Modérateurs : Aer, Equipe forum MATA-WEB
Snack Bar chez Léon : Venez parler sur tout et rien voir surtout de rien
Retourner vers Snack Bar chez Léon
Ileca a écrit:T'as aucun plaisir de lecture parce que tu dois garder une attention constante, que dire de si tu veux apprécier, déguster le style d'une phrase passée, te la repasser, repartir, revenir. Dès que tu loupes un bout, c'est le déraillement dans le décor.
In 1979, they took two groups of college students—one depressed, one not—and had them estimate how much control they had over a green light that would either turn on or not when they pressed a button. In reality, there was never a perfect correlation between the action and the event. The light would sometimes turn on when the student pressed the button, and sometimes when he didn’t. What varied from student to student was the frequency with which the action corresponded with a result. The researchers found that the depressed individuals were much better at identifying those instances when they had little control over the outcomes, while the non-depressed students tended to overestimate their degree of influence over the light.
Tetho a écrit:Faut en vouloir aussi pour se balader chez soit avec l'OR sur les yeux.
Caudill and Wilson reverse engineered the firmware of USB microcontrollers sold by the Taiwanese firm Phison, one of the world’s top USB makers. Then they reprogrammed that firmware to perform disturbing attacks: In one case, they showed that the infected USB can impersonate a keyboard to type any keystrokes the attacker chooses on the victim’s machine. Because it affects the firmware of the USB’s microcontroller, that attack program would be stored in the rewritable code that controls the USB’s basic functions, not in its flash memory—even deleting the entire contents of its storage wouldn’t catch the malware. Other firmware tricks demonstrated by Caudill and Wilson would hide files in that invisible portion of the code, or silently disable a USB’s security feature that password-protects a certain portion of its memory.
[...]
To prevent USB devices’ firmware from being rewritten, their security architecture would need to be fundamentally redesigned, he argued, so that no code could be changed on the device without the unforgeable signature of the manufacturer. But he warned that even if that code-signing measure were put in place today, it could take 10 years or more to iron out the USB standard’s bugs and pull existing vulnerable devices out of circulation. “It’s unfixable for the most part,” Nohl said at the time. “But before even starting this arms race, USB sticks have to attempt security.”
Retourner vers Snack Bar chez Léon
Utilisateurs parcourant ce forum: Aucun utilisateur enregistré et 0 invités