posted on 03/25/2010 10:42:55 AM PDT
To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...
posted on 03/25/2010 10:43:15 AM PDT
(Linux -- The Ultimate Windows Service Pack)
In China, every day is Pwn2Own Hacker Contest Day.
Hackers should be shot. That’s a “fire wall” I’d support.
posted on 03/25/2010 10:45:47 AM PDT
(Johnny Rico picked the wrong girl!)
As market share increases for Apple, watch as more hackers exploit them.
Those issues have always been there, it's just that almost no one cared.
posted on 03/25/2010 10:48:27 AM PDT
by Dead Corpse
The web at the moment is pretty scary, actually.
If you have information of value to someone, they will probably be able to get it if they try hard enough.
posted on 03/25/2010 10:49:52 AM PDT
("Hello", the politician lied.)
"Tomorrow, I'm going to describe exactly how I found them, so hopefully that means Apple will replicate what I did and they'll find my 20 [bugs] and probably a lot more," Miller said. "Hopefully, they'll keep doing that and improve their mechanisms of finding bugs as opposed to just slapping band-aids every time I send them email about what bug I have."
You'll smoke a turd in hell for that buddy....!!!!
posted on 03/25/2010 10:50:15 AM PDT
Isn’t computer hacking a criminal activity? I don’t recall seeing the results for the latest chop shop contest; safe cracking; most efficient meth lab contest; etc. Just saying.
posted on 03/25/2010 10:58:06 AM PDT
I also use Opera. Firefox has better features, but Opera is more secure and stable.
WHY WERE THESE INDIVIDUALS NOT ALL ARRESTED? A convention of criminals, and no one paid attention? Oh, I see; it’s Canada. Thanks, Hosers!
posted on 03/25/2010 11:03:08 AM PDT
("Hey, hey, Teddy K., hot enough down there today?" TERM LIMITS, NOW AND FOREVER!)
“Safari was also part of the spoils, making this the third consecutive year contestant Charlie Miller has compromised the Apple browser. Miller, 36, who is principal security analyst at Independent Security Evaluators, said he came to this year’s contest armed with close to 20 working attacks that in virtually every case allow him to seize control of the Mac running the program.”
AH HAHAHAHAHAHA!!!!! Where are all of the devout Mac users who say that it is invulnerable????? 20 “holes”?????
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson