Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. Infiltrator

    Black Ops

    Try upgrading the NIC to one of those that BigFoot Network sells. That should improve the pigging response times.
  2. Gartner offers advice for bringing IE6 applications to Windows 7 Microsoft wants customers to upgrade to Windows 7, and most IT managers say they plan to do just that. But actually making the move won't be so easy. One tricky problem is ensuring support for applications as they move from an old copy of Windows to the new version – and this includes numerous applications that only run on the archaic, insecure Internet Explorer 6 browser. Believe it or not, IE6 is still more widely used than IE7 and the newest version of Google Chrome, according to data from Net Applications. IE8 is the most-used browser version, and Microsoft is enticing customers to move to Windows 7 in part by denying IE9 to users of Windows XP. But IE6 will not go away, both among casual users who haven't gotten around to upgrading and among businesses that rely on IE6 to run old applications. "From 2001 to 2006, Microsoft was very successful at getting organizations and independent software vendors (ISV) to write applications using features unique to IE6," Gartner analysts Michael Silver and David Mitchell Smith write in a new report titled "Solving the IE6 Dilemma for Windows 7." "Many home-grown, browser-based applications and ISV applications fail to run on IE8 or third-party browsers," the analysts continue. "Inventorying and re-mediating IE6 applications is extremely time-consuming, was not part of the promoted migration plans and tools from Microsoft, and is delaying Windows 7 migrations." Businesses can't hold on to IE6 forever, though. Gartner offers several pieces of advice to those who need to move away from the 9-year-old browser. The best move is to fix or replace the affected applications so they can run on modern browsers that comply with Internet standards – but this is "potentially the most difficult solution," Gartner says. MED-V not the answer for all Further options include running IE6 on a terminal server or hosted virtual desktop to offer at least temporary access. There's also Microsoft's Enterprise Desktop Virtualization [MED-V] package, but that can be quite expensive. "Gartner clients report that Microsoft commonly advises them to run Microsoft Enterprise Desktop Virtualization (MED-V) to resolve these issues, which requires licensing Windows Software Assurance and Microsoft Desktop Optimization Pack (MDOP), and outfitting each PC with a Windows XP virtual machine (VM)," the report states. MED-V and MDOP together could cost upwards of $50 per PC per year, and require additional RAM and computing resources. MED-V could make sense if a company needs to run multiple applications that require Windows XP, but the current version of MED-V is causing performance problems and likely isn't worth it in many cases. "Running a whole Windows XP VM (or hundreds or thousands of them) would seem to be counter-intuitive to solve a problem with a browser, which is supposed to be a very lightweight way to access applications," Gartner writes. "For many organizations, the cost of deploying, running, supporting and securing MED-V on the percentage of their PCs that need IE6 access is exorbitant." Application virtualisation may also provide a path to running IE6 on Windows 7. Microsoft has said the beta version of MED-V 2.0 will allow further compatibility, in part by redirecting legacy IE6 applications to different domains or ports. However, Gartner believes Microsoft is giving mixed signals on the legality of virtualising IE with third-party virtualisation software. "While we have not heard of any formal legal action by Microsoft toward vendors or customers of application/IE virtualisation solutions, Microsoft's position is that it violates its licensing terms," Gartner writes. "According to Microsoft, IE is only licensed as an integrated component of the OS (either originally or via updating earlier versions of IE on an OS) and IE is not licensed for use on a stand-alone basis." If customers really want to pursue virtualisation of IE on Windows 7, they should seek amendments to license agreements with Microsoft to specifically allow such activity. In addition to examining legal risks, customers must also consider the technical risks of running virtualized instances of IE on Windows 7. These risks could add to the security problems already inherent in running an out-of-date browser. "Microsoft support for IE6 will end 8 April 2014, the same day Windows XP support ends," Gartner writes. "If Microsoft releases any security fixes for IE6 before then, the IE 'bubbles' may have to be rebuilt to be secured, and there is the possibility of new problems being introduced. Organizations that continue running IE bubbles after the end of support may similarly be vulnerable to security problems." In general, Gartner says customers should not standardise on one browser, to avoid problems such as these. But the analyst firm also says Microsoft may be acting against its own interests in throwing roadblocks in the way of IE6-using businesses. "We believe Microsoft must do more to help organisations with their IE6 problems that Microsoft helped cause," the analysts write. Source: http://news.techworld.com/virtualisation/3...y-ie6-holdouts/
  3. Quite interesting and I like your idea very much, good work dude.
  4. Knowledge is power and with power no one can defeat you.
  5. Impressive. You do deserve a C, how long did it take you to do all that work?
  6. Accounts? what is he referring to? Have those deleted accounts been deleted, because their owners did not follow the forums rules.
  7. This is not a fact but a theory, those guys could be involved with some big names companies to help them achieve their goal. Besides in the build of Fastra, the engineers did have some issues and they had to turn to Asus for help, to address some BIOS issues.
  8. I like that case already. How much would it cost though?
  9. The only issue, I see with Quad Sli is the motherboard, you may be able to configure 4 graphics card together but the BUS speed on the motherboard will definitely be the limiting factor.
  10. They can still put in SLI, but yeah you are right currently there is no motherboard that can support 4 graphics card simultaneously. I forgot about that one.
  11. Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information. A new Firefox plug-in makes it even easier for tech novices to snoop wireless traffic, making it even more crucial than ever that users understand the risks and take precautions when using Wi-fi hotspots. The Firesheep plug-in was developed by security researchers to highlight how insecure public Wi-Fi networks can be. Mission accomplished. Unfortunately, the tool works quite well, and its public availability now places a relatively powerful snooping tool that requires virtually no hacking skills or exceptional tech knowledge in the hands of anyone. Another Firefox plug-in called Blacksheep was developed as a Firesheep alarm. It won't secure your wireless data, and it won't prevent your information from being snooped by Firesheep per se, but it will alert you when Firesheep is in use on the network you're connected to so that you're aware. Bottom line, wireless networks are not as secure as their wired counterparts, and Wi-Fi hotspots open to the general public are even less secure. If your laptop can connect to a wireless router 100 feet away, then so can any other device in a 100-foot radius of that wireless router--which is why the router should have encryption enabled and require a password of some sort to gain access. The issue is mainly a function of public Wi-Fi hotspots which generally have a completely open, and unencrypted wireless network available for patrons to join. In some cases, such as hotels, the Wi-Fi may actually use a password to prevent abuse by users who aren't actually staying at the hotel, but those are only slightly more secure because the password is shared with everyone who stays there, and is rarely changed so acquiring it is a trivial matter. Chet Wisniewski, a senior security advisor with Sophos, implored establishments such as Starbucks and McDonald's to improve security by adopting an encrypted network with a default shared password. The sentiment is admirable, and the solution offered would provide better protection than no encryption at all--and prevent snooping by the current version of Firesheep--but, in the grand scheme it's not much better. A comment on the Sophos blog explains, "I'm not really sure "free" as password is a great idea, since a password in WPA2 is nothing but a pre-shared secret, which in turn is then used to create a unique key. The problem is, when everyone uses the same password, everyone will end up with the same key, which will be in intended use client and access point, but if someone else knows the password he will be able to come up with the same key." The commenter concludes with, "You might say now it's better to have some encryption instead of none, but I think that's even more dangerous, because people now will actually think they are secure, and will therefore feel at ease to do more dangerous stuff, while a black hat will actually have just little more inconvenience to decrypt it first based on the password he knows. In fact, a black hat might even be more attracted to such hot spots because he knows people feel more at ease to do dangerous things there." Public hotspots are convenient. It is nice to be able to kick back and surf the Web while sipping a pumpkin spice latte at Starbucks. Just realize that the Wi-Fi is insecure and limit your activities. Go ahead and read the headlines at CNN.com, but don't check your bank balance, or do anything else that requires entering a username, password, or account number. If you want or need to do more sensitive tasks over the public Wi-Fi, use a VPN connection of some sort so that there is an encrypted tunnel between your laptop or tablet and the destination you are connecting to. Source: http://www.networkworld.com/news/2010/1110...our.html?page=1
  12. Are you suggesting that if he was black, it would be possible.
  13. Not only its insane, but it will be able to handle any game title that someone might want to throw at it. Besides it should also be able to crack any complexity of passwords. Very impressive rig.
  14. Not a bad idea, but you still have a long way to the top.
  15. This one makes much more sense
  16. There are only 3 days left, and he's already at $3,150.00. I think that bid is gonna increase in the last minutes or so.
  17. Nah, I've tried that as well and the only page that comes up, is the welcome page with a Enter link. Clicked on that link, and it didn't take me anywhere. Error PAGE 404, The page cannot be found.
  18. Sure they do look like two computers, but yeh 70TB of storage that's heaps.
  19. When I first saw it, I was like Wow, that is smoking..... Sweet..... Now I wonder what is he using all the storage space for? He can't use all that for music, because I have 1TB hdd filled with music files and I hardly listen to half of it. May be movies...
  20. Infiltrator

    Linux

    Try these tools http://www.computerworld.com/s/article/908...n_testing_tools
  21. I guess their site must've been take down for maintenance or by the authorities. Thanks Digip!
  22. Hi, Is anyone able to access antisecurity.org at all? I've been trying to access it since yesterday with no luck at all. Regards, Infiltrator
×
×
  • Create New...