Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. I have tried using WinRTGer.exe for generating the WPA-PSK tables but it doesn't support multicore CPUs, so I will give your suggestion a try. Thanks Barry99705
  2. Command and Conquer my favority.
  3. What about Youtube, you can do the same!
  4. Have you tried optimizing your tcp/ip stack, that usually could be the reason for slow speeds. http://www.speedguide.net/downloads.php If after you have run the optimizer still no increase in speed, buy a new modem or update the firmware if you can. Infiltrator.
  5. Since we are all talking about Employee Monitoring needs, I have found a very interesting article on the subject. Its worth read. http://www.computerworld.com/s/article/917...is_asked_to_spy Thanks Infiltrator
  6. Implementing redundancy is always beneficial and vital for both the client and the vendor as it gives you more peace of mind in a catastrophic event. But back up tapes are still a must, hard drives should never be entirely relied upon for data protection.
  7. Yes in deed more features but Qnap is intended for home use whereas Iomega is intended for a server environment or a server data center. That's why it cost more and has a different form factor, besides it always comes down to the individuals tastes anyway.
  8. That's exactly what my situation at the moment is, I only have on external HDD with all my data on it. I am considering in buying something like these ones iOmega 4000GB (4TB) Ix4-200r RAID 5 NAS Network Storage - 1U Rackmount OR Qnap TS-509 PRO 5 x 3.5 SATA NAS Hot-Swap RAID ADS 1.6GHz 1GB [NASQNP50902A]
  9. There are certainly ways for making your own home security system with cheap stuff, like a USB webcam and some software that will allow you to monitor it online through a web interface. However in my case, I would buy something like this one http://www.linksysbycisco.com/ANZ/en/products/Cameras
  10. I am pretty sure you can buy raid cards that comes with a web-based administrator interface, but like you mentioned above price would be the issue. And of course not everyone can afford forking out $500 dollars or more for a raid controller card. And using the builtin raid controller on the motherboard makes perfect sense. Even though it may not always come with the features would except on a raid card.
  11. So when would you consider running a raid add on card? In what scenario, I am just trying to get a clear picture of when to use it.
  12. I am a cheap person but I don't deal with cheap stuff. All my gear I buy has quality built into them.
  13. Good decision bro, stay with Linux you will benefit more.
  14. Can you see the tables when you issue the following command MySQL>Show tables;
  15. I've used it before and its quite good actually, not as good as a dedicated add on card but it still do a decent job. If you really want performance the add on card is the way to go.
  16. I think Ethereal would be ideal in this scenario, since its a man in the middle of attack suite.
  17. I am a cheap person but never use Microsoft security products. I use other products that does a better job in securing my computer than Microsoft security products.
  18. You could run a windows box on a VM set up.
  19. That's why back ups exists, to back you up in the event of a hardware failure. But yes you do make some good points in there as well.
  20. Hi Greendixy, Here is my windows version of your monitor script. @echo off :loop tasklist /FI "USERNAME ne NT AUTHORITY\SYSTEM" SLEEP 10 goto loop I slightly modified it, so it displays the processes running, along with the username and some other info. However I am still working on the user filtering bit, so it can display what process is from what user. Regards, Infiltrator
  21. When it comes to Raid solutions, I think you would be better off with a Raid Card. Here are some disadvantages for using raid software. * Performance: The best-known drawback of software RAID is that it provides lower overall system performance than hardware RAID. The reason is obvious: cycles are "stolen" from the CPU to manage the RAID array. In reality, this slowdown isn't that excessive for simple RAID levels like RAID 1, but it can be substantial, particularly with any RAID levels that involve striping with parity (like RAID 5). * Boot Volume Limitations: Since the operating system has to be running to enable the array, this means the operating system cannot boot from the RAID array! This requires a separate, non-RAID partition to be created for the operating system, segmenting capacity, lowering performance further and slowing boot time. * Level Support: Software RAID is usually limited to RAID levels 0, 1 and 5. More "interesting" RAID levels require hardware RAID (with the exception of duplexing, mentioned above.) * Advanced Feature Support: Software RAID normally doesn't include support for advanced features like hot spares and drive swapping, which improve availability. * Operating System Compatibility Issues: If you set up RAID using a particular operating system, only that operating system can generally access that array. If you use another operating system it will not be able to use the array. This creates problems with multiple-OS environments that hardware RAID avoids. * Software Compatibility Issues: Some software utilities may have conflicts with software RAID arrays; for example, some partitioning and formatting utilities. Again, hardware RAID is more "transparent" and may avoid these problems. * Reliability Concerns: Some RAID users avoid software RAID over concern with potential bugs that might compromise the integrity and reliability of the array. While hardware RAID controllers can certainly also have bugs, I think it's reasonable to believe that some operating systems are more likely to have these sorts of problems than a good-quality hardware RAID controller would.
  22. Brute forcing any web service nowadays would be virtually impossible. After 3 or 5 attempts of brute forcing the account, it would get locked out and the IP address of the computer brute forcing the service banned. Now if you head over to Google and type "HTTP Bruce Force" you will get list of options to choose from. You might be able to download some tools. Now if you are using your own web mail set up at home, you may disable the account lock out policy just to try out the tool and see how it works. Secondly but not least, some Anti-Virus programs could detect it as being infected so caution is a must. Good luck. Regards, Infiltrator
  23. @PurpleChip Microsoft has a tool that enables you to completely delete the data off your hard drive leaving no trace of the file itself. It's called SDelete v1.51 and can be downloaded from the URL below. http://technet.microsoft.com/en-us/sysinte...s/bb897443.aspx
×
×
  • Create New...