abelits

abelits

Lives in United States San Jose, CA, United States
Works as a Engineer
Has a website at http://abelits.smugmug.com
Joined on Oct 13, 2012

abelits' recent activity

  • Ransomware very, very rarely comes packaged under the guise of legitimate software, leave alone identifiable one. While it did happen recently, it may be years or decades before it will happen ...
  • That would require a very large number of people with and also very large number of people without a given program reliably determining success of a particular exploit. It does not work. At best, ...
  • Once "full restore of all managed computers from backups" procedure is implemented, and all resources are in place, it is trivial to perform it. How it will affect ongoing operations of the ...
  • Once the data is written, you have no idea how exactly it happened. Some systems keep audit log of all accesses, however that requires enormous amount of space, and those records, too may not be ...
  • Restoring everything on a large network is easy -- just use images stored offline and update them from the last known good backup. Because when someone operates a large network, it's not a big ...
  • It won't work. If all executables (really executables and libraries) are signed, then vulnerable executables that are present on the system must be signed, too. So whenever any vulnerability is ...
  • The name or the message will look absolutely identical. To see the difference you would have to bring up a debugger.
  • You don't need any special "way" to do that. The reason there is malware running on a system in the first place is usually (that is, if it's not the user manually starting it) an exploited ...
  • That's not the point. The problem is, its protection is very, very specific, and attacks successfully avoid it. It's about as useful as a copy of antivirus from three years ago -- sure, you might ...
  • Which version do you have? (Not that I would be able to answer because I don't use it, but others will have an idea). Adobe support of Fujifilm cameras is usually somewhat inferior to software made ...
  • Computer security does not work like that. Defense is supposed to be in depth, not in breadth, with all those "bricks" laid randomly in hope that the next attack will hit them and not the widely ...
  • No one can reliably make a decision, what is and what is not a legitimate file access based only on the names of files and programs involved. It's not difficult for an attacker to give his program ...
  • So far that feature mostly succeeded in annoying and confusing users. When ransomware taken over the computer, the computer should be considered compromised, and the goal should be to recover as ...
  • And that's supposed to be a really great idea -- trusting keys to all encrypted drives to one entity, using accounts that are used for everything from Skype calls to software license keys. If it ...
  • When the computer's motherboard or CPU is broken, but hard drive survived. I think, I have said that in the most unambiguous terms already. Yes, backups can be very useful. There are, however, two ...
  • It will have everything to do with TPM if the reason why the user is moving the drive is that the original motherboard with TPM is broken, compromised, or the user is locked out of it. Then the ...
  • Moot as in, ARM-based hardware would have to have even more of this "security against the user" features, and in more restrictive configurations? If I remember correctly, Windows on ARM required ...
  • That's the normal procedure. Or the only procedure for them, to be exact. Usually this is done after work on evaluation board is done, so now the evaluation board part can be replaced by Raspberry Pi.
  • Oh, just checked. Various models of BeagleBoard, some of them nearly identical to Raspberry Pi, are now sold as "official" development / evaluation boards by TI, the company that makes SoCs in them. ...
  • "System on chip" is the kind of chip that Raspberry Pi is made to "evaluate". Just because it's called "system on chip", it does not mean that anyone can just buy and use it -- for system to work, ...
Activity older than 12 months is not displayed.
Total messages 777
Threads started 11
Last post 2 months ago
Total comments 0
Total likes 0
Total reviews 0
Entries 1
Votes cast 0
Last entry Mar 17, 2014
Photos uploaded 35
Last upload Jul 14, 2014