Posts

Showing posts from January, 2018

Vivo phone shows off first in-screen fingerprint scanner

Image
James Martin/CNET Vivo phone shows off first in-screen fingerprint scanner The tech was rumored to go in the iPhone and Samsung phones, so it's kind of a big deal. Using the world's first phone with a fingerprint scanner built into the display was as awesome as I hoped it would be. There's no home button getting in the vast screen space, and no fumbling for a reader on the phone's back. I simply pressed my index finger on the phone screen in the place where the home button would be. The screen registered my digit, then spun up a spiderweb of blue light in a pattern that instantly brings computer circuits to mind. I was in. Such a simple, elegant harbinger of things to come: a home button that appears only when you need it and then gets out of the way. I would bet several Bitcoins that in-display fingerprint sensors become one of 2018's biggest phone trends, starting with high-end devices like the rumored Samsun...

Battle Of The 16-core Enthusiast CPUs : INTEL i9 Vs. AMD RYZEN

Image
Battle Of The 16-core Enthusiast CPUs I feel like I’m not very good at choosing the best time to post content. After completing a huge round of benchmarking on six processors, news hit the web of a massive security hole found in many processors, and at the current time, it seems Intel’s the most affected party. Currently, it’s expected that a security patch will reduce the performance in some workloads, though how much degradation will occur is yet to be seen. It originally felt like performance could be severely impacted, but initial tests conducted by other outlets around the world haven’t really given much reason for concern (although it does seem like it’s largely I/O-intensive workloads that will be affected). If it’s discovered that this patch notably decreases performance (as in, it impacts the benchmarks), I’ll revisit testing. At this point, I don’t expect the results in this review to greatly change, though if you want to remain cautious, you’d get no ...

DNS Spoofing Attack

A DNS spoofing attack is quite as easy to perform as a DHCP poisoning attack. Any traffic from the victim is forwarded through the attacker’s fake DNS service and redirected so that all requests for the Internet or internal sites land at the attacker’s site, from which the hacker can obtain credentials or possibly launch browser-based attacks, such as a Java runtime error, to trick the victim. This can also be done using the local “hosts” file on the computer. The fundamentals of this attack come from “name resolution order” and manipulating that process. DNS is created so that every DNS query first proceeds to a DNS server, usually a local one on the network or given by the ISP. That server will have been pre-configured with the IP addresses of the top-level (root) DNS servers on the Internet that are the official “source of truth” for all IP addresses and hostnames. The root server that replies would reply with the address of a lower level DNS server. This process r...