Jump to content

3w`Sparky

Active Members
  • Posts

    142
  • Joined

  • Last visited

Posts posted by 3w`Sparky

  1. I was thinking once I i cracked the grub2 booter then I would dd the stick for future edits , looks like someone has done it already , nice one

    Cheers

  2. I'm thinking that Darren has been to busy playing with his camping gear :oD and hasn't ironed out the guide for grub2 as it was a bit jumbled to me "hey the man wants to go on holidays, i don't blame him" I have googled it up and found there to be all sorts of issues with kernels and alike booting iso images as a result I think I might be looking into tried and tested grub to boot my iso's, of course that gui might make all these issues go away.

    I was hoping to be dropping iso after iso onto my memory stick tonight but thats not going to be the case without some research as the content hoped for wasn't in this episode, no matter time to get my fingers grub'ie

  3. I use Wink for Screen Capture might not be suitable but for my training / documentation i think it's great.

    if its print screens then i use howies quick screen capture.

    there is another video capture but i can't remember the name of it - grrrr

  4. hi guys good episode great way to start a new series,

    how big is your beer glass Darren !

    I noticed Matt complaining about network speeds well , i use pathping (comes with xp) and netspeed (free exe download) there two very simple but informative tools to help debug peformance issues.

    pathping looks at each hop along your route to see what might be the stumbling block

    netspeed will give you a client / server setup where you can send any size of data across your network 1 2 10 100 1000 its great for looking at what speeds are actually achived across a large network.

    the grub2 thing is very exciting esp if you revisit the single usb for many boots would be nice to see if the iso supports the install of an O/S eg 2003 server or alike.

    the drink drive add - well darren made it sound like if you drink and drive everything that is bad will happen to you !

    the only thing missing was being arrested, i'm from the uk but surely you guys get put inside for drink driving too !

    last of all , the studio seems very dark , i thought it was just my phone at first but checked on my laptop and yes it is dark it isn't just my phone, any chance of getting it abit brighter in there, i know your ceiling is crammed with lights already but they dont seem to be doing there job.

    hey i'm just one viewer but am i alone ?

  5. contact the police , take the HDD out , wack it into a box and start fresh restore from a backup prior to that compromise, you have to assume the whole system is dirty now , there could and most lightly is loads of tweaked scripts and code that will be archiving off anything useful and exporting it off!

    once you have restored from a backup , patch and bring upto speed all elements of the server, even tho they didn't actually hack it they most lightly have a better idea of that server than you do now !

  6. it would have its use in my work role , storing lots of configs is handy , named configs would be better for me , also for it to sit in the task bar and not both in the taskbar and menu bar would be better for my use as it could then just sit in there allday long without cluttering my menu bar.

  7. one of the things i find being an IT person is that i very rearly powerdown my laptop i just slam the old lid shut and it goes to standby or Hybonation - from that point the volume is already decrypted leaving it at risk ok it's not such a high risk but a risk never the less. esp in hybonation mode as the disk can be cloned and multiple attempts made at working around a windows password(if it has one).

    drive encrpytion is always going to become more important overtime , there are also HDD's that contain there own firmware that write to the disk encrypting it and a pw decrypts the disk before booting (o/s independant), never tried it but have read about it and that sounds the best way forward.

    this episode should have contained a guide for duel booters ! - ie encrpyting both your linux and windows partitions

    most of us are duel booters i'm thinking.

    the netbook encryption speed is more about the size of the disk more than anything else surly, encrpyting a 1TB drive using a duel / quadcore is going to take far longer than a netbook with its tiny atom.

    I have to say this episode was disapointing, it contained only one subject that you could find help guides for anywhere or just keep clicking next. it's not one of your best episodes - Sorry

  8. we have been paying a 3rd party 3k a month for reporting to us the " alerts " that they see and at the same time tuning the reports to remove false positives, the thing is , 36k could pay an additional member of staff who could have a sole purpose of auditing this system and reporting on findings that need correcting, ie old samba shares or alike, granted after 12 months they might be sent off to the loony bin.

    also currently the reports that are received are just archived as no one has the time or skill to cope with the shear amount the reports produce.

    the total cost of ownership is massive, don't be fooled with a "just plug it in" salesman !

  9. IOsys ,

    the thats the interesting thing

    Quote: The proof that AES has no government backdoor is the fact that they use it themselves

    well this is the interesting thing you see, the UK don't like to use it they get all pissy when you suggest using it for data storage or to establish some tunnels, kind of the reason i thought i would post it !

    very interesting thoughts from all of you tho

  10. OK so I chat with alot of government bods maily Techie but some pen pushers, they all say that AES is not secure and that the US have a backdoor to access it. when you ask them how they know this they can't really say where they got it from , but they heard it and beleive it's true. . . . .

    Personally i think this is a complete load of bull **it but what are people thought's do you guys hear the same and or get the same issues arrise?

    what other comparable encryptions are there ?

  11. Well that confirms one thing !

    I won't be drinking anything mentioned / plugged on the show it really screws with your mind !

    haha Have you seen Darren on the webbie cam with his green monster slipper feet. very cool

  12. just tag a line in the end of the etc/init.d/networking script - tcpdump -i eth2 etc etc

    or you can add your own script in to that folder if you want conditions meet before you start that app, ie does network exist if so is there a link.

  13. I think after watching hakhouse cam the rover should become a battery powered hoover so, the hakhouse can be cleaned by the viewers who are driving it over the net , you might have to stick a launcher on or something incase of an emergency ie the cat decides to take on the tank but a track powered hoover is whats called for.

  14. I Run a script on our DHCP Server at work I use Grep to exclude Printers and Naming Convension PC's & Servers it will then export whats left into a webpage that anyone can monitor.

    the idea with this is not to stop "MR Hacker" as they are mostlightly not going to be obtaining DHCP unless there crap!

    it's really to stop Mr Stupid with 800 viruse's and a floppy full of worm's.

    the webpage throws up a nice little sound alerting us (Processes every 5 mins)

    if they don't release there address then it sits on the webpage with there hostname until the lease expire's in our case 8Day's

    it shows IP: 10.10.10.25 Hostname:Fred

    this is a crude way of keeping an eye on the network but it works and when that rouge Device is spotted, we shutdown the port (that bit is still a manual process) also even if the PC is firewalled the useful info is from the DHCP server which means you still see that it connected.

    net send to the pc in question it's normally enabled unless someone's stopped the messenger service.

    (require's you to state the domain too tho)

    one more thing , using a txt file I got off the net you can do a find on the first part of the mac address from DHCP in notepad or alike and it will match the vendor's code so if you can't workout what port it's plugged into you can atleast get an idea of what brand of device your looking for. . . .

×
×
  • Create New...