Search:

Type: Posts; User: tettamanti; Keyword(s):

Page 1 of 5 1 2 3 4

Search: Search took 0.15 seconds.

  1. Er, kernel-level buffer overflow attacks make the...

    Er, kernel-level buffer overflow attacks make the kernel jump to a location of memory controlled by attacker which contains the malicious code. SMAP prevents the kernel from reading user space memory...
  2. Big WTF here... The program just uses the legacy...

    Big WTF here...
    The program just uses the legacy interface for ACPI thermal zones. Newer kernels expose the TZ using the standard hwmon interface (i.e. /sys/class/hwmon) and readings are picked up...
  3. Have you actually read of the system work? I...

    Have you actually read of the system work? I seems that you didn't ;)



    On you personal VPS maybe...



    There's no encryption involved... you can think about FSS as smart signing/hashing...
  4. It's certainly possible, once the attacker is in...

    It's certainly possible, once the attacker is in all bets are off; the thread model of FSS however is different: the system tries to ensure integrity of log files up to the intrusion, after that the...
  5. The verification key ("other") is generated only...

    The verification key ("other") is generated only once at system setup and is never altered.



    The point is to ensure the integrity of the logs *up to* the intrusion, once the attacker has gained...
  6. The sealing key changes with time (15m by...

    The sealing key changes with time (15m by default) and the old key is securely erased; the algorithm is designed so that given K(t) is easy to compute K(t+1) (i.e. the new key), but it's not possible...
  7. Replies
    66
    Views
    13,426

    You can authorize a new device from an existing...

    You can authorize a new device from an existing setup without entering the encryption key (that was the old procedure, superseded 1 year ago or so):...
  8. GPL covers distribution, not usage: Netflix could...

    GPL covers distribution, not usage: Netflix could take the kernel, modify it at will and use it for its CDN without sharing a single line of code as long as they don't redistribute it. They could...
  9. Replies
    22
    Views
    6,813

    The mail archive is still available on gmane:...

    The mail archive is still available on gmane: http://news.gmane.org/gmane.comp.graphics.opengraphics
  10. Well it does work most of the time (at least the...

    Well it does work most of the time (at least the basic functionalities), but the latest release was make a year ago, and was just a minor incremental release.


    There are other alternatives, at...
  11. They discovered that the Skype binary is...

    They discovered that the Skype binary is internally separated into a "core" library (which handles the protocol) and the UI (written in Delphi); the core (what they call the "kernel") and the UI are...
  12. The idea is to use the long mode with all its...

    The idea is to use the long mode with all its benefits (native 64bit registers, more GP and SSE registers, SSE for FP, more efficient function calls, etc.) while keeping "long" (as in the data type)...
  13. The problem is that the compat code for older...

    The problem is that the compat code for older versions is unlikely to get much testing and may not be working at all. Another more subtle problem is that a newer driver may depend on a fix in the...
  14. An informative message from mjg59:...

    An informative message from mjg59:
    http://lwn.net/Articles/449648/
  15. It means that Linux is asking the BIOS to hand...

    It means that Linux is asking the BIOS to hand off the management of ASPM using _OSC (operating system capabilities) method; the BIOS returns a mask acknowledging the transition from platform to OS...
  16. :confused: It's already possible to use the...

    :confused:
    It's already possible to use the official client to send out spam...
  17. No, the driver is limited to the virtual device...

    No, the driver is limited to the virtual device emulated by QEMU.
  18. It would be great if you could get that mail;...

    It would be great if you could get that mail; I've attempted contact via Novell, without success...
    I even asked the tech support, I'm not sure they understood the question though :P

    <rant>I'm...
  19. That's not correct. There's no public...

    That's not correct. There's no public documentation for ATK0110, the monitoring part has been reversed engineered disassembling the ACPI code. Oh, and the ATK0110 interface is actually two different...
  20. Replies
    4
    Views
    2,939

    I doubt that OSS is even considered... as for...

    I doubt that OSS is even considered... as for ALSA: it's my fault ;) I have working but out of date patches on github, but I haven't been able to work on them due to lack of free time :(
Results 1 to 20 of 82
Page 1 of 5 1 2 3 4