|
|
User Controls
|
New User
|
Login
|
Edit/View My Profile
|
|
|
|
ActiveMac
|
Articles
|
Forums
|
Links
|
News
|
News Search
|
Reviews
|
|
|
|
News Centers
|
Windows/Microsoft
|
DVD
|
ActiveHardware
|
Xbox
|
MaINTosh
|
News Search
|
|
|
|
ANet Chats
|
The Lobby
|
Special Events Room
|
Developer's Lounge
|
XBox Chat
|
|
|
|
FAQ's
|
Windows 98/98 SE
|
Windows 2000
|
Windows Me
|
Windows "Whistler" XP
|
Windows CE
|
Internet Explorer 6
|
Internet Explorer 5
|
Xbox
|
DirectX
|
DVD's
|
|
|
|
TopTechTips
|
Registry Tips
|
Windows 95/98
|
Windows 2000
|
Internet Explorer 4
|
Internet Explorer 5
|
Windows NT Tips
|
Program Tips
|
Easter Eggs
|
Hardware
|
DVD
|
|
|
|
Latest Reviews
|
Applications
|
Microsoft Windows XP Professional
|
Norton SystemWorks 2002
|
|
Hardware
|
Intel Personal Audio Player
3000
|
Microsoft Wireless IntelliMouse
Explorer
|
|
|
|
Site News/Info
|
About This Site
|
Affiliates
|
ANet Forums
|
Contact Us
|
Default Home Page
|
Link To Us
|
Links
|
Member Pages
|
Site Search
|
Awards
|
|
|
|
Credits
©1997/2004, Active Network. All
Rights Reserved.
Layout & Design by
Designer Dream. Content
written by the Active Network team. Please click
here for full terms of
use and restrictions or read our
Privacy Statement.
|
|
|
|
|
|
|
|
Time:
02:43 EST/07:43 GMT | News Source:
ZDNet |
Posted By: Kenneth van Surksum |
George Ou writes: One gentleman on the Dailydave security mailing list started a discussion about the potential for exploiting Vista's speech recognition feature by hosting malicious sound files on a website that would playback a series of audio commands to try to subvert the Operating System. The man didn't actually test any of these theories, but raised an interesting concern about the safety of Vista's speech command system.
I responded to the list explaining that an Operating System should filter out the sounds it picks up on the Microphone to avoid a nasty feedback problem, but it's still possible for the Mic to pick up enough of the voice to run. Someone else responded that Apple tried similar functionality 15 years ago and quickly realized that they had to guard the feature with a keyword that needed to be spoken because people were playing gags with the "shutdown" command. But I have used speech command and realized that Vista only requires a static command so I proceeded to investigate with an actual test to test these theories.
|
|
#1 By
3746 (216.16.225.210)
at
2/1/2007 6:56:54 AM
|
Are you kidding me? If this is the best FUD that they can come up with I am not impressed.
|
#2 By
73090 (80.116.19.1)
at
2/1/2007 6:57:31 AM
|
This is pure FUD
because this “safety gap” would have then each speak recognition software.
This post was edited by culling on Thursday, February 01, 2007 at 06:58.
|
#3 By
8556 (12.207.97.148)
at
2/1/2007 10:41:14 AM
|
This one is funny. Who is going to sit back and play audio files giving commands off of any web site? This would require putting your mic next to your speakers and cutting your IQ in half. Maybe the IQ thing comes first.
|
#4 By
23275 (172.16.10.31)
at
2/1/2007 6:37:35 PM
|
and the main point missed here.... Speech in Vista is so much better than ever before that such an improbable exploit is possible in the first place....
I love the bit about, "apple quickly realized..." - yeah... Speech is great in OS X... ahhh, no, sorry, it isn't.
Again, and again and again... I wonder, do these people actually use and support what they write about? It does not seem that they do.
Last observation... why do people seem so happy when they find a fault, or a flaw... in anything, or anyone? I always feel pretty lousy to learn of an exploit in any software - it means some asshat can harm the innocent.... where's the good in that?
|
#5 By
2960 (24.254.95.224)
at
2/2/2007 8:02:39 AM
|
Speach was actually better in MacOS Classic.
And Apple DID have this issue figured out before it was ever implemented.
TL
|
#6 By
23275 (68.17.42.38)
at
2/2/2007 9:05:31 AM
|
Well... again... before we start labeling Microsoft the "bad guy" again... we have to at least know that MS conformed to "standards" - and for those keen on that and Apple, know that Apple hasn't. Some facts, Vista uses SAPI 5.3 - opposite a Speech Synthesis Markup Language (SSML) compliant version of the speech API. SSML, which Apple does not use, is the W3C's endorsed standard. The behaviors one experiences in Vista result from this compliance, their reliance on UAC to protect system commands, but most importantly, to make computers more accessible - accessibility in Vista is better than it has ever been and it will make computer more useful to people who need these features. If you want to learn more about this, please consider the material here, http://www.w3.org/TR/speech-synthesis **With Apple, you can use Apple's own speech markup language, called Embedded Speech Commands... or rather, one has to use it...
**Speech is a big part of our services offering - where for many years, we have integrated it to both managed communications and applications - even extending "Alice" and making it read dynamic content that uses an XML out [of SQL] to have an on-screen avatar make applications and web sites more accessible to people - can't see? no worries... the page would be read to the visitor/user. On the other side, processing all voice mail via our Exchanges and onto mobile devices, is pretty cool - so much for needing random voice mail from a carrier... :) While [and sadly] not all customers have embraced these offerings, most are moving in that direction and it sure beats calling into a phone to get office VM.
This post was edited by lketchum on Friday, February 02, 2007 at 10:48.
|
#7 By
13030 (198.22.121.110)
at
2/2/2007 4:01:55 PM
|
#4: Why do people seem so happy when they find a fault, or a flaw... in anything, or anyone? I always feel pretty lousy to learn of an exploit in any software - it means some asshat can harm the innocent.... where's the good in that?
It's a deviant, nerd characteristic. If you post something on the internet asking for help, you will get a few responses, if any. If you post something that is factually wrong, the nerds come out of the woodwork to flame you. For the socially inept, self-confidence lacking nerd, finding a flaw and advertising it to the world is climactic.
|
#8 By
901897 (188.165.141.7)
at
11/29/2012 12:40:12 AM
|
At the same time, you also have to rein yourself in and stay mainly focused on business related topics. The whole professional vs. personal ratio also has to be calculated with your topic and target audience in mind. If you're having second thoughts about writing something in your blog that might be crossing the line, it's best to err on the side of caution and leave it out.
<a href=http://jordansoutletgc.yolasite.com/>jordan shoes</a>
You can draw inspiration from others, but make sure you instill your blog with your own personality as well!
<a href=http://cheapnfljerseys168.fast-page.org/>Personalized NFL Jerseys</a>
|
#9 By
868449 (110.85.126.20)
at
11/30/2012 8:56:19 AM
|
Making some extra money is a thing that plenty of individuals have to do nowadays just to get by, and you're going to find that there are multiple ways that this can be carried out. Many of these men and women wind up turning to the Internet because they have heard that this can be a terrific way to start earning some extra money or even making more money than they do with their current job. The only issue is that loads of folks don't know how to start making money from the Internet because they don't have the information that they need in order to get started. On this page we are going to be looking at a few different methods that individuals have used to earn the extra income that they are looking for.
<a href=http://www.newjordansoutlet.com/womens-jordans-air-max-c-301.html>jordans for sale on sale</a>
Becoming successful on the net is a thing that a lot of people have done by using the two techniques above, but there are plenty of other ways that you can begin earning money online. If you are looking for some of these various other methods that we are speaking about, you will have the ability to find far more information on the net by making use of one of the various search engines.
<a href=http://www.foreverairjordans.com/womens-jordan-shoes-c-139.html>wholesale cheap jordans online</a>
|
#10 By
1044528 (199.15.234.64)
at
3/3/2013 3:00:27 AM
|
A proxy is a prevalent time period that is now utilized by several net end users. In English, proxy refers to a person, who is licensed to act for some other man or woman. In basic words, the action essential to be done by 1 person can be accomplished by an additional person with out revealing his identity. The meaning of proxy differs with the context.
Proxy and <a href=http://scrapeboxfaq.com/where-can-i-get-private-proxies>www.yourprivateproxy.com </a> are two terms and conditions employed by intermediate internet consumers. A proxy refers to a web site, which can be used to blocked info. In other terms, without any limits, you can get access to any information more than the internet with the use of proxy internet sites. These proxy web sites are just named as proxies. Proxy server is an intermediate server, which handles info sharing in between a client and a server. Any information shared amongst the customer and the server must move proxy servers. Proxy sites are made to fool proxy servers.
Nearly all offices and educational institutions set up a proxy server, which functions as a firewall. World wide web relationship to numerous computers inside the constructing is provided only by means of the proxy server. Every single piece of data, which passes through the proxy server, is logged. This way, the officers can control the world wide web obtain of their subordinates or pupils. A firewall is put in inside a proxy server, which restricts access to numerous internet sites. In most of the cases, many known enjoyment and grownup web sites are blocked by proxy servers.
Proxies are made to get accessibility to any website of the user's choice with out finding caught by the proxy server. When you use a proxy site, your identification is concealed and the internet site, which you want to obtain, is also hidden. These proxy web sites are permitted by proxy servers and you can get any information you would like. You can entry several blocked internet sites from your business office or college utilizing proxy websites.
Proxy servers are utilised to manage world wide web obtain in the office. Apart from blocking websites, proxy servers are utilized to supply a protected and protected searching environment. All data passing by means of proxy servers can be analyzed just before they get to any final. This feature is used to block spy ware and other viruses from impacting a user's computer too. To improve network stability and access handle, proxy servers are utilised. When the community connects a enormous amount of personal computers, use of proxy servers gets to be crucial to have a centralized entry to the net.
A proxy hides your identification and lets you surf the internet with no revealing your IP deal with. Proxies are now utilized by several end users, who want to conceal their identity and escape from invaders. Anonymous searching is now possible with the use of proxies. Proxies for social networking web sites are now located all more than the world wide web since individuals want to use social networking web sites when they are at perform. Whilst the subject matter of utilizing proxy to overrule entry management is a controversial position, you can use these proxies as extended as your proxy server identifies and blocks proxies.
|
|
|
|
|