$40 Firefox-Powered Orange Klif Also Includes Voice, Text, Data BARCELONA—Before you get too excited, you should know that the Firefox OS-powered Orange Klif smartphone is primarily geared towards Africa. That said, $40 for a smartphone that includes calls, text, and data for six months is still something to get excited about. I got a chance to check it… Read More »
Red Hat’s annualized run rate from public cloud reached $100 million in the fiscal second quarter.It is silently becoming a cloud computing powerhouse via its c Source: seekingalpha.com growth is in container technology and not the heavier vm/image.
Palo Alto, Calif., Feb. 11, 2016 – HP Inc. today announced the world’s broadest portfolio of shipping Windows 10® IoT Enterprise Thin Clients fordesktop, mobile and tablets(1) — the portfolio includes the HP t520, t620, t620 PLUS, t730, mt42, and both ElitePad 1000 G2 thin client tablets Designed for a broad range of cloud computing solutions across a variety of industries, including enterprise, manufacturing, healthcare and government, HP Thin Clients running Windows 10 IoT Enterprise deliver superb performance, extensive peripheral support, advanced security and easy management. “Forward-thinking customers have allowed HP to maintain its #1 worldwide market leadership position for Windows Embedded Thin Client shipments for the last seven years,” … Continue reading HP Portfolio Windows® 10 IoT Enterprise Thin Clients →
RT @m3g9tr0n: Pwning a thin client in less than two minutes//t.co/Y9FK57uVy2Source: blog.malerisch.netNormally, HP ThinPro OS interface is configured in a kiosk mode, as the concept of a thin/zero client is based on using a thick client to connect to another resource. For this purpose, a standard user does not need to authenticate to the thin client per se and would just need to perform a connection – e.g. VMware Horizon View. The user will eventually authenticate through the connection. The point of this blog post is to demonstrate that a malicious actor can compromise such thin clients in a trivial and quick way provided physical access, a standard prerequisite in an attack against a kiosk.
Tutorial on breaking and entering a thin client configured for kiosk mode.