R
Richard Kettlewell
Paul said:No, Hodgins started this, and I'm not reading
a thousand pages of specs that don't have
the answer, for him.
I think you should have a more careful look at who I was responding to.
Paul said:No, Hodgins started this, and I'm not reading
a thousand pages of specs that don't have
the answer, for him.
Richard said:I think you should have a more careful look at who I was responding to.
No, Hodgins started this, and I'm not reading
a thousand pages of specs that don't have
the answer, for him. The USB specification
does not describe how to build a DMA logic block.
That's for the chipset designer to do.
In my experience, that's not how Usenet works. No one walks away while the
horse may still have a pulse. We stick around and continue to beat it until
long after there's any sign of life. ;-)
I've been simply reposting things I've read years ago, from security
experts (See prior articles for links). I also don't have the time or
energy to dig through the usb specs to figure out exactly how it works.
Let's just agree to disagree, and end this thread.
Regards, Dave Hodgins
But then it occurred to me that whatever the system prompts for, any
black had pseudo-keyboard could send - i. e. it could appear as a second
keyboard, then "type" a Y!
The way round that would be for the OS to say "a second keyboard has
been detected - type # on it to enable it", where # was _a random key_
(and the OS only looked at the _first_ key sent from any such to stop it
just sending all of them). But that sounds too complex.
I like playing devil's advocate too, and the challenge you raised! I
think my answer works. (Especially if it prompted for a combination.)