No Image

How Windows speech-to-text and other tools can help address educational inequity

2022-05-13 KENNETH 0

How Windows speech-to-text and other tools can help address educational inequity Graham, a 12-year-old boy who lives in Kansas, has a neurological condition that renders him unable to read or write. But, thanks to Windows speech-to-text, Immersive Reader and other tools, he’s been able to look forward to the future. He now aces book reports and makes business cards for his lawn-mowing service thanks to those tools. He dreams of being a doctor. Features like these can help address inequity in schools, empowering students like Graham to find their voices and be game changers. See the video below. To learn more about Graham and some of the ways teachers are using technology to help address inequity in the classroom, visit Microsoft Stories. Source: How Windows speech-to-text and other tools can help address educational inequity

No Image

USN-5420-1: Vorbis vulnerabilities

2022-05-13 KENNETH 0

USN-5420-1: Vorbis vulnerabilities It was discovered that Vorbis incorrectly handled certain files. An attacker could possibly use this issue to cause a denial of service, or possibly execute arbitrary code. (CVE-2017-14160, CVE-2018-10392, CVE-2018-10393) Source: USN-5420-1: Vorbis vulnerabilities

[도서] 새로운 신뢰 아키텍처를 위한 블록체인

2022-05-12 KENNETH 0

[도서] 새로운 신뢰 아키텍처를 위한 블록체인 분야별 신상품 – 국내도서 – 컴퓨터와 인터넷 [도서]새로운 신뢰 아키텍처를 위한 블록체인 케빈 웰바크 저/백명훈 역 | 에이콘출판사 | 2022년 05월 판매가 27,000원 (10%할인) | YES포인트 1,500원(5%지급) 블록체인의 진정한 잠재력과 한계 및 위험에 대한 심층적이고 균형 잡힌 분석을 최초로 제공한다. 『새로운 신뢰 아키텍처를 위한 블록체인』은 상호 불신을 바탕으로 한 기술을 어떻게 신뢰할 수 있는지 보여주며, Source: [도서] 새로운 신뢰 아키텍처를 위한 블록체인

No Image

USN-5419-1: Rsyslog vulnerabilities

2022-05-12 KENNETH 0

USN-5419-1: Rsyslog vulnerabilities It was discovered that Rsyslog improperly handled certain invalid input. An attacker could use this issue to cause Rsyslog to crash. Source: USN-5419-1: Rsyslog vulnerabilities

No Image

USN-5418-1: Linux kernel vulnerabilities

2022-05-12 KENNETH 0

USN-5418-1: Linux kernel vulnerabilities Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2021-26401) Demi Marie Obenour and Simon Gaiser discovered that several Xen para- virtualization device frontends did not properly restrict the access rights of device backends. An attacker could possibly use a malicious Xen backend to gain access to memory pages of a guest VM or cause a denial of service in the guest. (CVE-2022-23036, CVE-2022-23037, CVE-2022-23038, CVE-2022-23039, CVE-2022-23040, CVE-2022-23042) It was discovered that the USB Gadget file system interface in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or [ more… ]