Redian新闻
>
用google 的就等死吧 (转载)
avatar
用google 的就等死吧 (转载)# PDA - 掌中宝
n*s
1
研究员?
avatar
A*e
2
发信人: walklooktalk (千红一窟), 信区: Sex
标 题: Re: 周末在门口修车,两个pp妹妹来传教,
发信站: BBS 未名空间站 (Thu Feb 22 16:00:32 2007), 转信
兄弟当年到Salt Lake City玩,去逛了逛一个教堂,不知道为什么
留下了家里的地址,结果回来后不久,就有两个摩门妹妹上门数次要
吸收我。有一次,看她们说的多了,一人倒了一大杯可乐,临走时,
她们友好地喝完杯中剩下的可乐,刚要起身,兄弟秉承中化民族好客的
传统,习惯地问了一句:再来一杯吗?然后将她们的杯子倒满。这要在中国,
一般人客气一下也就好了,但这两个妹妹虽然面露难色,却还是将一大杯可乐喝完了。
从此以后,她们再也没有上门了。
avatar
i*1
3
【 以下文字转载自 SanFrancisco 讨论区 】
发信人: immi1 (immi1), 信区: SanFrancisco
标 题: 用google 的就等死吧
发信站: BBS 未名空间站 (Tue May 10 20:42:01 2011, 美东)
Security firm claims to have hacked Chrome's sandbox
It didn't manage to do it during the most recent Pwn2Own challenge, but
VUPEN Security is now claiming that it has finally managed to hack
Google's Chrome browser and crack its so-called "sandbox." According to
the firm, the exploit relies on some newly discovered zero day
vulnerabilities, works on all Windows operating systems (and only Windows,
apparently), and could give malicious websites the ability to download
code from a remote source and execute it on a user's computer -- the video
after the break shows an example, in which the Windows Calculator
application is downloaded and run automatically. For its part, Google says
it has been unable to confirm the hack since VUPEN hasn't shared any
details with it -- something the firm apparently doesn't plan to do, as it
says it only shares its vulnerability research with its "government
customers for defensive and offensive security."
相关阅读
logo
联系我们隐私协议©2024 redian.news
Redian新闻
Redian.news刊载任何文章,不代表同意其说法或描述,仅为提供更多信息,也不构成任何建议。文章信息的合法性及真实性由其作者负责,与Redian.news及其运营公司无关。欢迎投稿,如发现稿件侵权,或作者不愿在本网发表文章,请版权拥有者通知本网处理。