Jump to content

Sparda

Dedicated Members
  • Posts

    7,832
  • Joined

  • Last visited

  • Days Won

    9

Posts posted by Sparda

  1. What that technician did, was a really bad RAID practice. What if that massive hard drive dies, all that data gone. I think you should make a backup of that entire hard drive before something terrible happens and install a raid controller or buy a NAS device for backing up the data.

    So that there is a bit of data redundancy on that system.

    There is redundancy, Disks 0 and 2 are mirrored on to disk 1. Data would only be lost of disk 1 and disk 0 or 2 died.

  2. C comprises of a software mirror (RAID 1) on Drives 0 and 1. D comprises of a software mirror (RAID 1) on drives 2 and 1. This is not an ideal setup as writing to C will slow down writing to D and vise verse. Also, should disk 1 die both C and D are in danger of loosing data should they then die.

    Also the Drobo is not in the ideal configuration for working with Server 2003 or later. Ideally you would create a single gigantanormouse 16TB partition.

  3. That would probably be a very difficult thing to prove in court though. I could just say it was for performance and security and happened to log other information.

    Smart lawyer: "Why did you start logging this information and not just which sites where visited?"

    You: "<lie>"

    Smart lawyer: "Isn't it rather coincidental... etc."

    You: "<silence/lie>"

    It probably will end very badly.

  4. I would like to reiterate:

    IPv6 is not the problem. The problem is tunneling. Toredo is just very convenient because the service is maintained by Microsoft and super easy to setup and install (for every one including attackers). However, there are many other tunneling service/tools that some one could use to the same effect. Hamachie, OpenVPN, SSH just to name a few. There are even tools which allow you to create a tunnel over HTTP and can even go through through SOCKS and HTTP proxies, so blocking all forms of tunneling is a very difficult thing to do.

  5. Hollywood hacking:

    Black background, green text. Person typing at full speed never hits the wrong key. As they type scary text* constantly flies up the terminal screen.

    *Scary text is a formal grammar defined as an alphabet to contain any of the following: backdoor, exploit, overflow, null pointer, routing, stack, bypass, proxy, firewall, virus, worm. (Defiantly can be expanded on).

  6. I personally would stare at the data in WinHex and try and spot the sudden change in data that indicates the block boundaries. You can even do searches for file type that should make it easier, like try and find a bitmap.

  7. Once you get the drive bootable again. The OS will know how to use the RAID controller, so if you take an image of the working drive, then boot the working drive, you can use dd for windows to image the copy back to the RAID :P

  8. The default website at that IP address appears to be one of those sites that tries to install a toolbar in your browser. It's probably some thing bad.

  9. Well, it's not just IPv6 that's the problem, it's tunneling of any sort that is the underlying problem. Teredo makes it easy because the service requires no effort for the attacker to maintain, and it's easy to setup. It is possible to tunnel traffic for the HTTP protocol even though HTTP and SOCKS proxies. If you want to block tunneling out right, you have a major uphill battle in front of you. Alternatively you can just go for the low hanging fruit.

×
×
  • Create New...