audiventory Posted March 17, 2017 Share Posted March 17, 2017 Viruses won't attack a computer behind a firewall - they need help from a human. Except filrewall is obsolete. Firewall is program. Very probably a program have bug. Periodically I read articles about security and very wondered what kind "holes" may be in serious systems even. Even without human. Here no reasons for panic. But installing of updates is very recommended. AuI ConverteR 48x44 - HD audio converter/optimizer for DAC of high resolution files ISO, DSF, DFF (1-bit/D64/128/256/512/1024), wav, flac, aiff, alac, safe CD ripper to PCM/DSF, Seamless Album Conversion, AIFF, WAV, FLAC, DSF metadata editor, Mac & WindowsOffline conversion save energy and nature Link to comment
gridlock74 Posted March 17, 2017 Share Posted March 17, 2017 They should sound the same.... But they don't. Sent from my Nexus 4 using Tapatalk This guy is usually interesting and speaks a lot of sense. Archimago's Musings: MUSINGS: Do "audiophile" computer-based players make a difference? On "Everything Matters" and wisdom. Link to comment
Jud Posted March 17, 2017 Share Posted March 17, 2017 Except filrewall is obsolete. Firewall is program. Very probably a program have bug. Periodically I read articles about security and very wondered what kind "holes" may be in serious systems even. Even without human. Here no reasons for panic. But installing of updates is very recommended. "Hardware firewalls" are decent, and less fuss, I find, than the software products. But the security of those depends on not having your username/password broken, and with stuff such as rainbow tables, it's difficult to have a really good password. You can use one of the password apps or extensions, but that relies on (1) your password used to access the app or extension being secure; and (2) the app company database not being hacked. There will likely be a move to other forms of security, such as biometrics and/or access tokens like Google Authenticator. But these aren't invulnerable either: If your fingerprint is attached to, for example, the authorization to access your bank records, I don't need your fingerprint, I just need to hack the authorization to substitute my fingerprint for yours. And Google Authenticator doesn't actually know or authenticate my identity, so I can either steal the phone, or remotely hack the security record to tell it to accept the code my phone sends it rather than yours. It will always be an arms race. Interesting stuff. One never knows, do one? - Fats Waller The fairest thing we can experience is the mysterious. It is the fundamental emotion which stands at the cradle of true art and true science. - Einstein Computer, Audirvana -> optical Ethernet to Fitlet3 -> Fibbr Alpha Optical USB -> iFi NEO iDSD DAC -> Apollon Audio 1ET400A Mini (Purifi based) -> Vandersteen 3A Signature. Link to comment
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now