Mar. 14th, 2013

thewayne: (Cyranose)
"I don't think there is any Bush baggage at all."
—Jeb Bush, on running for president

I, for one, remember when you were Gov that you announced that you would never run for President. I expect that's easily retracted by saying 'I meant that I wouldn't run WHILE I was Governor', but I don't care. I will never vote for a Shrub, especially one who so quickly turns around long-held platforms to pander to the base.

I didn't like your father being President, I don't think anyone who has headed the CIA should be POTUS. I didn't like your brother being President because he was a monumentally unsuccessful businessman. If you want my respect, and the slim possibility of me considering you for my vote, run for Congress and show that you work in the best interests of the country.

Bill Maher had a good joke on last week's show (I don't get HBO, but I do listen to the podcast): The Bushes have to admit that they should have named Jeb George and George Jeb. Let's face it: Jeb looks like a George and George is definitely a Jeb.
thewayne: (Cyranose)
I'm going to be making a chocolate mousse one a little later. Tradition says you should eat it at 1:59, but I know my wife will still be asleep then.

Hey, if you're in Southern New Mexico, come on over and have a slice!
thewayne: (Cyranose)
There's an annual contest held as part of a Canadian computer security conference called CanSecWest. They will publish a list of browsers and operating systems, and people will try to create exploits that will let them bypass the browser's security and get malware on to the host system. The browser is the latest version and the computer operating systems are fully-patched, so they are as secure as you and I can easily make our personal systems.

Every browser failed. Internet Explorer 9 and 10 on Windows 7 and 8, Safari on OS-X, Chrome, Adobe Reader and Flash, Oracle Java, etc.

If you successfully break one, you get the computer and a cash reward. Which is a cool prize.

You also have to disclose the exact process that you used to break the browser to the software companies, you'll always see a flood of patches a couple of weeks after the conference ends.


While this does demonstrate vulnerabilities in your system, these are carefully-controlled zero-day hacks that may not be in general circulation. And they will be patched. The problem is that whenever a hole is patched, another hole will be found. Guaranteed. It's a never-ending game of whack-a-mole.


http://www.h-online.com/security/news/item/All-major-browsers-and-Java-fall-at-Pwn2Own-1818268.html

http://www.scmagazine.com.au/News/335750,chrome-firefox-ie-10-java-win-8-fall-at-pwn2own-hackfest.aspx

http://dvlabs.tippingpoint.com/blog/2013/01/17/pwn2own-2013

May 2025

S M T W T F S
    1 23
45678910
1112 131415 1617
18 19 20 212223 24
25262728 2930 31

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jun. 7th, 2025 07:50 pm
Powered by Dreamwidth Studios