Search for: "Root User" Results 381 - 400 of 1,772
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
23 Feb 2012, 11:29 am by Glenn Reynolds
But wait, there’s more: “He says on his site that he’s working on an app for rooted Android devices that will mimic the grenade’s functionality while running stealthily on the background of users’ phones.” [read post]
14 Aug 2013, 6:15 pm by Dan Goodin
This weakness in Android's Java Cryptography Architecture is the root cause of a Bitcoin transaction that reportedly was exploited to pilfer about $5,720 worth of bitcoins out of a digital wallet last week. [read post]
14 Feb 2011, 4:00 am by Janet Lindenmuth
They live in Bear, DE, with their cat Kylie, and they enjoy reading, watching movies, and rooting for local teams, especially the Phillies and the Eagles. [read post]
19 Jul 2012, 2:30 am by rgeorges
It comes with Ice Cream Sandwich; but, if you are adventurous, you can learn how to unlock, root, and load the new Jelly Bean ROM. [read post]
1 Dec 2008, 3:46 am
That's leading to more collaborative devices and applications, including mobile phones, laptops, Web 2.0 applications, video and other social media.[...]Security is ultimately rooted in users' behavior, so businesses of all sizes and employees in all professions need to understand how behavior affects the risk and reality of data loss â€â [read post]
18 Apr 2022, 12:14 pm by Bill Budington
The device will have to be rooted in order to install the software required for this setup. [read post]
4 Dec 2011, 1:30 pm by admin
This has been a question that media companies have been struggling with since the appearance of bit-torrents, user-to-user sharing sites, and even the creation of the CD burner. [read post]
14 Jul 2020, 1:45 pm by Arvind Narayanan
But in reality, a user may trust a website and the website may trust a third party, but the user may not trust the third party. [read post]
8 Apr 2014, 7:21 am by Giancarlo Frosio
Under the current arrangement, which expires in September 30, 2015, NTIA validates requests for changes in the root made by ICANN before VeriSign executes changes and updates the root zone file. [read post]
3 Jan 2013, 8:47 pm by Steve Schultze
Mozilla revoked trust in one of Turktrust’s three “root” CA certificates, as did Google–but oddly the revoked root is not the certificate that issued the subordinate certificates in question. [read post]
6 Mar 2024, 7:28 pm by Sabrina I. Pacifici
Such a law would keep competition from becoming a race to the bottom on user privacy. [read post]
1 Jan 2017, 4:51 pm by Sabrina I. Pacifici
Starting from a legislative measure (what we define as Root) given as input by the user, the application implements two visual analytics functionalities aiming to offer new insights on the legal corpus under investigation. [read post]
21 Aug 2012, 10:24 am by M. Scott Koller
Over the next few days, the sites advising or requiring their users to change passwords expanded to include Twitter, Amazon, and Yahoo. [read post]
1 Apr 2015, 8:55 pm by Dan Goodin
That could leave huge numbers of users suddenly unable to connect to banks and e-commerce sites. [read post]
21 Aug 2012, 10:24 am by Scott Koller
Over the next few days, the sites advising or requiring their users to change passwords expanded to include Twitter, Amazon, and Yahoo. [read post]
27 Jul 2016, 6:16 am by Pierre Bergeron
So: Even assuming two premises of this lawsuit are true—that there are Internet users other than Colin O’Kroley searching “Colin O’Kroley” and that they look only at the Google previews rather than clicking on and exploring the links—it’s not likely that anyone will ever see the offending listing at the root of this lawsuit. [read post]
27 Nov 2008, 12:09 pm
Since most terms of use are overly broad, and largely ignored by end users, I’ve described how this ruling could be the basis for selective prosecution of nearly any user of online services. [read post]
25 Apr 2016, 5:10 am by Dan Goodin
For years, most Android malware has spread by social engineering campaigns that trick a user into installing a malicious app posing as something useful and benign. [read post]
22 Jun 2017, 7:29 pm by Sabrina I. Pacifici
Echo chambers and filter bubbles are undoubtedly real for some, but we also find that – on average – users of social media, aggregators, and search engines experience more diversity than non-users. [read post]