

InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
1. |
Solve : eye Watch will drive Apple down.? |
Answer» FILL HEADLINE is: iWatch, The DISTRACTION That Will Drive APPLE's Stock Down Quote ...A year ago, who needed to buy a watch when you could pull a smartphone out of your pocket and read the time on a brightly-lit screen? Yet that sentiment may change soon enough....FULL Story on Forbers... |
|
2. |
Solve : Internet's 'bad neighbourhoods' spread scams and spam? |
Answer» About 50% of all JUNK MAIL on the net emerges from just 20 internet service providers (ISPs), a study has found. |
|
3. |
Solve : Apple iOS bug lets fake Apps run.? |
Answer» Major media is now reporting a new Apple iOS flaw. ...Here are tips from the above source: Don't install apps from third-party sources other than Apple's official App Store or the user's own organization Don't click 'Install' on a pop-up from a third-party web PAGE, no matter what the pop-up says about the app. Good advice! |
|
4. |
Solve : Apple iMessage Lawsuit Go Ahead? |
Answer» Can Apple be held countable for missing messages? Apple Inc. (NASDAQ:AAPL) has been ordered by the U.S. District COURT Judge Lucy Koh to clarify its stand over the disappearing iMessage from the iPhone, says a report from CNET. The judge said that the company should be answerable to users over the iMessage issue while switching from the iPhone to another operating system, regarding which a FEDERAL lawsuit was filed in May.Read the article. The messages were not lost. But the messages can not be forwarded to another OS. Specifically, Android or Windows. Comments anyone? |
|
5. |
Solve : Windows patch? |
Answer» Here's a significant PATCH from Windows. I wonder if XP will GET the patch? | |
6. |
Solve : New viruys hits Apple OS via USB.? |
Answer» Any IPHONE user KNOWS he can connect a iPhone to a PC using USB. Now there is a NEW threat. According to researchers at Palo Alto Networks, the so-called WireLurker virus can infect your iPhone or iPad from a simple USB CONNECTION. Hundreds of thousands of users have been INFECTED already, say researchers.Source: Computerworld Plugging in your iPhone? Don't blindly trust Macs or chargers... My charger? Quote Apple says it's already fixed the problem, but independent infosec geeks say the company still has a long way to go, and that the problem isn't limited to China. |
|
7. |
Solve : Computer hijacking arrests in UK and across Europe? |
Answer» Fifteen people have been arrested, including four in the UK, in connection with the hijacking of computers. The practice, which in some instances can grant access to a victim's webcam, is known as "Ratting".A new story has Russian hackers watching UK families who did not change the webcam password. http://www.dailymail.co.uk/news/article-2841714/Russians-spy-UK-families-webcams-Hackers-use-computer-watch-home-post-photos-online.html Never leave your webcam in the bedroom. |
|
8. |
Solve : Cdhrome Confsirms XP death with Unsupport.? |
Answer» EDIT:The announcement was made last year. But April 16, 2016 was given as the date for no more updates for Chrome on XP. Today, we’re ANNOUNCING the end of Chrome’s support for Windows XP, as well as Windows Vista, and Mac OS X 10.6, 10.7, and 10.8, since these platforms are no longer actively supported by Microsoft and Apple. Starting April 2016, Chrome will continue to function on these platforms but will no longer receive updates and security FIXES.https://chrome.googleblog.com/2015/11/updates-to-chrome-platform-support.html Now, having said that, the current version of Chrome may still be the better choice for users of Windows XP. Do you agree? (Yes, I use both Chrome and Firefox on XP. But I had to backtrack with Firefox. Firefox could not find my printers when I went to PRINT a page.) While we're on the topic of this sort of recent EVENT, The Compaq Deskpro, which is planned for release in the next year or so, combines IBM's CGA graphics with MDA graphics and a faster processor, giving the IBM PC XT a run for it's money. We can look forward to learn more about this unfolding market competition over time. Who knows what the rest of the 80's will bring. |
|
9. |
Solve : European Parliament Eyes Google Break-Up? |
Answer» About a dozen or more sources on this story. (Reuters) - The European Parliament is preparing a non-binding resolution that proposes splitting Google INC's (GOOGL.O) search engine operations in Europe from the rest of its business as one possible option to rein in the Internet company’s dominance in the search market.If they don't like it...just turn it off. You really think Google would lose in this scenario ? ? Quote from: patio on November 23, 2014, 05:18:56 PM If they don't like it...just turn it off.You want me to answer that? Really? From the articles I have looked at so far, it would seem that the EU has more to lose here. I have no ill will toward the EU, but they have taken a position that might hurt their credulity. To be technical, parliament has no authority until the commission makes a move against Google. So that is what I read. Is that right? |
|
10. |
Solve : Russia hacking? |
Answer» The Russians are now into the hacking game here.At least this exploit requires someone to OPEN and e-mail attachment to get infected with trojan to allow for the attack I SUPPOSE. It COULD have been far worse if it was a wide open ZERO day that targeted Windows Update Service to slip in a dirty non official update that opened up remote connectivity over port 80 etc. |
|
11. |
Solve : Apple bans 'bonded servitude' for factory workers? |
Answer» Apple has banned the practice of bonded labour - where new recruits are charged a fee - from its factories. |
|
12. |
Solve : Kaspersky Labs has uncovered NSA malware? |
Answer» This is filed under the "Well DUH!" news section but nonetheless an important finding. WHAT MAKES THE EQUATION GROUP UNIQUE?The NSA also has a special piece of software that can actually create clowns and they come out of the floppy drive, according to a former NSA employee.And that's why I normally wouldn't link to Reddit as a news source BC. They don't take anything seriously. Especially when there are fake KARMA points to gain. It's a race to see just how fast and how far they can take a post off topic. This Kaspersky finding isn't a joke. Law enforcement, especially federal, can bend the rules farther and faster than any criminal can. If you or I have typed a certain keyword into Google, Bing or any other search engine or visited a certain website then this malware can easily be on our computer right now. I haven't broken any federal laws and I don't deserve to be spied on. Maybe I need a Snickers. I get all Edward Snowden when I'm hungry.... Quote from: evilfantasy on February 17, 2015, 11:54:56 AM And that's why I normally wouldn't link to Reddit as a news source BC. They don't take anything seriously. Especially when there are fake karma points to gain. It's a race to see just how fast and how far they can take a post off topic. My point was this. "according to a former NSA employee." You can staple that onto anything if you want to write an article, and, automatically, what you say is gospel. Considering online journals and news sites have been found fabricating quotes completely from people who they never talked to, I wouldn't be surprised if they just invented the information that "came from a former NSA employee". It makes sense that the name would be ANONYMIZED I suppose and there would be no way to externally verify it to protect them, but with such claims they need to at least have some corroboration outside of that.So you think the Kaspersky article is, in part, fabricated? They didn't find the malware or the fake company behind it? You think the NSA isn't stepping all over the US Constitution that protects us from what they are accused of doing? Really? Quote from: evilfantasy on February 17, 2015, 01:53:34 PM So you think the Kaspersky article is, in part, fabricated? They didn't find the malware or the fake company behind it? You think the NSA isn't stepping all over the US Constitution that protects us from what they are accused of doing? Really? the Kaspersky article says nothing about the NSA. it is the other articles that link the Kaspersky article which make that claim, and they are highly speculative. What they found (Kaspersky) is malware created by a group they (or themselves?) call "The Equation Group". Within the article, Kaspersky mentions that "The Equation Group" has "solid links indicating that the Equation group has interacted with other powerful groups, such as the Stuxnet and Flame operators – generally from a position of superiority." The "logic" goes that stuxnet, based on very little, was created by the NSA, and so was Flame. (many of the articles claim "there are strong connections between worms like stuxnet and the NSA" which is pretty much a fabrication, as those "connections" don't exist. The real "connection" is: 1.Equation Group interacts with those responsible for the stuxnet and flame operators acting as an authority towards them 2.Stuxnet was created by a malware authorship sponsored by the Israeli government to try to damage or otherwise negatively impact Iranian public works. (somewhat speculative) 3.Because Israel's actions against it's neighbours are generally supported by the United States, and if there was a more powerful entity associating with the Israeli during the creation of stuxnet, than that "more powerful entity"- The Equation Group- must be the NSA. Tenous connections, finely drawn. Quote You think the NSA isn't stepping all over the US Constitution that protects us from what they are accused of doing? Really?Need a lighter for that strawman? I didn't think you were this naive BC. At least you weren't at one time.A fine argument! I'm convinced.From your replies there is no changing your mind or even meeting in the middle so I would rather avoid the circle jerk, thanks.I also have a rule of not discussing politics with family and friends. We won't see eye to eye on this so no need in hurting each others feelings.The "naive" here would be the people who were surprised to LEARN about it. It's like everybody was like "Oh, remember how your average American was often under surveillance during the McCarthy era? Good thing they never did the same thing with the internet, whew! Dodged a bullet there guys! Now let's anonymize ourselves online using this anonymizer created by the NSA." and then was flabbergasted to learn that, powerpoint skills aside, "OMGS THEY KNOW HOW TO INTERNETS". Yes, It is HUGE revelation that a similar branch of the government that was responsible for effectively suspending their country's founding documents when it was convenient to "drive out the reds" after bills dictating the cause were passed into law during the Cold War are also responsible for effectively suspending their country's founding documents when it is convenient to "find terrorists" after bills dictating the cause were passed into law. Forgive me, but my attitude has been mostly surprise that there were people so naive as to think that it wasn't going on, and then when it all came out everybody was going on like it was big news. They may as well have declared the sky was blue for all the new information it actually presented. But then following that suddenly everything conncets back to it. Like come on this isn't illuminati conspiracy, if anything it's just Hoover's FBI all over again. EDIT: For some reason I feel it important to point out that the U.S constitution doesn't apply to me anyway, since I'm not an American, but the presumption one can make (I am assuming, for the moment, that all the articles are true and every single one of them is 100% accurate in their connections) would be that Canada is no doubt a party to this in some fashion, as would be most U.S allies. The only thing truly surprising would be that they became so incompetent that people actually know any details and the person responsible (who has a true hollywood hero backstory) hasn't been "dealt with". Quote from: BC_Programmer on February 17, 2015, 02:48:26 PM The "naive" here would be the people who were surprised to learn about it. The very first comment of mine when I posted this. Quote from: evilfantasy on February 16, 2015, 07:44:59 PM This is filed under the "Well DUH!" news section but nonetheless an important finding. Quote from: BC_Programmer on February 17, 2015, 02:48:26 PM EDIT: For some reason I feel it important to point out that the U.S constitution doesn't apply to me anyway, since I'm not an American, but the presumption one can make (I am assuming, for the moment, that all the articles are true and every single one of them is 100% accurate in their connections) would be that Canada is no doubt a party to this in some fashion, as would be most U.S allies. What makes this so important is that you my friend are presumably affected by this. The NSA does not recognise or acknowledge virtual borders. The US Government's attitude towards data on the internet, including PEOPLES personal password protected and/or encrypted data, is no different than how many people feel about downloading copyright protected material. It's there so they are entitled to use it however they want to. It is state sponsored malware and you are right in suspecting that it isn't just the USA using this malware. It's not a local story. It's worldwide. Quote from: evilfantasy on February 17, 2015, 03:07:18 PM What makes this so important is that you my friend are presumably affected by this. The NSA does not recognise or acknowledge virtual borders. The US Government's attitude towards data on the internet, including peoples personal password protected and/or encrypted data, is no different than how many people feel about downloading copyright protected material. It's there so they are entitled to use it however they want to. It is state sponsored malware and you are right in suspecting that it isn't just the USA using this malware. It's not a local story. It's worldwide. But this does bring us back, I think, to my previous post- the Kaspersky article doesn't mention NSA. So I am unclear, personally, how that connection is made. Aside from the known information fitting into the narrative (via the jumps I noted previously). some other articles do quote "NSA Contacts" and "former NSA employees". That sort of nebulity is troublesome for me in terms of TRUST-factor. I suppose it comes down to a case of trust. I don't trust news sites, and I truly do not think they are above fabricating information, particularly since they have been found to do just that sometimes. I also do not think questioning news magazines/articles should be considered naivety. If we are going to be skeptical of, say, the NSA's motives (or whatever), I don't think that skepticism should stop when it comes to the source of the news on which we base that skepticism. It's particularly worth considering how many such news sites have- well, ballooned- the original claims. kaspersky's article makes it clear it was intended for specific high-profile targets, and doesn't mention the NSA... Fair enough. Reuters than has the aforementioned quotation, which (allegedly) connects the entire operation to the NSA. And then you have sites taking that and turning it into "Your hard drives were RIDDLED with NSA SPYWARE for YEARS, and attributes claims to Kaspersky "Kaspersky's analysis says the NSA...". I hope you can understand what I'm saying here, because that is just a ridiculous title given what we can see in the Kaspersky article used as the primary source, and is nothing more than scare-mongering clickbait, and this sort of thing is only made worse with the passage of time as well. Forget the unnamed sources for a minute and nevermind the fact that we all have had suspicions about the NSA creating malware. Besides those two things it's not so much that the story was published but rather it's the physical evidence that Kaspersky has found. Programs like this run by the US have a very bad record of not just over stepping the "rules" but completely ignoring the rules to begin with. (The rules being the US Constitution) I'm all for counter terrorism but judging from the past this will trickle down to the state level and be turned against everyday citizens, if it already hasn't. If this malware is embedded as deeply into the hardware as Kaspersky claims you have to ask yourself just how it got there to begin with? AMD? Cisco? Intel? Do you see where I'm going here? Who else is in on this because it sounds like it is being built into the hardware at the manufacturing level and THAT is what concerns me the most. The NSA freaked out on Google, Apple and other companies when they said they will no longer make it possible for the NSA to snoop on their users. Is this how the NSA will get around the new security? Building the malware into the hardware seems like a pretty effective way to do it and that means they are spying on everyone. Not just US citizens or suspected terrorists but the entire world population.If the story is fake, in time it will be exposed. Stories like that one are coming in every day. Are all such bogus because the lack of some detail? Here is another: NSA planted surveillance software on hard drives, report says The link is to CNET. So must we dismiss it? OR: Find out if the UK used NSA data to spy on you The link below was published some time ago. Nothing new. http://en.wikipedia.org/wiki/Terrorist_Surveillance_Program Quote During the Obama Administration, the NSA has allegedly continued operating under the new FISA guidelines despite campaign promises to end warrantless wiretapping.[3] However, in April 2009 officials at the United States Department of Justice acknowledged that the NSA had engaged in "overcollection" of domestic communications in excess of the FISA court's authority, but claimed that the acts were unintentional and had since been rectified.[4]Accoutring the that, it was unintentional. So it does not count. |
|
13. |
Solve : Fake luxury goods online sites closed by UK police? |
Answer» Two thousand websites selling fake luxury goods have been removed since the start of the year, UK POLICE say. |
|
14. |
Solve : MiniTool Partition Wizard Bootable? |
Answer» Maybe it is more of a PRESS Release taht real news. STILL, they claim it is more compatible now with Windows 8.1 and the preview of 10. The new wizard is designed to make it possible to migrate the OS partition to a new SSD or hard disk with a single step: once clicked, users SIMPLY select the destination drive and the wizard will wipe it and copy all required partitions to migrate the OS to the new drive.For a free product, that SOUNDS good! |
|
15. |
Solve : Mainstream Win 7 Support Ends, but still extended support til 1/14/2020? |
Answer» Windows 7 has just REACHED its Microsoft Planned MILESTONE in its life cycle TOWARDS OBSOLESCENCE. Still extended support until 2020, but here is the article. |
|
16. |
Solve : Apple Reports Record First Quarter Results? |
Answer» Goods news if you are long in Apple stock. Growth led by record revenue from iPhone, Mac & App StoreMeanwhile, Google and Microsoft are not so hot. |
|
17. |
Solve : Cyber-security experts judge '$1bn bank hack' report? |
Answer» A leading security company says it has uncovered an "unprecedented" cyber-attack on up to 100 banks, which could result in $1bn (£648m) of losses. |
|
18. |
Solve : North Korea's Internet down; cause unknown? |
Answer» Just few hours ago, media reports some IPs in North Korea are down. “They’re pretty stable networks NORMALLY,” Madory said. “In the last 24 hours or so, the networks in North Korea are under some kind of duress, but I can’t tell you exactly what’s causing it.” Possible reasons include an attack by another NATION or third-party hackers, he said, but also things like power outages and network maintenance. “Lots of activity tonight...lol Reminds me of the movie WARGAMES. Fortunately its not nukes and only represents some of the SAMPLED network traffic. http://map.ipviking.com/They were back ONLINE today but were offline again in a few hours. I saw a funny comment on Reddit yesterday. Headline: North Korea has lost Internet access Comment: South Korea must have changed their Wifi password China turned off their service. The country first needs to work on getting stable electricity before internet. It would work much better that way. I predict all in china will have a cell phone before they have electricity. Or indoor bathrooms. |
|
19. |
Solve : HP announces mini pavilion desktop - under $200.? |
Answer» Last month HP introduced a new line of mini pavilion desktop boxes ranging in price from $ 179. 99 , $ 319. 99 and $ 449. 99 with either white or BLUE. Why no red? |
|
20. |
Solve : Wave of Fake Federal and State Tax Returns Filed? |
Answer» This is not last year's news. It was just now released by the experts. The recent flood of fraudulent tax returns -- both state and federal -- is the work of "a criminal gang, possibly working outside the country," a leading cyber security expert told NBC News.http://www.nbcnews.com/business/taxes/wave-fake-federal-state-tax-returns-filed-experts-say-n302781 How could this impact your use of a PC? WELL, do you do your own tax return? Do you use an on-line service? Read over the story and find how the crooks got into accounts of individuals. It could happen to you. "Lisa Letchworth, who lives in Washington State, doesn't know how it happened, but crooks got into her TurboTax account. Last Tuesday, when she logged on to start her federal return, she got a nasty surprise. A message on the screen said her return had already been filed and the IRS was issuing a refund of $5,013 to someone else on a prepaid card." I WOULD be so pissed if that happened to me. I hope she is able to get her refund. The IRS shouldn't issue refunds without some kind of IDENTITY confirmation. I still don't see how the crooks, can get the refunds since the IRS, won't issue until you send them a w-2 and a signed and completed 1040.With electronic filling they send a refund right away. Ask a local tax CONSULTANT. The crooks make bogus copies of everything relevant. The crooks buy the passwords on the black market cheap and then go through the accounts until they find one that looks like a prospect. |
|
21. |
Solve : Android adware 'infects millions' of phones and tablets? |
Answer» Android users are being warned that several popular apps that were on the official Google Play store APPEAR to have contained hidden code that made malicious ads pop up. |
|
22. |
Solve : ARM announces 2016 SoC line-up? |
Answer» ARM is the company that helps with designs for tablets and smartphones. The UK company is in the news due to the new version of Raspberry Pi. However, the announcement just now of new SoC for 2016 goes way beyond cheap computers. ARM is also helping vendors MIGRATE from 28nm and 32nm planar nodes with POP IP for TSMC’s upcoming 16nm FinFET+ (16FF+) process.See that? A16nm design is a big step from a 28mm. That means about 3.5 times better performance with the same BATTERY power. |
|
23. |
Solve : Ross Ulbricht: Silk Road creator convicted on drugs charges? |
Answer» The man accused of operating Silk Road, a deep web marketplace where illegal drugs were sold, has been found guilty. |
|
24. |
Solve : FREE Windows for Raspberry PI? |
Answer» Interesting... Since its release in 2012, the original Raspberry Pi has been used to build everything from aerial drones to beer fermentation systems to supercomputers. Microsoft wants in on this mini-revolution. And this could lead to bigger things.DIY Beer Project? No GUI, just a kernel compiled for ARM, as far as I can make out. Command line only. Like a Windows version of embedded Linux like you find in routers, NAS drives etc. Quote from: Salmon Trout on February 03, 2015, 03:55:00 PM No GUI, just a kernel compiled for ARM, as far as I can make out. Command line only. Like a Windows version of embedded Linux like you find in routers, NAS drives etc.True. But even routers with tiny OS can show an attractive page like simple HTML in a browser. Might be a useful tablet for web browsing. Maybe some video. The story is going around. Just founds these: http://www.eurogamer.net/articles/2015-02-03-faster-windows-10-compatible-raspberry-pi-2-released http://www.geeky-gadgets.com/raspberry-pi-2-quad-core-hands-on-and-unboxing-02-02-2015/ http://www.theinquirer.net/inquirer/review/2393354/raspberry-pi-2-hands-on-review-video Very interesting. Quote from: Geek-9pm on February 03, 2015, 09:06:33 PM But even routers with tiny OS can show an attractive page like simple HTML in a browser. Might be a useful tablet for web browsing. Maybe some video. I don't know how much of that will be possible with the cut-down remnant of Windows 10 that the free version will be. It's a shame nobody developed any Linux distros that provided Pi users with web browsing, video playing at 1080p, video streaming, NAS and server functions, etc. Even maybe high altitude robot camera balloons? Oh. Er, wait.... Yeah, I was wondering about that. But apparently it can. Look at this: Quote The Raspberry Pi is a credit-card sized computer that plugs into your TV and a keyboard. It’s a capable little PC which can be used for many of the things that your desktop PC does, like spreadsheets, word-processing and games. It also plays high-definition video.http://archlinuxarm.org/platforms/armv6/raspberry-pi That article is about the prior release! The new one is a four-core ARM chip. So, this has the potential of being sold for about the price of a Chrome cast or Roku device and functioning as a mini desktop PC. Plug it in the HDMI and add keyboard and mouse. Maybe a external HDD and printer. Quote from: Geek-9pm on February 04, 2015, 12:27:41 PM That article is about the prior release!Yes, the new chip is a quad ARM 7 while the old is a single core ARM 11, also at 1 GB of RAM it has twice the memory of the previous Raspberry Pi models and 4 times the original Model A. The point I was making is that the new Raspberry Pi 2 is 100 percent software compatible with the earlier models, which themselves were perfectly capable of web browsing and playing HD (1080p) video. The version of Windows 10 being made free is a stripped down version targeted at Internet-of-things developers, so expect to see it running gadgets. Nobody should expect to see a full-fledged GUI operating system like the Windows you see on tablets and desktop and laptop PCs. I can't argue with your logic. But let me remind you of what you already know. The minimum requirements for Windows XP. Quote Pentium 233-megahertz (MHz) processor or faster (300 MHz is recommended)Current ATM devices outperform older Pentium CPUs. By those standards, the raspberry Pi should be able to support an install of Windows XP, it it were an Intel device and not an ARM. The needed HDD space could be on an external drive. My point is this: It is really hard to estimate how well a new design can scale up or down. Especially microprocessors. The ARM 7 family has been very well deployed in a number of devices. The iPad. Game boy. Sirius Satellite Radio receivers. Dreamcast. And lots of other stuff. Because the ARM is custom made for an application, it is hard to guess at the limitations. The new model had input from Microsoft. It just my be better than what you would guess. Here is what I think. If a Raspberry package with keyboard and power supply can sell for under $100 with Windows, it will outperform and outsell tablets selling for twice the price. Time will tell. Geek, I am not arguing with you about the power of the Arm7! I am just saying it ain't going to get a full featured Windows 10 OS that is like a PC version of Windows. Every already knows that even the older Pis can run a GUI-heavy OS like Fedora or Gentoo, or FreeBSD (true Unix some say!) so the A7 in the Pi2 is certainly a cpu comparable in capability to one that could run a 14 year old OS WHOSE development STARTED in the 1990s like Windows XP was. Right! It should run an old OS with no issue. If somebody will port the code. But why did MS endorse the new Raspberry Pi? Well, maybe they just want a presence, not really port real windows to a exterminate handheld device. Life hacker has picked up the story. http://lifehacker.com/the-operating-systems-updated-for-the-raspberry-pi-2-s-1683514788 The Operating Systems Updated for the Raspberry Pi 2 (So Far) Quote The Raspberry Pi 2 was released yesterday and it comes packed with a new SoC ** that requires a little tweaking to get operating systems to work with it. So, we decided to dig in and see what operating systems have added support already.The article says there are five OS that do run on it now. But I have never heard of any of then except Debian. **SoC A system on a chip or system on chip (SoC or SOC) is an integrated circuit (IC) that integrates all components of a computer or other ELECTRONIC system into a single chip. |
|
25. |
Solve : NETFLIX IS COMING TO LINUX? |
Answer» Quote NETFLIX IS COMING TO LINUX through HTML5 streaming in the CHROME WEB browser, and Ubuntu might soon have it available in its stable release.Source: http://www.theinquirer.net/inquirer/news/2371405/ubuntu-linux-users-might-be-able-to-stream-netflix-soonThe News Editor position is still open... With Netflix on my Android SMART i don't think I will ever be able to put it down. I did this post a few months ago. Many others are following the lead of Netflix. However, Netflix is removing some stuff. Look at this: http://www.businessinsider.com/netflix-everything-leaving-january-2014-12 "Beverly Hills Cop" "Beethoven" "Boyz n the Hood" "Braveheart" "Carrie" ... and a lot more. See link above. But they have also added a bunch of stuff. http://www.businessinsider.com/netflix-january-2015-1 "Dallas" "Friends" "White Collar" "Psych" "The Adventures of Puss in Boots" Quote The company was established in 1997 and is headquartered in Los Gatos, California. It started its subscription-based service in 1999. By 2009, Netflix was offering a COLLECTION of 100,000 titles on DVD and had surpassed 10 million subscribers. ...... Wikipedia. |
|
26. |
Solve : No More News from Spain. Why would you care?? |
Answer» This is based on a blog from Google date Dec 11 of last year. Google last year agreed to help French news organizations increase their online advertising revenue and fund digital publishing innovations to settle a dispute over whether the company should pay for news content in its search results.IMHO, this is not good news for Spain's tech sector. The CH News Editor position is still open... In case you weren't aware google is not the sole search engine in the Universe... Quote from: patio on January 11, 2015, 05:26:28 PM The CH News Editor position is still open...Google was the target of the Spanish government. In private conversation the law was called the "Google Tax". But for anybody that needs to research Spanish publications online, user this: http://www.searchenginecolossus.com/Spain.html Once again...i give up... |
|
27. |
Solve : FCC says broad band is 25 Mbps plus.? |
Answer» Today FCC says broad band is 25 Mbps plus. ... the U.S. Federal COMMUNICATIONS Commission (FCC) defined "Basic Broadband" as data transmission speeds of at least 4 Mbit/s downstream (from the Internet to the user’s computerhttp://en.wikipedia.org/wiki/Internet_access I want board band! |
|
28. |
Solve : WD Shows Off Fastest 4TB Hybrid SATAe Drive? |
Answer» Western Digital earlier this moth showed a Fast 4TB Hybrid SATAe Drive At Storage Visions 2015 A little pricyOMG!! 329.99 UK pounds (around $500)!!! For a "case"! It's not the most expensive case out there anyone remember the Thermaltake Level 10? (Not the GT version or any of the other cheaper ones). That was around £500 and sold very well indeed (horrible case to build in btw), the limited titanium edition is still available at almost £1000. I agree it is expensive for what it is but sometimes that's the price you pay for something out of the norm. Check out some of Lian Li's creations over the years if you want to see some really out of this world designs with equally crazy price tags. There are plenty of cases to suit most builds at £70-100 tops, £200 should cover the majority of special requirements, above that really it's EITHER limited edition models, "different" cases like this one or the Level 10, or specialised manufacturers like Little Devil or Mountain Mods. I don't think personally I could ever justify paying £320 for the D-Frame, but quite a few people must have done - it certainly is eye catching hence WD using it as a showcase (pun intended) for their drives. |
|
29. |
Solve : Windows 10 Will be free upgrade for 1 year after launch (Win 7 & up)? |
Answer» And, no that doesn't mean you have to pay after 1 year. We announced that a free UPGRADE for Windows 10 will be made available to customers running Windows 7, Windows 8.1, and Windows Phone 8.1 who upgrade in the first year after launch. http://blogs.windows.com/bloggingwindows/2015/01/21/the-next-generation-of-windows-windows-10/ Quote from: Salmon Trout on January 21, 2015, 01:40:10 PM And, no that doesn't mean you have to pay after 1 year. I mean, they won't make the recipients of the free upgrade pay after they have used it for 1 year. As some have suggested. Just read this and was going to share this and you beat me to it.. Curious as to what the costs will be that havent been announced. OS's have generally been $89 to $139 for Home and Pro versions, and if a monthly fee, would it be like $2 a month = $48 a year or more. I personally PREFER a 1 time fee per license and not having to worry about additional costs. Article I read was similar here: http://www.digitaltrends.com/computing/windows-10-now-a-free-service-news/My understanding is there isn't going to be a subscription model, (I sure hope not), that for 1 year people running a qualifying OS will be able to upgrade to Windows 10 free of charge, thereafter they (and everyone else) will have to pay whatever one-time price Microsoft decide to charge, and also that people BUYING a "full retail" Windows 10 product will pay one time like they do now for Windows 8 products and did in the past for 7, Vista, XP, etc. That Digitaltrends article says it's "unclear" what will happen after the 1 year period, but the Microsoft blog by Terry Myerson I quoted above seems clear enough. Very happy to see this, through uni I have 3 copies of Windows 8 and 2 copies of Windows 7 then an additional copy of 7 that I bought when it came out, that means I have 6 copies of Windows 10 for free (excluding the ones that I'll probably GET through uni again) .Hopefully Microsoft will keep track of what Windows 7, 8, 8.1 keys have been used during the free upgrade period so that say 2 years later when you need to rebuild the system clean you can install 7 and then perform the same upgrade to 10 without having to buy it at that point because it was after the 1 year free upgrade period. It may be worth while to create an image after you get your free upgrade just in case it will cost you on a reinstall say 2 years later. Only MS has figured out how to make MONEY giving things away...i say it's brilliant. |
|
30. |
Solve : Making CS a core colledge course.? |
Answer» The full HEADLINE is: Typically, students can take computer science courses as electives, but they don't count as a core course requirement for graduation, said Cameron Wilson, chief operating officer and vice president of governmental affairs for Code.org. In June 2013, the organization partnered initially with Microsoft to advocate for state-level policy changes to make sure computer science can SATISFY a graduation requirement.The article is about higher education in the USA. Other countries differ. |
|
31. |
Solve : Smuggler Busted For Wearing Suit of 94 iPhones? |
Answer» Smuggler Busted For Wearing an Armor-like Suit of 94 iPhones into China He'd MAKE more with Heroin...At least he smuggled it on the OUTSIDE and not the other mule methods. Why does this phone smell WEIRD. Quote from: patio on January 13, 2015, 09:07:17 AM He'd make more with Heroin... PRC executes drug traffickers. |
|
32. |
Solve : W i n d o w s 1 0? |
Answer» We all know it had to happen. Microsoft is finally fixing up WINDOWS 8 with a new gui and no more full screen metro start menu. Sorry inventors of classic shell but you are becoming useless soon. On Tuesday, Microsoft made available a few FIXES and updates to the November Windows 10 Technical Preview BUILD (9879), including one meant to fix Explorer-specific crashes. And it sounds like more fixes will be coming for Build 9879 before this year is out. Elsewhere is was said that Windows 10 will come in mid-2015. This item from ZNET may have some details of interest. http://www.zdnet.com/whats-next-for-windows-10-7000036358/ |
|
33. |
Solve : Earth's ocean abyss has not warmed, NASA study finds? |
Answer» This was published by NASA in October. Of special interest is how this study was done with the aid of computers and very advanced image processing technology. While the upper part of the world’s oceans continue to absorb heat from global warming, ocean depths have not warmed measurably in the last decade. This image shows heat radiating from the Pacific Ocean as imaged by the NASA’s Clouds and the Earth's Radiant Energy System instrument on the Terra satellite. (Blue regions indicate thick cloud cover.)Visit link for full details. http://www.sciencedaily.com/releases/2014/10/141006101043.htm Very impressive! Are you a GW denier, Geek? Climate change denial - Wikipedia, the free encyclopedia No, I can't afford it. Quote Between 2002 and 2010, conservative billionaires secretly donated nearly $120 million (£77 million) via two trusts (Donors Trust and Donors Capital Fund) to more than 100 organizations seeking to cast doubt on the science behind climate changAnother quote: Quote As one TOBACCO company memo noted: "Doubt is our product since it is the best means of competing with the "body of fact" that exists in the mind of the general public. It is also the means of establishing a controversy."[35] As the 1990s progressed ...It is the technology used that impressed me. One can make assumptions about what the date prove. And be very wrong! |
|
34. |
Solve : Digital River is almost Dead.? |
Answer» This story was published earlier this month. The stock of Minnetonka-based Digital River PLUNGED 23 percent Monday after the company extended Microsoft’s deadline for deciding whether it would renew a key distribution agreement that expires in March.And today is December 19. This was found several hours later... Digital River and Microsoft's Bumpy E-Commerce Road. Full Story So they are not dead yet. |
|
35. |
Solve : FCC rules on data roaming. Pro T-Mobile .? |
Answer» In 2011 the FCC made provision that CELL companies could use other carriers for roaming customers. At a 'reasonable' PRICE. T-Mobile complained. What's that mean for consumers? It could LEAD to lower prices and BETTER coverage for 3G and 4G service when using T-Mobile and SPRINT. ... |
|
36. |
Solve : Sony woes grow. Torrent sites upload stuff.? |
Answer» Before you say 'That is not Computer News', read then sad story. ...comes after a statement released FRIDAY by a North Korean government-controlled website THREATENED the filmmakers of Sony's upcoming comedy The Interview with "stern punishment." The plot of the film centers on two guys, played by Seth Rogen and James Franco, who are sent to North Korea to assassinate LEADER Kim Jong Un.Somebody explain this, PLEAS. |
|
37. |
Solve : DIY PC for $150. CNN Money? |
Answer» Yeah, CNN has a report that somebody is doing a Do It Yourself PC for $150. And it is targeted for children. Really! Last year, Kano raised $1.5 million on Kickstarter -- far surpassing its $100,000 campaign goal, which it hit in just 16 hours. And it attracted the attention of high-profile backers like APPLE's (AAPL, Tech30) Steve Wozniak. Now available for the general public, Kano has shipped 20,000 kits around the world.It was said that kids can learn do some graphic game coding. The CH News Editor position is still accepting applications... Quote from: patio on December 12, 2014, 07:14:36 PM The CH News Editor position is still accepting applications...I WOULD apply. But I can not work on Monday, Thursday and Saturday. EDIT: forgot to mention, by attention span is about twenty minutes. It's a nice idea but it is still just a raspberry pi which could be purchased a lot cheaper, it just doesn't come with all the other parts to make it appealing to kids. You are paying for the extras such as the accessories and documentation which would be nice for kids to have, not the computer. In the end, while it is a cool device, it's not powerful and struggles even with basic web browsing. They are a great idea in developing countries or for fun projects, but it is not fast enough to be used for any sort of programming at a comfortable speed. $150 could easily buy a much more capable machine such as a second hand desktop/laptop or a new Chromebook (Which could run Linux if required). Quote from: camerongray on December 12, 2014, 07:20:25 PM It's a nice idea but it is still just a raspberry pi ...Point well made. Still, if the documentation is good, it would be a fair investment. http://www.kano.me/kit?gclid=CJ6k0rGBwsICFU-TfgodtqEAkA The above link provides some more detail. But it seems they are not too keen on traditional book learning. Quote Manuals are boring. Kano is a story. With illustrated ideas and simple steps, build a computer, make stuff, and explore a new world. Meet cool characters and level up.Personally, I would be reluctant to give something to a child that does not load to a real book not encourage reading skills. Quote $150 could easily buy a much more capable machine such as a second hand desktop/laptop or a new Chromebook (Which could run Linux if required). This was my same exact thought when reading about this. I have seen refurb desktop systems for sale for $89.99 with Windows 7 Core 2 Duo CPU, 2GB RAM, 80GB HDD with 1 year warranties which are more powerful. * Note: Most of these refurbs assume you already have a display to use with them as for they come with everything except for the display, but a used flat screen that works such as an old 15 or 17" display could be bought for around $20. Quote from: camerongray on December 12, 2014, 07:20:25 PM It's a nice idea but it is still just a raspberry pi which could be purchased a lot cheaper, it just doesn't come with all the other parts to make it appealing to kids. You are paying for the extras such as the accessories and documentation which would be nice for kids to have, not the computer. ...You're also paying for the custom Kano OS which comes preloaded on the SD CARD. You guys can poke fun at this all you want but it really is a nice little kit and not outrageously priced at $150. Yes, you could buy a Raspberry Pi for $35 but then you still need an SD card, keyboard, power supply, speakers, case and cables. You could buy a Chromebook or 2nd hand computer for about the same PRICE but then you would just have the computer without the Kano OS and other parts that make up the whole kit. If you guys have experience with the Kano OS and can honestly say that it isn't well designed for kids to learn from then I could see your argument but since I doubt you do, I'm not sure why you're knocking it down. I have a Raspberry Pi and I am currently downloading the Kano OS from their website and plan to put it on an SD card and check it out. That's the only way I know of to truly know if this kit would be something I would recommend to parents with young children as a learning tool. A Raspberry Pi starter kit could still be put together for around $60 so you are still paying a lot for the kit, sure you don't get the custom OS out of the box or the books however as you stated, you could put it on a RPi yourself. I totally agree that it is nice to have as a complete kit for young kids (especially if they want to learn how to code but don't know any technical people who help them get it set up), but it is not the amazing bargain computer that it was originally made out to be - It has a very niche market. If kids are learning to code, they are going to be capable of working a regular OS, be it Raspbian, Ubuntu or even Windows on a refurbished PC. Kids nowadays are extremely quick at learning technology and don't really need a super easy to use operating system. A Raspberry Pi would be potentially okay for the most basic of programming but kids would very quickly outgrow it. I mentor at a group that helps kids learn to code and where they can work on their own projects, a few kids there started off using Raspberry Pis however they quite quickly outgrew them and are now using regular (albeit fairly basic) laptops. Raspberry Pis are still used, but as a platform to build projects on top of such as little robots.etc, not as their primary programming machine. The way I see it is that for the average kid who wants a computer to learn to program, for $150 you could easily find quite a nice used laptop (At least a Core 2 Duo, possibly even an older i3/i5). This could handle all their programming work (from Scratch all the way up to Java/Python.etc) as well as be able to do web browsing at a decent speed. It also has the advantage of being a single, portable unit whereas the Pi needs to be connected to a monitor, keyboard and mouse. Don't get me wrong, the Raspberry Pi is a fantastic bit of kit, but $150 seems to be a lot of money for such limited computing power. The kit has a niche market such as in schools and developing countries, but for the average computer user or kid wanting to learn programming, there are better options out there.You make some good points but I think there is still a market for this kind of thing. What age group are you working with? The Kano kit seems to be aimed at pretty young kids. The fact that they "build it" may give them an additional sense of accomplishment in addition to learning to use and code with it. I got the Kano OS downloaded and burned onto an SD card but I have to get my RPi back from my son before I can try it.We work with anyone under 19 - Most kids are in the age range of 7 - 18. You make a good point about building it, my concern really is just that it is quite expensive compared to a standard starter kit, if it were under $80 I'd consider it but $150 is pretty steep for what you get. |
|
38. |
Solve : New computer with windows eight? |
Answer» I have heard via the grapevine that a computer with windows eight can be configured to run as windows seven. Machines that come with Windows 8 Pro come with the rights to be downgraded to Windows 7 but the average PC you get will be running regular Windows 8 and therefore doesn't have these rights. I understand that... However if the User wants to do it as a Help Forum it's on us to instruct them how...not constantly try and talk them into something they don't want... Just sayin.Here's my desktop in Windows 8.1 I never go the apps desktop. I installed Classic shell and added all my icons exactly as I have it in XP. [attachment deleted by admin to conserve space] |
|
39. |
Solve : Google wants to fight Cancer? |
Answer» Why is this TECHNOLOGY news? Because GOOGLE wants to USE nanotechnology to put sensors in the blond stream to locate and even DISABLE alignment cells. |
|
40. |
Solve : Microsoft ends retail sales of Windows 7 and 8? |
Answer» Quote Microsoft has officially STOPPED selling retail copies of some versions of Windows 7 and 8. http://www.bbc.com/news/technology-29880144WOW! The article also said: Quote The current version of Windows, 8.1, will be the default version offered on PCS.What will happen now for those who uses windows 7 & 8? Is there will be automatic upgrade? Quote from: halstead on November 04, 2014, 02:43:24 AM What will happen now for those who uses windows 7 & 8? Is there will be automatic upgrade? I'm not sure what this has to do with the topic? |
|
41. |
Solve : New USB will be better, faster tahn ever.? |
Answer» Type C USB. This was published a few weeks ago. The next generation of USB cables to be easier to use and push more data. Quote In FACT, the upcoming Type-C plug just might end up being the one plug to rule them all: A single USB CONNECTOR that links everything from a PC's keyboard and mouse to external storage devices and displays.See that? USB to your display! Good-Bye DVI! Also see: Reversible USB Type-C wonder cable Quote The upcoming Type-C USB cable just keeps looking more and more like the HOLY Grail of cords. The fact that it works no matter which way it's plugged into a port is a game-changer all by itself, but the improvements don't end there: Type-C USB will deliver USB 3.1's blazing 10Gbps speedsMy question is: Why didn't they do it that way in the first place? Quote In fact, the upcoming Type-C plug just might end up being the one plug to rule them all: A single USB connector that links everything from a PC's keyboard and mouse to external storage devices and displays.Ahh right. Never heard that one before. The only thing CONSTANT about electronics and technology is that it is always changing and PEOPLE will always be grumbling essentially about how their MDA display won't plug into their new EGA display card. |
|
42. |
Solve : USB Malware Code Unleashed? |
Answer» The quotes below are from copyright material. Go to the link for full inkformation. Gear and Gadgetshttp://news.discovery.com/tech/gear-and-gadgets/warning-usb-malware-code-unleashed-141006.htm So is this news? Because to date there is NOT an defective way to eliminate this threat. Contrary to what you may think, thee is no simple tool to remove the threat. It is a design flaw, not a specific virus. Another reference: http://www.pcmag.com/article2/0,2817,2469800,00.asp We already covered this. Quote from: BC_Programmer on October 25, 2014, 09:02:37 PM We already covered this.No we did not. Do some research. It is not about as virus per se. It is a design defeat. Unfortunately most discussions treat this as just anther virus threat. It is not just another hacker trick. The USB standard has a fundamental flew that is an open door to whoever wants in. Earlier this was explained in wired. http://www.wired.com/2014/07/usb-security/ Since then, few so-called 'expert's, including yourself , failed to get the point. USB is broken. If you know part of it, learn all of it. Google it. USB is broken http://www.computerworld.com/article/2476621/malware-vulnerabilities/panic--stop-using-usb--it-s---fundamentally-broken-----badusb.html Quote from: Geek-9pm on October 25, 2014, 09:09:14 PM No we did not. Do some research.The topic I linked is about this exact thing. It's based on the EXACT same source articles, the only difference is the one you linked has decided to be three months behind. Quote It is not about as virus per se. It is a design defeat.The fact is that USB drives and devices do not recognize or use some sort of standard in terms of flashing their firmware or controller EEPROMs. most devices don't use EEPROMS at all, and instead use EPROMS; quite a different technology in terms of "badUSB". I wasn't able to find much beyond laymans crap detailing exactly what it exploits, written by PEOPLE who probably have no more of a clue about it. The actual information I was able to find presents details that call many of the original claims of how dangerous it is as unsubstantiated FUD. Most of them assert- as I believe you have done, that USB firmware is "vulnerable". This raises several questions. Namely- What, Why, How, and Who. As in, What is it vulnerable to, Why is it vulnerable to it, How would it be used and who would benefit from making use of the vulnerability. Answers to these questions are not forthcoming, even though the badUSB source has been released. I was able to find a sourcecode repository which paints some realistic light over the actual thing, rather than the absolute garbage FUD that you get from a google search that pretty much just gives you clickbait articles: https://github.com/adamcaudill/Psychson As we see here the issue is allegedly with the 8051 microcontroller used on a subset of USB devices. It is far from as ubiquitous as the clickbait articles would seem to suggest. In this particular case, it will only apply to Flash Drives, as well- so there goes all the claims in FUD articles about keyboards and mice and such. Of particular note would be to read through the instructions. There are a large number of pitfalls. for example, some scripts will need adjustments based on the drive. This is done from a perspective of having the drive. The use in malware, however, would require that these payloads be delivered and installed to drives that aren't known. Also, we can easily note some particular issues in terms of it's application to malware. I would first note the issues page, which currently has around 20 issues where people are having trouble using it on a drive for which they know the parameters. Browsing the source code, the programs core operation- and the mechanic which allows it to trick various drives- is particularly limited. DeviceIoControl. it uses this function a lot. This has an issue though- it won't work unless the program is running as administrator. Also, it only works for very specific drive parameters. The entire concept code only works with a very specific patriot drive and a few compatible drives. Assuming a device can even be "infected"(flashed) at all, the second issue is that the "malicious" actions of the drive are limited to pretending to be other USB devices. That is of rather limited utility- generally the best option is to pretend to be a keyboard, which is pretty limited in terms of it's ability to infect an arbitrary machine. Thus my reasoning in my post in the other thread which I linked, which was that this would only be particularly useful for malicious uses when you knew exactly what hardware was being used- what flash drives, what OS on the system, etc- thus penetration testing or for trying to get into specific computer systems. I'd just like th repeat the tidbit that this actually only works for mass storage devices and only very specific ones; many articles are positing that this can be used to basically "infect" keyboards; the publications hosting those articles should probably be kept at arms length, given that the actual source code of the exploit and the information on it explicitly requires a mass storage device and doesn't work with other devices by virtue of the 8052 being a memory controller and not being used in keyboards/mice etc. Quote Unfortunately most discussions treat this as just anther virus threat. It is not just another hacker trick. The USB standard has a fundamental flew that is an open door to whoever wants in. Those researchers failed to meet their burden of proof, refused to release any source code that would demonstrate the tenacity that they were claiming, and then another security researcher released it anyway (the repository I linked). It's notable that the source code and what it is capable of does not line up in any way with many of the claims they made about what it does. Curious.Thanks for coming back BC. This is an important issue and needs to understood. One research person claims is is not a 'design flaw' as much as a wrong conception. He asserts that layman think the USB device is only a memory device. But it is not. It is a microchip to manage a memory array. The USB standard does not specify what, if any. security measures any USB device must have. So in one sense, it is not a 'design flaw' but instead a design decision. Quote As we see here the issue is allegedly with the 8051 micro controllerRight! What other companies use it is uncertain. Quote ... most devices don't use EEPROMS at all, and instead use EPROMS;Please clarify that. Does it matter? Are all USB devices field programmable? The term 'field programmable' means easy to alter away from the factory with simple portable equipment. Granted, there is, to date, much speculation about would may or may not happen. But just imagine the following. Many devices do use the chip in question. An gang of thugs are organized to break into a IT deportment and locate the stock of USB drives that are being inspected by the staff during the day. Maybe an inside job. The thugs zap all the USB devices they find with a portable device which does the chip mentioned. Some USB devices are burnt out because they had other chip sets. Next day the IT department does not see any trace of a break in. They have no idea why some USB sticks WENT bad overnight. What happens next? Yes, pure conjecture. Now should we just wait and see if it happens? More... EDIT: Some links to sourtce code. http://blog.lumension.com/9442/unpatchable-badusb-malware-code-is-now-publicly-available/ http://www.extremetech.com/extreme/191467-badusb-returns-hackers-publish-code-that-could-infect-millions-of-usb-devices http://www.securityweek.com/badusb-code-published These are recent posts, which may suggest this is not the code mentioned artier. Otherwise, why publish three months after the demonstration? Quote from: Geek-9pm on October 26, 2014, 11:01:41 AM Please clarify that. Does it matter? Are all USB devices field programmable? The term 'field programmable' means easy to alter away from the factory with simple portable equipment.an EEPROM can be reprogrammed by altering the voltages and inputs on the chip pins. So too, in fact, can an EPROM. the Difference is that you cannot erase an EPROM electrically. You can program a blank EPROM chip as desired, however you cannot, electrically, erase them. (Typically they are erased via UV Light exposure). That seems rather critical given this exploit/vulnerability. If the chips used for the firmware on a USB Flash Drive are EPROM than they cannot be reprogrammed via the USB plug. Even an EEPROM is tenuous and as we can see in the source code, examples, and documentation, the vulnerability and particularly, taking advantage of it, is very dependent on the model, manufacturer, and even capacity of the drive. the firmware storage of the 8051 is not built into the IC, and needs to be hooked up to it by sending traces to the appropriate pins on the chip. The microcontroller then runs that code. the exploit them relies on the 8051 having direct access to the programmability of that separate chip, and that separate chip being electrically erasable. This is why the concept code can only work on a single model, manufacturer, and capacity of drive (Patriot 8GB SuperSonic). It also won't work if the drive supports USB3 (since that typically uses a different embedded microcontroller to begin with) Quote Granted, there is, to date, much speculation about would may or may not happen. But just imagine the following. Many devices do use the chip in question.None of the USB Drives I've taken apart (broken ones, of course) appear to use the controller. Since it is a Memory controller USB interface it is not going to be present except on Flash Drives and composite devices. It is not used in USB keyboards, USB Mice, USB network adapters. It's not even used on external hard drives. And even within Flash thumbdrives, only a subset of devices actually use it. This is demonstrable by simply taking apart a few such devices and identifying the chips within. Quote An gang of thugs are organized to break into a IT deportment and locate the stock of USB drives that are being inspected by the staff during the day. Maybe an inside job. The thugs zap all the USB devices they find with a portable device which does the chip mentioned. Some USB devices are burnt out because they had other chip sets. Next day the IT department does not see any trace of a break in. They have no idea why some USB sticks went bad overnight. What happens next? Quote from: BC_Programmer Thus my reasoning in my post in the other thread which I linked, which was that this would only be particularly useful for malicious uses when you knew exactly what hardware was being used- what flash drives, what OS on the system, etc- thus penetration testing or for trying to get into specific computer systems. The problem with your hypothetical is that it is dumb. The thugs already have physical access to the systems that they would be intending to infect. using a special device to basically infect USB drive firmware in order to allow those USB drives to pretend to be keyboards on host systems and do.... something?... is pretty useless considering they already have physical access to those systems they want to infect. Your entire hypothetical completely contradicts your original assertion that "It is not just another hacker trick" by providing an example in a context where it is exactly that. Quote from: Geek-9pm on October 26, 2014, 11:25:40 AM More... Those articles link to the same github repository that I already linked, Created on Sept 26th. The articles themselves- which if I may be so bold to say that you don't appear to have read since it answers your question- are clear as to why the code was released after the original Black Hat conference. Quote Previously, it was DEMONSTRATED by Karsten Nohl and Jakob Lell at the Black Hat security conference in Las Vegas, showcasing that the firmware of USB devices made by Taiwanese electronics manufacturer Phison could be injected with undetectable, unfixable malware. It's notable that even in that original conference, the "exploit" demonstrated- like the source code now made available, only works on a very specific brand of Microcontroller (Phison). and it only works in very specific circumstances- the core issue is simply that, if the chip is traced to it's firmware chip in a specific way, and that firmware chip is an EEPROM, than the microcontroller can be instructed to electrically erase that chip and reprogram it, thus revising it's own firmware. -If that chip is not an EEPROM, nothing happens, and the existing firmware would remain. -If the microcontroller is not connected to the EEPROM firmware chip in a specific way, nothing happens. -If the microcontroller is not a 8051, nothing happens. -If the EEPROM chip containing the firmware is larger than 200K, nothing happens. -If the EEPROM chip containing the firmware is smaller than 200K, nothing happens. -If the Microcontroller is not manufactured by a specific taiwanese manufacturer who accidentally left development EE traces active, nothing happens. And the end result? Even in a case where the chip can be exploited.... It can only pretend to be other USB devices. It cannot arbitrarily run code on the host system- only on the device itself. It cannot connect to the internet itself- because it has no network connectivity. In general all it can do is pretend to be a keyboard and perform a specific sequence of pre-programmed keyboard input. In the Blackhat demonstration for example the device was programmed to input a specific sequence of keystrokes which would open Internet Explorer and take it to a compromised, exploited web page. That could only work when you know the specific system. Fundamentally what it boils down to here is that despite your assertions otherwise this really is just "yet another hacker trick"; You illustrated that particularly well in your (arguably contrived) example. It is something that those looking to harden a company network and protect company data will want to explore, but only if they haven't already hot-glued all the USB ports on the company systems. eg to expound on your example somebody who wants to get into a company's database for presumably nefarious purposes might befriend an employee. After learning about the company's system and that employees particular workstation, they might engineer a specific USB flash drive- one that they know can be exploited in this manner and which they can successfully purchase, test, and verify works as they intend. They could then infect their 'friend''s PC with something that prevents all mass storage devices from working. Knowing that employee only has one flash drive, the nefarious hacker can loan them the exploited one. It connects as both a flash drive- allowing the employee to borrow the drive to copy his work files, as well as as a keyboard. When files are copied from that drive it will activate a sequence of keystrokes that would activate a hidden browser and launch it to a website that the nefarious hacker setup specifically the take advantage of perhaps unpatched exploits in the browser version used at the employee's company. It would then install a backdoor and broadcast it's address to an IRC server that the nefarious hacker setup for that purpose, and the hacker can then instruct the employees system to connect to a server IP they have listening for connections and then access the system via remote access. The fact is, however- in this example the entire operation is absolutely destroyed by any prudent security on the company's end. -Many companies disable, uninstall, or block USB devices entirely (hot glue in the USB ports of company systems, for example). -Unauthorized systems on the network are typically not leased an IP and thus are unable to access the internet (eg laptops brought from home, iPods, Wifi routers inconspiciously installed in that conference room nobody uses) -software should be kept patched and up to date, particularly web browsers. most competent IT Support is going to have an established update procedure using group policy. -normal users will not have local administrator permissions. This would eliminate the threat entirely, as that would be required for any exploit to be installed via said web browser (again, excluding possible, specific privilege escalation). Summary? Just another "hacker trick" that can be added to the pen-test book, with limited (if not entirely non-existent) applications in the wild. Your explanation about UV erasable chips is wrong, it is out of context. This is 2014, not 1998. UV erase is not used is new designs where size is important. UV-EPROMs are a technology made obsolete in an incredibly short period of time by widely available, and more FLEXIBLE, Flash and EEPROM technology. Processors evolved, DRAM and SRAM evolved, EPROMs simple ceased to exist. There were attempts to make them faster, lower-power, or in more convenient packages, but at the end of the day... that have gone away. How many USB devices have you taken apart? The all have controllers. There is no such things as memory array the connects directly to USB. Nobody has yet come forth with any proof that other designs are more resistant to the attack concept of the BadUSB d drama. So you think that we can prevent any attack on USB devices by preventing physical access? How? Do you suggest that all USB devices be glued with gorilla glue so and can not be removed ever ? The chip used in the USB flash drive the researchers chose is typical of the kind of silicon device use to made a USB thumb drive. And this kind of device are also used in the typical mouse, keyboard, camera or scanner. One point in particular I have to agree with. The people who write about this seem to have little understanding of what they are talking about. The complicity of the USB interface is unseen. Just looking at it one does not see the myriad of calculations made in a few milliseconds just to create a stack for the protocol. A micro controller has to be used for this. Ideally, it should be micro-code in ROM with hidden internal registers for calculations. I has to have a clock and timers. It has to handle different baud rates. I has to conform to the specs of the USB protocol. Here one poster at least knows something: Quote USB interface microcode may be inherently vulnerablehttp://www.pprune.org/computer-internet-issues-troubleshooting/544742-usb-interface-microcode-may-inherently-vulnerable.html He is right on! Responsible manufacture blow the inter links (fuses) to prevent any any more programming, accidental or intentional. So the question is: How many Thumb Drive makers fix the device to not be reworked at the micro-code level? One? Two? Who? BC, do you think only one company was guilty of this oversight? Reference: A number of books have been written about programmable micro-controllers These serve as a introduction of common industry practice with these powerful little gems. Here is important information. Just now found it. Phison PS2251-01 format tools download Quote today we will discuss how can repair corrupted Phison PS2251-01 chip controller and we will put all possible software for Phison PS2251-01 flash drive recovery tools .Wow |
|
43. |
Solve : CBS goes on demand. Others may follow? |
Answer» CBS, a MAJOR TV network in the USA, now offers on demand full EPISODES for about $6 a month. Compare that to Hulu Plus about $8 per month |
|
44. |
Solve : SSLv3 Poodle issue? |
Answer» While this info was new news 9 days ago, I figured I'd SHARE this here in case its new news as of the DAY you are reading this like myself. |
|
45. |
Solve : Windows with Bing boosts PC bounce-back .? |
Answer» Windows with Bing was introduced a few months back. It allows manufactures to offer cheap notebooks to competes against the Chrome book. PC shipments in Europe have bounced back thanks to BUSINESSES replacing ageing hardware, and consumers lured by cheap Windows notebooks.Read it yourself. Still taking applications for CH News Editor... |
|
46. |
Solve : Microsoft Yanks Win 7 patch and replaces with another? |
Answer» Interesting... MICROSOFT YANKS Win 7 patch and REPLACES with another |
|
47. |
Solve : News for Windows Blue.? |
Answer» From ZDNet... By HOWARD Lo for Small Talk | JUNE 7, 2013 |
|
48. |
Solve : New "ac" standard for very fast Wi-Fi? |
Answer» Quote NEW YORK (CNNMoney) |
|
49. |
Solve : Facebook adds video clips to Instagram app? |
Answer» Users of Facebook's photo-sharing app, Instagram, will now be able to take videos as well as still photographs, the social network has announced. |
|
50. |
Solve : Millions exposed by Facebook data glitch? |
Answer» Personal details of about six million PEOPLE have been inadvertently exposed by a bug in Facebook's data archive. |
|