announcement, but it did link to an article from the Electronic Frontier Foundation (EFF) that called out the NSA by name for its "upstream," long-term data storage capabilities.

"Every Web server that uses HTTPS has its own secret key that it uses to encrypt data that it sends to users," wrote EFF activist Parker Higgins. "Specifically, it uses that secret key to generate a new 'session key' that only the server and the browser know. Without that secret key, the traffic traveling back and forth between the user and the server is incomprehensible, to the NSA and to any other eavesdroppers."

"But imagine that some of that incomprehensible data is being recorded anyway—as leaked NSA documents confirm the agency is doing," he continued. "An eavesdropper who gets the secret key at any time in the future—even years later—can use it to decrypt all of the stored data! That means that the encrypted data, once stored, is only as secure as the secret key, which may be vulnerable to compromised server security or disclosure by the service provider."

The fun of perfect forward secrecy is that the aforementioned session keys are generated individually for each Web session. Were someone to acquire said key, it would only really be useful to decrypt a single session of Twitter access. One could still decrypt a ton of past communications, but it would require access to the corresponding ton of keys, not just one SSL key.

--- End quote ---

Twitter Beefs Up Encryption with 'Perfect Forward Secrecy'

Navigation

[0] Message Index

[#] Next page

[*] Previous page

Go to full version