Re: HTTPS and web accounts
It's confusing because... it is. If you see our earlier coverage, it's not clear exactly how encrypted HTTPS traffic can be intercepted without some major shenanigans going on.
C.
3493 publicly visible posts • joined 21 Sep 2011
We're obliged to all those readers who've offered condolences at the loss of our heroic playmonaut, who disappeared in the English Channel last week during a Low Orbit Helium Assisted Navigator (LOHAN) mission.
Feel free to share your thoughts here.
C.
Microsoft has been going on about it since 2011, but over time it's become clear the development platform is not that simple.
C.
You're both right! If you click on the link in Andrew's story, Ronnie was incorrectly credited with writing the hit for S Club 7.
C.
Help-desk hell: Can you beat this iPad-winning story of woe?
Post away with your top tales.
C.
"these should all be rack mount servers"
The Reg caters for a big range of hardware - from serious consumer to IT pro. If you want rack-mounted enterprise-grade kit, take a look in the servers and storage sections:
http://www.theregister.co.uk/data_centre/
C.
"when the NT kernel was originally written processor agnostic"
I take your point, but the kernel today is a different beast to the system put together by Cutler et al back in the 90s, right? Plus support for MIPS, Alpha, and PowerPC was dropped after NT 4.0, and the microkernel design is compromised by the placement of drivers - always has been. Prof Tanenbaum would have a fit.
The achievement is porting the core of a modern-day Windows OS to ARM. You may think that's small potatoes in the same way a brain surgeon considers the simplicity of routine operations; if so, I tip my hat to you.
C.
All very good points. However, what happens when you encounter code that is able to elevate its privileges and/or bypass the UAC? I saw some good example code within the past fortnight that demonstrates this. Once the code is running on your machine, half the battle is lost. I'll try to dig up some examples.
Also, consider your friend: the kind of person who installs everything, clicks through UAC, gets thoroughly pwned. That's the sort of user Bitdefender is attempting to simulate, not a pro user able to lock down the machine.
All IMHO.
C.