Logo Allmyblog
Logo Allmyblog
Lien de l'article    

DOVENDOSI

Batteries d’ordinateur portable Asus | Replacement batterie pour Asus - batterie-portable-asus.com
Contacter l'auteur de ce blog

5 DERNIERS ARTICLES
- Battery for Lenovo IdeaPad S10-3 0647-29U
- Battery for Dell Latitude E5530
- Battery for Samsung AA-PB2NX6W
- Batterie pour ASUS A31-B43
- Akku für Dell Latitude E5420 ATG
Sommaire

CALENDRIER
LunMarMerJeuVenSamDim
010203040506
07080910111213
14151617181920
21222324252627
28293031
<< Août >>

BLOGS FAVORIS
Ajouter dovendosi à vos favoris
 Battery for HP Compaq 6515b Alerter l'administrateur Recommander à un ami Lien de l'article 

VPN technology will, however, protect a second attack demonstrated by the two Oxford boffins, where hackers deploy a fake Wi-Fi Calling server in order to extract IMSI identifiers. Not every phone supports Wi-Fi calling, an emerging technology that typically comes into play when a mobile signal is weak.A disassociation attack might be run to boot a subscriber off legitimate networks before getting them to connect to a rogue access point, potentially spilling IMSI subscriber information in the process.Subscription services offer a mechanism to find the phone number from an IMSI identifier for a price. In any case, IMSI offers a way to track devices. End users have no way to change them, short of changing SIM cards.The two Oxford boffins demonstrated a proof-of-concept system that demonstrates their IMSI catcher employing passive and active techniques during a presentation [slides PDF] at the Black Hat EU security conference in London on Thursday. Dig through the annals of Linux journalism and you'll find a surprising amount of coverage of some pretty obscure distros. Flashy new distros like Elementary OS and Solus garner attention for their slick interfaces, and anything shipping with a MATE desktop gets coverage by simple virtue of using MATE.

Thanks to television shows like Mr Robot, I fully expect coverage of even Kali Linux to be on the uptick soon.In all that coverage, though, there's one very widely used distro that's almost totally ignored: Arch Linux.Arch gets very little coverage for a several reasons, not the least of which is that it's somewhat difficult to install and requires you feel comfortable with the command line to get it working. Worse, from the point of view of anyone trying to appeal to mainstream users, that difficulty is by design - nothing keeps the noobs out like a daunting install process.It's a shame, though, because once the installation is complete, Arch is actually - in my experience - far easier to use than any other Linux distro I've tried.But yes, installation is a pain. Hand-partitioning, hand-mounting and generating your own fstab files takes more time and effort than clicking install and merrily heading off to do something else. But the process of installing Arch teaches you a lot. It pulls back the curtain so you can see what's behind it. In fact it makes the curtain disappear entirely. In Arch, you are the person behind the curtain.In addition to its reputation for being difficult to install, Arch is justly revered for its customizability, though this is somewhat misunderstood. There is no default desktop in Arch. What you want installed on top of the base set of Arch packages is entirely up to you.ARCH DESKTOP SCREENSHOT LINUX - OBVS VARIES DEPENDING ON USER While you can see this as infinite customizability, you can also see it as totally lacking in customization. For example, unlike - say - Ubuntu there is almost no patching or customization happening in Arch. Arch developers simply pass on what upstream developers have released, end of story. For some this good; you can run pure GNOME, for instance. But in other cases, some custom patching can take care of bugs that upstream devs might not prioritize.

The lack of a default set of applications and desktop system also does not make for tidy reviews - or reviews at all really, since what I install will no doubt be different to what you choose. I happened to select a very minimal setup of bare Openbox, tint2 and dmenu. You might prefer the latest release of GNOME. We'd both be running Arch, but our experiences of it would be totally different. This is of course true of any distro, but most others have a default desktop at least.Still there are common elements that together can make the basis of an Arch review. There is, for example, the primary reason I switched - Arch is a rolling release distro. This means two things. First, the latest kernels are delivered as soon as they're available and reasonably stable. This means I can test things that are difficult to test with other distros. The other big win for a rolling distro is that all updates are delivered when they're ready. Not only does this mean newer software sooner, it means there's no massive system updates that might break things.Many people feel that Arch is less stable because it's rolling, but in my experience over the last nine months I would argue the opposite.I have yet to break anything with an update. I did once have to rollback because my /boot partition wasn't mounted when I updated and changes weren't written, but that was pure user error. Bugs that do surface (like some regressions related to the trackpad on a Dell XPS laptop I was testing) are fixed and updates are available much faster than they would be with a non-rolling distro. In short, I've found Arch's rolling release updates to be far more stable than anything else I've been using along side it. The only caveat I have to add to that is read the wiki and pay close attention to what you're updating.

This brings us to the main reason I suspect that Arch's appeal is limited - you have to pay attention to what you're doing. Blindly updating Arch is risky - but it's risky with any distro; you've just been conditioned to think it's not because you have no choice.All of which leads me to the other major reason I embraced Arch - the Arch Philosophy. The part in particular that I find appealing is this bit: [Arch] is targeted at the proficient GNU/Linux user, or anyone with a do-it-yourself attitude who is willing to read the documentation, and solve their own problems.As Linux moves further into the mainstream developers seem to feel a greater need to smooth over all the rough areas - as if mirroring the opaque user experience of proprietary software were somehow the apex of functionality.Strange though it sounds in this day and age, there are many of us who actually prefer to configure things ourselves. In this sense Arch may well be the last refuge of the DIY Linux user. Is HP’s ambitious 3-in-one phablet replacement for PCs for you? Probably not for most of you, you may gather, but it does make for a fascinating proposition, and obvious sense for some workers wrestling with cumbersome old kit.HP explained to us how this week – with more details of how much all this will cost.The idea is to replace three business devices (laptop, tablet, phone) with one, a phone that does tricks. The Elite x3, a Windows 10 phone, has enough grunt to run (UWP) Windows apps reasonably well on a larger display. HP has furnished the device with two docks: a conventional desk stand, while the other is a laptop shell that takes its CPU cycles from the phone. Something like this has been tried before. In 2011, Motorola launched a model called the Atrix, which plugged into a laptop shell too – you can see pictures here. And just like Motorola, HP plugs the legacy app gap with a streaming app (VDI) service – Citrix in the predecessor, HP's own Workspace with the Elite x3.

  Aucun commentaire | Ecrire un nouveau commentaire Posté le 15-06-2017 à 07h37

 Battery for DELL Alienware M17x Alerter l'administrateur Recommander à un ami Lien de l'article 

But whereas Motorola's Atrix was a fling-it-against-the-wall-and-see caper from a company in turmoil, HP has put quite a lot of wood behind this arrow. It’s narrowcasting it at the businesses where it's appropriate, rather than splurging, though. The selling point is not cost of hardware – the full kit is a quid short of a grand. It partly comes from convenience, with less material to lug about: But mainly from back-office savings. From dispensing with the BOFHs. There's a lower TCO, HP reckons, from a phone that's a VDI hub, as it doesn't require an employer to hire so many highly trained IT staff and manage them, Daniel Barham, Mobility Business Development Manager for HP, told us. It's not going to replace every device, but within multiple verticals it's going to be a strong proposition. Such as? Healthcare, it can enable nurses and doctors to access patient records. Field services sectors, such as engineers; logistics for packing and shipping and inventory tracking. And public sector: law enforcement and blue light (first responders) staff.Not everyone will need or be sold HP Workspace, the VDI service, said Barham. HP Workspace was for SMBs and lower mid-market businesses, in practice meaning companies with 20 to 200 staff. That's because larger enterprises have generally got their own VDI setup established, such as Citrix or VMWare.

HP argues that Windows 10's desperate app gap doesn't really matter so much in the enterprise. Most important apps are covered.There's a range of subscription models, but if you require the Win32 apps and don't have your own VDI setup, the most attractive route is striking a long-term deal with HP Financial Services. If you do, then magically, the headline price plummets. The headline price tag for a HP Workspace offering getting you 40 hours of Win32 app time a month is £603 per year. But that falls to £19 per user per month for 40 hours (the 80-hour tier is £679 a year, which falls to £25 per month per user via HPFS).The x3 deal will be sold through traditional IT reseller channels primarily, although some system integrators are working with HP.A 21 year-old Dutch man has been jailed for one month with another year suspended for infecting more than 2,000 computers to spy on minors via webcams.The man known as Jair M was arrested in October 2013 after he infected the machines with remote access trojans and recorded and captured footage of minors in compromising positions.Court documents reveal he identified vulnerabilities in target computers using the infamous Black Shades remote access trojan (RAT), along with DarkEye, Dark Comet, Cammy, and Cyber ​​Gate.Prosecutors revealed M, who suffers a form of autism, had built phishing sites since the age of 11 and was expelled from high school at 15 for hacking a teacher's computer.

In 2013 the hacker published online a variant of the Dutch national secondary school exam taken by about one fifth of the student population before it was available. Worse still, he posted the exam using another student's laptop.His deception led to the student spending a night in jail and remaining a suspect for months.At the end of April my home was broken into by a professional who silently and systematically looted my residence of all my portable wealth while I slept.In the morning, as I looked around for a phone to call the cops (there wasn’t one, so I had to Skype them from a desktop machine), I saw he’d used an entrance that offered just enough space to enable someone bold and flexible to gain entry.After the police had come, dusted for fingerprints (we found his gloveprints everywhere, but no fingerprints), filled out their reports, and left me to deal with the intricate process of rebooting the credentials of my existence, I had a good think about how I’d overlooked the obvious.A few months earlier the cops had rung my bell and told me my neighbour had been robbed. If I was wise, they advised, I’d keep my place locked up tight.I took their advice, when I was away from home. That was my big mistake, because I refused to believe that I could sleep through a robbery. Until it happened.

For the first few nights after the robbery, I slept uneasily. But fairly quickly I fell into a nightly pattern of walking the perimeter of my home, checking and securing each of the windows and doors before I retired to bed. Rob me once, shame on you. Rob me twice...?Which brings me to last night when friends invited me over for dinner and to revel in their new ultra-high-speed broadband connection. By fits and starts, Australia’s National Broadband Network has finally made it to their residence, and they signed up the day it became available. A hundred megabits of downstream goodness - enough, even, for a few Netflix 4K streams.When I arrived all was in chaos, as one of my friends - who had been a sysadmin in an earlier career - worked to reconfigure the router installed by the ISP. The router had booted with default username and password settings – the same default username and password settings used for every other connection in their apartment buildings. We could see all their remarkably similar SSIDs beaming through the walls of their flat.“Wow, my friend said, “I wonder if any of those folks changed their default username and passwords. Or if they even know they need to.

It’s not hard to be a paranoid in a world that seems to be insecure by design. It isn’t terribly difficult to load up factory firmware that generates a random password, assigns it to a device, then prints a label with that information to go into the box with the gadget. It’s more work than just slapping a default username and password into the software - but not much. And the cost, amortised against tens of thousands of units, can’t be more than a penny or two.Or we can rely on users - who expect, in the era of Apple, that things will ‘just work’ with minimal intervention. Where ‘it just works’ means ‘opens your network to attack’, that’s a sure sign we’ve missed the point, that we’ve grown too lazy, that it’s been too long since the last time we woke up to find ourselves robbed by a thief in the night.Every device - every desktop and laptop and smartphone and connected widget of any sort - must be secure enough against attack that we never need worry that we’re doing enough if we do nothing at all.Is that hard? Maybe. Making devices that are secure by design requires more forethought than we currently allow in product development. That’s the first thing we need to change.

  Aucun commentaire | Ecrire un nouveau commentaire Posté le 15-06-2017 à 08h07


Historique : 15-06-2017
 

SYNDICATION
 
Fil RSS 2.0
Ajouter à NetVibes
Ajouter à Google
Ajouter à Yahoo
Ajouter à Bloglines
Ajouter à Technorati
http://www.wikio.fr
 

Allzic en direct

Liens Commerciaux
L'information à Lyon
Retrouvez toute l'actu lyonnaise 24/24h 7/7j !


L'information à Annecy
Retrouvez toute l'actu d'Annecy 24/24h 7/7j !


L'information à Grenoble
Retrouvez toute l'actu de Grenoble 24/24h 7/7j !


Application Restaurant
Restaurateurs, demandez un devis pour votre application iPhone


Fete des Lumières
Fête des lumières : vente de luminaires, lampes, ampoules, etc.

Votre publicité ici ?
  Blog créé le 11-07-2016 à 05h33 | Mis à jour le 22-08-2017 à 06h51 | Note : Pas de note