Posted on Thursday, February 11th, 2016 by Ken Munro.
Following my my comments on the BBC yesterday (where I called for a boycott of VTech products) I thought it would useful to point out some coming legislation that will scupper this lawyer-driven dribble in the future: The General Data Protection Regulation or GDPR. If you’re not up-to-speed on the situation (have you been living […] Read More
Posted on Wednesday, February 10th, 2016 by David Lodge.
Following on from Mike’s Wyse crypto post this post describes the process he and I first went through to decode how the Wyse administrator password was encoded in its configuration file. This version is a bit clunky in comparison but it’s still worth sharing as an interesting method. As a reminder We had a program […] Read More
Posted on Tuesday, February 9th, 2016 by Michael Yardley.
(Credit also due to @tautology0). Thin-clients are an increasingly popular option for providing access to virtualised infrastructure. This is typically in the form of a full-desktop-environment or standalone published applications (e.g. Notepad / Microsoft Office applications / Internet browsers). Despite the many advantages of this common technology, we wanted to talk today about a negative […] Read More
<< Older posts