On 3 July 2010 17:17, Dr A. J. Trickett adam.trick...@iredale.net wrote:
One [1] suggests that USB hardware can be used as a Trojan horse to
steal your data.
It's possible. Though there are probably easier ways to steal data.
I was wondering about this - but what device would it have to
From: hampshire-boun...@mailman.lug.org.uk
[mailto:hampshire-boun...@mailman.lug.org.uk] On Behalf Of Jan Henkins
Sent: 03 July 2010 19:45
To: Hampshire LUG Discussion List
Subject: Re: [Hampshire] Lucid network manager
Thanks for your advice but I'm afraid one of the commands doesn't
I am looking for a light weight laptop which is powerfull and also is
supported in GNU/linux ( hopes for all free drivers)
It would be nice if the laptop could run compiz + openoffice+ firefox(
10 tabs +gmail) without any delays .
Regards,
Pavithran
--
pavithran sakamuri
--
Please post to:
On 04/07/10 10:06, Rob Malpass wrote:
*From:* hampshire-boun...@mailman.lug.org.uk
[mailto:hampshire-boun...@mailman.lug.org.uk] *On Behalf Of *Jan Henkins
*Sent:* 03 July 2010 19:45
*To:* Hampshire LUG Discussion List
*Subject:* Re: [Hampshire] Lucid network manager
Thanks for your advice
interesting to see the range of opinions in the NS articles' comments,
regarding the 'rights and wrongs' of the reaearch being disclosed.
On 04/07/2010, Anton Piatek an...@piatek.co.uk wrote:
On 3 July 2010 17:17, Dr A. J. Trickett adam.trick...@iredale.net wrote:
One [1] suggests that USB
One [1] suggests that USB hardware can be used as a Trojan horse to
steal your data.
I don't know if this is flawed research or flawed reporting, but the
article leaves a very misleading impression.
The researcher has correctly identified that there is an explicit trust
relationship between