Jump to content

darkZircon

Active Members
  • Posts

    9
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

darkZircon's Achievements

Newbie

Newbie (1/14)

  1. I had forgotten about DFS, thank you. Now I'm just looking for something to take the backups in the first place.
  2. We have hyper-v hosts in our company offices for internal use as well as in datacenters in Montreal and LA for hosted client environments (our product is a web-based application). Internally, I'd like to backup images to a second server as well as an external harddrive. For our datacenters, what I'd really like is to backup to a second server within the datacenter, and a server in the other datacenter. I'm not too sure how feasable that is though, I've just started looking for possible solutions to offer my mentor there.
  3. Hi guys, I'm a intern for a company that is looking for a hyper-v backup solution. We are in the process of migrating from vmware, and are looking for a way to automatically backup images that are running in a way that they can easily be restored to a different server. We actually just lost a server due to a power outage. Luckily, it wan't hosting anything critical, but it wasn't backed up. Apparantly, they were just manually shutting down images and exporting them as a strategy. Even worse.. they were exporting them locally. So we're kind of scrambling to get a backup system in place. If possible, we want to be able to run the backups while the image is running. If not, we would like it to shutdown the image properly, do it's backup, and restart automatically. I've heard of microsoft's data protection manager, but I'm not too sure how it works with virtual machines. Does anyone have experiance with it, or can suggest an alternative? We don't really need all the other stuff DPM can do, we just want to backup hyper-v images and be able to restore on another server. Thanks
  4. I've only recently started into looking into hacking and computer security so for me, hak5 is a great resource that exposes me to many very neat utilities that I did not know about. Looks like I'll have to go watch the earlier seasons. Thanks!
  5. For limewire and antivirus, you don't need to save them. Just keep the installers for them handy (or you'll have to re-download them after) and any downloaded files from limewire. For BIOS password, just go into your computer's bios configuration page. This is usually done by pushing either <del> or <f2> during the computer's boot process. If you bios uses a different key, it should say which at the bottom of the first thing you see when turning on the computer. If you have ever booted from a cd or usb instead of your harddrive, you should know this page. You'll be able to set it under a security tab somewhere. I am not aware of any software or configurations that will require a password to open usb drives...
  6. I've always felt that connecting to someone's open access point for low-bandwidth, legal activities is perfectly acceptable. Encryption is cake to set up and even if they're just using WEP, it will let the world know that they do not want people connecting to their network. Now if you're going to fire up wireshark and start sniffing their traffic, that would be wrong. If you download a lot or do illegal things from their networks, that is also very wrong. At the end of the day, it's the owner of the ap that will have to deal with the consequences of your actions. But if all you want to do is look at a few web pages or watch a youtube video or two through an open network, I don't see what the problem is. People have been using the 'if you house door is unlocked..' analogies, and I don't think it accurately describes the situation. Their routers are chirping 'I'm here, this is my network and you don't need a key'. I can't think of any good analogies at the moment, perhaps someone else can come up with one that depicts the situation better. For me, the bigger issue is, like using the bathroom at a fast food joint, whether or not you really want to use it. Do you really want to connect to a network you have no control over, where everything you do may be logged? Unless you're really desperate, I think not.
  7. Making an os look like another defeats the purpose, you aren't learning or even experiencing it. You just end up with 'okay.. what's the diffence other than I can't run the programs I'm used to'. (Like in redhat 9 where kde and gnome were packaged looking exactly the same). I became a linux convert back in December when I tried ubuntu for the first time (my first nix distro) and it was just so much easier and made much more sense to me than windows. If ubuntu had looked like windows, I would probably still be using windows. I would think that ubuntu was just a broken windows... and I would be very sad with my spyware infested, virus ridden, fragmented, top-heavy, blue-screened xp running laptop.
  8. You may be thinking about Serial Experiments Lain, a great 13 episode anime where the concepts of God, reality and cyberspace fuse together. I loved it, but whatever you do.. don't watch all 13 in a row!! Your head will explode. If you haven't seen it, I would also suggest Donnie Darko. It's not a hacking movie, but has some interesting things with alternate realities, time travel, causality...
×
×
  • Create New...