Search for: "Root User" Results 81 - 100 of 1,886
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
20 Feb 2015, 1:20 pm by Dan Goodin
Instead, it attacks an argument that no one has made—that Superfish somehow shares personal information without users' permission. [read post]
19 Dec 2013, 6:06 pm by Parker Higgins
There ways to get the privacy control back if you have a rooted device or install Cyanogenmod. [read post]
25 Mar 2024, 12:49 pm by Steve Roosa (US) and Wenda Tang (US)
On the other hand, root detection is used to safeguard users and companies against devices that have been rooted (Android) or jailbroken (iOS) (i.e., bypasses the manufacturer’s restrictions), which can potentially compromise the security of the device and the applications running on it. [read post]
22 Jan 2011, 6:28 am by rgeorges
This is a geek's dream machine; and, with a little effort, I rooted it, and installed the TNTLite mod, which brings Froyo 2.2 goodness back to the basics of Android. [read post]
6 Dec 2011, 5:17 pm by Clif Burns
On behalf of Chrome users everywhere (and we now are 18 percent of all browser users), it would be nice if this could be fixed. [read post]
9 Jul 2014, 6:25 pm by Dan Goodin
The CCA, in turn, is trusted by the Microsoft Root Store, a library that IE and many other Windows apps rely on to process the TLS certificates that banks, e-mail providers, and other online services use to encrypt traffic and prove their authenticity. [read post]
27 Jan 2020, 5:07 pm by Bill Budington
Ring isn't just a product that allows users to surveil their neighbors. [read post]
1 Nov 2010, 5:25 am by Lawrence Solum
Yet copyright enforcement procedures are at the root of significant overreach and deserve greater attention in academic literature. [read post]
3 Jun 2010, 12:05 am
Scientists have been working with police to develop a tool that can identify a computer user’s age and gender by analysing their language. [read post]
11 Nov 2005, 10:09 pm by Harry SK Tan
Nonetheless, it is curious that has been openly admitted that their DRM does open the PCs of users to criminal hackers. [read post]
4 Oct 2021, 4:17 pm by Sabrina I. Pacifici
If you’re an avid user of Twitter, each of these apps is worth exploring. [read post]
28 May 2014, 5:01 am by James Edward Maule
I have returned to this theme repeatedly, in posts such as Liquid Fuels Tax Increases on the Table, You Get What You Vote For, Zap the Tax Zappers, Potholes: Poster Children for Why Tax Increases Save Money, When Tax and User Fee Increases are Cheaper, Yet Another Reason Taxes and User Fee Increases Are Cheaper, and When Potholes Meet Privatization. [read post]
7 Oct 2012, 1:23 pm by Ernster the Virtual Library Cat
 When the user clicks the “Need Help” link, a new window will open with information on volume or section level fields for that particular library, along with information on common search syntax for proximity, wildcard/root expanders, and boosting. [read post]
26 Jan 2009, 11:50 am
All this has nothing to do with Indiana law except that our roots go back to England. [read post]
10 Mar 2020, 9:49 am by Kate Cox
BuzzFeed found that several of these apps, sometime after installation, prompt users to install a root certificate in order to access features. [read post]
8 Nov 2005, 7:56 pm
Sony was reportedly using a a copy protection technology that installs a DRM technology onto user's PCs. [read post]
22 Feb 2015, 12:45 pm by Dan Goodin
"What all these applications have in common is that they make people less secure through their use of an easily obtained root CA [certificate authority], they provide little information about the risks of the technology, and in some cases they are difficult to remove," Matt Richard, a threats researcher on the Facebook security team, wrote in Friday's post. [read post]
14 May 2013, 10:47 am
“A higher proportion of Internet users was associated with a lower licensure rate,” he wrote in a recent study. [read post]
15 Jul 2015, 7:07 am by Docket Navigator
True, the problem of transferring user settings from one computer to another did not arise until computers were invented. [read post]