Berkeley CSUA MOTD:Entry 32756
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/04 [General] UID:1000 Activity:popular
4/4     

2004/8/7-8 [Computer/HW/Laptop] UID:32756 Activity:nil
8/7     More fun with bluetooth:
        http://www.wired.com/news/privacy/0,1848,64463,00.html
2025/04/04 [General] UID:1000 Activity:popular
4/4     

You may also be interested in these entries...
2013/8/16-10/28 [Computer/HW/Laptop] UID:54728 Activity:nil
8/16    I just left my employer. They didn't ask to get their HW back.
        Is is common for employers to contact me a few months/years later
        and ask for their HW back?
        \_ Is it an iPhone 9 prototype? :-)
           \_ as a matter of fact, it is just a 2 year old laptop
              and they don't seem to keep track of inventor
	...
2013/7/8-8/23 [Computer/HW/Laptop] UID:54706 Activity:nil
7/8     Suppose I just stopped going to work and stopped communicating
        with them. How many days will it take before they stop sending me
        paycheck (and maybe even try to get back the laptop they gave me)?
        \_ They'll probably try to call your emergency contact first to see if
           you're hit a tree or something.
           you've hit a tree or something.
	...
2011/12/21-2012/2/6 [Computer/HW/Laptop, Computer/SW/Editors/Emacs] UID:54269 Activity:nil
12/21   In Emacs, how do I make it so that it will resize its screen
        when the maximum resolution of my monitor changes? When I
        use my laptop, my emacs is too big (and I can't resize it
        because the bottom-right corner is not accessible).
        \_ Which OS?  Can't you drag the top border (not a corner) to resize
           the height to be smaller?
	...
2011/5/9-7/13 [Computer/Companies/Apple, Computer/SW/OS/OsX] UID:54106 Activity:nil
5/4     Any thoughts about apple switching to ARM for all machines?
        \_ Could only have happened if the Mac App Store had been a wild, wild
           success, and they were willing to give up Steam. Games/dual-booting
           is strategically valuable to not driving people away from macs.
           A new ARM iOS based device, or opening the Apple TV to iOS apps
           (same thing, really) would be much more likely than sabotaging their
	...
2011/3/12-4/20 [Consumer/CellPhone, Computer/HW/Laptop] UID:54057 Activity:nil
3/12    I am curious what others think of tablets like iPad. They don't seem
        useful to me, but I use my computer for more than web browsing,
        Facebook, and Twitter. Why would I buy one instead of a laptop?
        They seem like a disabled laptop to me, but at a higher price.
        \_ You are most likely a coder.  iPad is not for coders.  They are
           what you get your non-technical friends.  Or musicians.  Look at
	...
2010/8/23-9/7 [Computer/SW/OS/Windows] UID:53932 Activity:low
9/21    are you guys really all using win7 in some way now?
        \_ Yes.  In my company, we have upgraded all our machines for
           development, QA and other office use (HR, Finance, Receptions, etc.)
           from WinXP to Win7 a few months ago.  Our products now primarily
           support Win7/Win2008 and secondarily support WinXP/Win2003.
           \_ Any weird gotchas support-wise?
	...
2010/5/17-26 [Computer/SW/OS/OsX] UID:53835 Activity:nil
5/13    I am getting a new Macbook Pro. Should I get a glossy or matte screen?
        I always had matte in the past. I use my laptop just about everywhere
        and glare is a concern. Should I stick with matte? I noticed
        glossy is the default now.
        \_ It is weird, but I have the glossy screen that goes to the edge of
           the monitor for my 13" PB and it somehow seems bigger than the one
	...
2010/4/5-15 [Computer/HW/Laptop, Computer/SW/OS/OsX] UID:53770 Activity:nil
4/4     My macbook is dying. After three and a half years, I want to retire it,
        and get a new one, but I live in constant fear* that Apple will pull a fast
        one on me and update them as soon as I do. Anyone know anything about an
        impending Apple laptop refresh?
        * = hyperbole
        \_ http://buyersguide.macrumors.com
	...
2010/1/22-30 [Computer/HW/Laptop, Computer/SW/OS/OsX] UID:53655 Activity:high
1/22    looking to buy a new development laptop
        needs ssdrive, >6 hr possible batt life, and runs linux reasonably
        Anyone have a recommendation? Thx.
        \_ thinkpad t23 w ssdrive and battery inplace of drive bay
        \_ Ever wondered what RICHARD STALLMAN uses for a laptop?  Well,
           wonder no more!
	...
2009/10/24-11/3 [Computer/HW/Laptop] UID:53466 Activity:kinda low
10/24   How well do you see color? I got 8, how about you?
        http://www.xrite.com/custom_page.aspx?PageID=77
        \_ 7
           \_ what monitor did you use?
              \_ LCD on thinkpad x32, under not so great lighting conditions.
        \_ I scored 101, which seems impossible. Then again, I didn't
	...
Cache (4067 bytes)
www.wired.com/news/privacy/0,1848,64463,00.html
An attacker could even plant phony text messages in a phone's memory, or turn the phone sitting in a victim's pocket or on a restaurant table top into a listening device to pick up private conversations in the phone's vicinity. Most types of attacks could be conducted without leaving a trace. John Hering holds the BlueSniper 'rifle' he created with colleagues that lets someone find and attack a Bluetooth-enabled device from a distance. A test-run of the BlueSniper allowed Hering to grab the phone book and text messages from a Nokia 6310i phone 11 miles away from him. The BlueSniper rifle for capturing data from Bluetooth-enabled phones is constructed from a Choate Ruger Mini-14 stock, 14dbi semi-directional Yagi antenna, standard rifle scope, electrical tape, zip ties and cardboard. Security professionals Adam Laurie and Martin Herfurt demonstrated the attacks last week at the Black Hat and DefCon security and hacker conferences in Las Vegas. Phone companies say the risk of this kind of attack is small, since the amount of time a victim would be vulnerable is minimal, and the attacker would have to be in proximity to the victim. But experiments, one using a common laptop and another using a prototype Bluetooth "rifle" that captured data from a mobile phone a mile away, have demonstrated that such attacks aren't so far-fetched. Using a program called Bluesnarf that he designed but hasn't released, Laurie modified the Bluetooth settings on a standard Bluetooth-enabled laptop to conduct the data-collection attacks. Herfurt developed a program called Bluebug that could turn certain mobile phones into a bug to transmit conversations in the vicinity of the device to an attacker's phone. Using Bluebug from a laptop, an attacker could instruct a target phone to call his phone. The phone would make the call silently and, once connected, open a channel for the attacker to listen to conversations near the targeted phone. The attacker's phone number would appear on the victim's phone bill, but if the attacker used a throwaway phone, the number would be out of service. "(A victim) will know that his phone made a call that it shouldn't have made, but he won't necessarily come to the right conclusion that someone listened in on the conversation that he was having at that particular time," Laurie said. "He may think he accidentally pressed buttons to make the call while the phone was in his back pocket." An attacker could also install a gateway on the victim's phone to reroute phone calls through his own phone so that he could hear and record conversations between parties without their knowledge. And he could send text messages from his computer through a victim's phone to another phone so the receiver would think the message originated from the victim. There would be no record of the sent message on the victim's phone unless the attacker planted it there. "I can plant the message on the phone and make it look like he sent a message that he never sent. So when the FBI grabs the phone (for evidence), the message will be in the first guy's outbox," Laurie said. The use of Bluetooth, a wireless technology that lets two devices exchange information over a short distance, is growing rapidly in Europe and the United States. About 13 percent of mobile phones shipped in the United States this year have Bluetooth, according to IDC research. The number will grow to about 53 percent globally and 65 percent in the United States by 2008. According to IMS Research, 2 million Bluetooth-enabled devices -- phones, laptops and PDAs -- are shipped weekly in the world. Laurie and Herfurt have only tested phones for vulnerabilities so far. "They're talking about putting Bluetooth in everything: home security, medical devices," Laurie said. "If they don't do something about security there is some really serious stuff ahead of us." Terms & Conditions Note: You are reading this message either because you can not see our css files (served from Akamai for performance reasons), or because you do not have a standards-compliant browser.