computer   122052

« earlier    

Computer Security: Preventing attacks made possible by Meltdown/Spectre: 'DAWG' system breaks up cache memory more efficiently to defend against 'timing attacks'
In contrast, the MIT CSAIL team's approach is the equivalent of building walls to split the kitchen into separate spaces, and ensuring that everyone only knows their own ingredients and appliances. (This approach is a form of so-called "secure way partitioning"; the "chefs," in the case of cache memory, are referred to as "protection domains.")
security  computer  science  vulnerability 
23 hours ago by emkay
Researcher finds simple way of backdooring Windows PCs and nobody notices for ten months | ZDNet
A security researcher from Colombia has found a way of gaining admin rights and boot persistence on Windows PCs that's simple to execute and hard to stop --all the features that hackers and malware authors are looking for from an exploitation technique. What's more surprising, is that the technique was first detailed way back in December 2017
security  computer  windows  vulnerability 
2 days ago by emkay

« earlier    

related tags

"operating  1952  2009  2018  2masto  3d  a  access  adalovelaceday  advice  ai  algorithm  all”  android  ansi  app  apple.stackexchange  apple  applescript  architecture  art  article  articles  artificial  artist  audio:  australia  automata  automation  avx  backup  benchmark  biography  blog  board  book  boot  brixham  buffer  burke  business  callahenkel  cgi  chrismarker  cmc  collaboration  collection  collective  colors  communication  community  computation  computers  computerscience  computing  cool  coolstuff  cpu  crime-fighting  crypto  cryptography  cv  data  database  design  designer  desktop  development  devon  digital  distro  diy  documents  download  education  electronics  embedded  emu  energy  engine  engineering  ethics  example  exclusive  explores  facebook  film  forsale  future  gadget  gadgets  game  games  gaming  gcc  gets  go  golang  government  gpu  graphics  gsm  guide  hack  happens  hardware  history  hitl  hn  homebrew  homepage  hostname  howto  human  humor  hypersound  i9  ict  ifttt  illustration  in  indifference  informatique  inspiration  intel  intelligence  interaction  interesting  internet  keyboards  kids  knowledge  kurtvonnegut  label  labeling  lajetee  laptop  learning  library  linux  lodz  london  loop  mac  machine  macos  macosx  management  manchester  materials  mathematics  maxpitegoff  mechanical  memory  microsoft  milling  mips  mobile  modding  museum  music  muzeumsztuki  network  networking  non-usa  north_fair_oaks  notes  nypd  obtain  old  online  openhardware  opensource  optical  os  outils  p2p  painting  pc  people  performance  personal  phil  philippines  phones  phonon  phononic  photonic  pi  pixelart  pixels  play  playerpiano  pocket  portfolio  postwar  privacy  productivity  programming  programs  proof  protocol  psychology  pubilc  purposelessness  quantistic  quantum  raspberry-pi  raspberrypi  redaction  reference  remote  repl  research  retro  review  reviews  root  science  scifi  screen  secondlife  security  server  service  sgi  siggraph  silicongraphics  sim  simd  single  social  sociology  software  specialeffects  stackexchange  startup  statistics/probability  storage  streaming  structured  surface  surfacebook  swappa  synchronization  synthetic  sysadmin  systems"  teaching  tech  technology  the  theory  tips  tls  todo  tools  training  travel  trends  turk  ui  uk  unity  unix  verification  virtual  vision  vulnerability  want  we  web  webdev  webshop  what  when  wiki  windows  windows10  wireshark  women  work  writing  zcash  zero  “reply 

Copy this bookmark: