Jump to content

MadSprite

Member
  • Posts

    81
  • Joined

  • Last visited

Awards

This user doesn't have any awards

1 Follower

Recent Profile Visitors

1,023 profile views
  1. https://www.engadget.com/2017/12/05/amd-qualcomm-always-connected-pc-ryzen-snapdragon/ AMD and Qualcomm teaming up together. Vega Mobile chips will feature Snapdragon Modems to provide abroad data connectivity with gigbit speeds. Probably the insight to the C- for content
  2. This is more of a base keyboard construction issue. If a keyboard is built with an all metal body or frame, with little to no padding to absorb shocks, it will make pings which are just vibrations in the body from key presses.This happens more frequently if the keyboard is against a hard surface with hard rubber feet. best solution might to be getting a keyboard mat for it.
  3. Not gonna get into the whole debate about how Java is a prime example of hardware instruction emulation. The original focus of Microsoft was to be able to get business folks to be able to access their applications on their mobile devices. Remember HP with their phone laptop hybrid earlier this year. Microsoft always targets business or developer requests before features trickle into the consumer market.So a lot of this benchmarks will be confusing, then again it's just tests and not actual goals that we can only see from this. Unless Asus is willing to tell us what their goal is, we can assume its suppose to be a Android/Windows tablet, which the Atoms cpu still do a bad job at for if you are running mainly Android, even better is that you run Android with Windows apps on top.. Fine as in doesn't crash, good enough for an employee to access their business application made specifically on one platform with too many Microsoft dependencies. Also the project probably cost them $10M and they aren't going to spend more to run it on Android. Everyone has to make every hardware post like its for gamers or something, there are other markets too. And no, not the school market for this one.
  4. This is caused by Windows where some bug causes you to not be able to click between devices when unlocking from screens, rarely happens unless there are random quick disconnects.
  5. They design their own SoCs, make intel or Qualcomm manufacture the part. The architecture is based of off Qualcomm's standard and therefore Apple still requires paying a license to them.
  6. Apple had a considerably bitter legal fights with Qualcomm over royalty rights for their wireless architecture that in which caused Qualcomm to withhold software for Apple's device prototype modems. This has lead Apple to endearingly want to drop Qualcomm's wireless chip manufacturing contractor arm as a supplier. Suppliers for Apple's mobile device modem components to just either just existing supplier intel or in junction with Mediatek. Qualcomm is the biggest supplier of mobile chips, with nearly all Flagship phones in the US running Qualcomm due to its high compatibility with it's wireless standard and with the US wanting to roll out 5G. The dispute is ongoing since that Apple has stop reimbursing manufacturers for Qualcomm royalties, which then imposes that those royalties were unpaid by Apple. Qualcomm chips are also very refined in matching the standards set out by Qualcomm. With some phones reaching nearly 1 gigabit in download speed while both Intel and MediaTek has yet to prove to reach just as fast. A $5 billion market is about to change for manufacturers, MediaTek has lots to benefit as they have been in the low end mobile market, making cheaper models of Qualcomm's standard than competitors. An investment pushed by Apple, as Apple normally does with manufacturers to boost quality and quantity of manufacturing, can improve MediaTek portfolio. Edit: Correction for SoC for modem chips https://arstechnica.com/gadgets/2017/10/on-the-outs-with-qualcomm-apple-looking-at-intel-mediatek-for-modem-silicon/ Original: https://www.wsj.com/articles/apple-is-designing-iphones-ipads-that-would-drop-qualcomm-components-1509408668?mod=djemalertTECH
  7. US telecom market is pretty bad when it comes to speed, 4G in the US means 10Mb/s in the city where as Canada its 100Mb/s.
  8. To be honest, most likely they did reverse engineer the code to modify one of the binaries that allows their cheats to run because fortnite is mostly encrypted or obscured in a way to prevent memory hooking. So they did have to modify their decompiled source or something similar to recompile it with the built in hook to run with the cheat program. So for Epic Games their claim would be true regardless. Even memory hooking would legally be considered modifying source as that's not what the intended program was to run from the developer.
  9. Reverse engineering does not mean looking at source code or decompiling programs solely, it includes observing behaviours of the program while its running. Which is how most hooking cheat engines work.
  10. So to clarify: Epic Games was able to find two associates of a paid subscription service that profited off of unfair play on Fortnite. Taking civil action (guilty unless proven innocent), they will charge the associates to recoup costs and demoralize the Addicted Cheats service (which is under DMCA takedown by Epic). This is proof that they did indeed accept the Eula and are now facing legal action for breaking it, there are no other defendant charged who did not play or created the aimbot program. Since they are identifiable persons of the operating group, Addicted Cheats, responsibility would rest on them that they indeed reverse engineer Fornite unless they can prove that they did not by identifying the actual programmer, another associate (not yet identified) as part of Addicted Cheats.
  11. Anonymous Officials talked to Cyberscoop of the confrontations received from Moscow intelligence towards US intelligence companies for poking into Kaspersky capabilities as the tool itself was marketed to be capable as a spy tool to US intelligence agencies. This sales pitch caught the FBI's attention and as all things with backdoors can leave information to be open to other intelligence agencies or malicious actors. With the insisting nature of the Moscow Intelligence agency, FSB, US intelligence stance of Kaspersky is clear that the Anti-virus firm may have a one way relationship of being an intelligence asset for the agency without Kaspersky knowing. This pushed the FBI to urge US industries to cut ties with the firm, being unsuccessful in some, presented it's privately sourced and open intelligence to congress. Similar to how Google was operating without knowing that the NSA had been snooping on their internal traffic during the NSA glory days, this does not mean Kaspersky actively allows this to happen. The result of this unconfirmed news can lead to the fact that large information companies are at the mercy of their own government intelligence agencies. As an average consumer, this may not affect you to keep using their product, as a corporate entity, you will have to factor in the government agency that has government jurisdiction because of the software's origin. Source: https://www.cyberscoop.com/kaspersky-fbi-cia-fsb-demarche-2015/
  12. If you were a programmer, you'd be using that key alot. Either the backslash for doing cmd file location in windows, or using || in programming.
  13. Vote for anyone but Harper and they will amend or repeal the Bill C-51 that allows that to happen.
  14. As a student in an InfoSec program, I initially used KeePass 2.0 to handle my passwords, but soon I realized KeePass became unreliable as it's password database would always corrupt. Twice that happen and luckily my peer to peer sync program (bitorrent sync) between my personal devices kept an archive version in case something goes wrong. Many of the infosec seniors and graduates made the move to lastpass even after the breach because it was still secure than any options and guranteed that your data's integrity is safe on all platforms including Linux. LastPass might have faced a breach but it was up to date in security procedures than you think a newer ("We haven't been hack so we are secure") competitor might have been. The hackers were able to get away with a hashed passwords and encrypted password vaults, where the hash or vault allone will take millions of billion years to crack per person. These companies never see your data, just that you handed them a garbled mess of data that is your passwords. And if you think it's not enough than use two factor authentication as then the hackers would have kidnap you for whatever you used to verify those.
×