Search for: "Root User" Results 161 - 180 of 1,779
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
9 Nov 2009, 10:22 am
A hacker who goes by the names "Ikee" and "Ikex" took credit for the attack, which affects only jailbroken iPhones whose owners have installed SSH and neglected to change the default root password, "alpine. [read post]
29 Apr 2014, 6:30 am by Rebecca Shafer, J.D.
To perform the test a small amount of hair is cut off very close to the root. [read post]
1 Sep 2022, 5:45 am by Richard Forno
A good first step the company could take is reviewing and limiting who has root access to its systems, source code and user data to the minimum number necessary. [read post]
25 Dec 2023, 9:21 am by Alexis Hancock
Police have to work harder as well to inspect user traffic. [read post]
9 Mar 2017, 8:15 am by INFORRM
So, let me offer a brief user’s guide both to what fake news is, and what it is not. [read post]
28 Jul 2015, 8:37 am
The Second District Court of Appeal took up the issue of Facebook discovery in the February 2014 case of Root v. [read post]
12 Jun 2007, 1:31 pm
Smart observers in the privacy community argued that rationale was largely a red herring, designed to provide cover for the real reason Google wants the data: engineers love data-mining the queries to target users, root out fraudsters and tweak search performance. [read post]
4 May 2013, 6:08 pm by Swaraj Paul Barooah
 The phone is a haptic user interfaced device which uses a grid of pins that are raised and lowered on the touchscreen, allowing a visually disabled user to communicate with and through the device. [read post]
15 Nov 2022, 5:00 am by sgabriele
In analyzing the roots of negative thoughts, studies have further shown that the activity of comparing ourselves is really what is detrimental to our own mental health. [read post]
22 Jan 2009, 1:58 pm
  At its root, the lawsuit is about Facebook's attempt to force third party developers to go through the channels made available by Facebook in integrating Facebook on to a third party website or application. [read post]
16 Jul 2012, 2:31 am by rgeorges
Verizon loses nothing by doing this; users who install ROMs on their phones understand the risk of playing around with them at root level. [read post]
22 Nov 2013, 4:00 pm by Marvin Ammori
Users of iCloud and Dropbox cloud storage services entrust their photos, documents and videos on Apple and Dropbox servers. [read post]
6 Mar 2024, 10:09 am by Cory Doctorow
Every time a user moves from one service to another, the resulting data-flows create risks for those users and their friends, families, customers and other social connections. [read post]
26 Nov 2017, 11:30 am by David J. Halberg, Esq.
Meanwhile, about 60 percent of those claims involved user error factors, like copying and pasting progress notes, data entry mistakes and alert fatigue. [read post]
3 Oct 2023, 5:19 am by Bob Ambrogi
From those roots was developed Clarra, a cloud-based case management platform that spun off from the firm and is formally launching today. [read post]
21 Feb 2007, 1:14 am
Is a decentralized, user-based security system capable of protecting users in a scenario of this scale? [read post]
25 Aug 2023, 4:51 am by Bob Kraft
By understanding the root causes of crashes, developers can take appropriate actions to fix the bugs or issues that lead to these crashes. [read post]
1 Jan 2020, 8:21 am by Bill Budington
In the first month of 2019, Facebook was found to have been paying people to give up their privacy by installing an application that spies on them, doing this by having them install a root security certificate on their iOS device. [read post]