-
Posts
4970 -
Joined
-
Last visited
-
Days Won
373
Everything posted by aelius
-
Banned - e tot usertitle
-
Da. Trebuie sa maresti tcp window si memoria alocata (tcp tuning). Depinde in mod proportional de RTT. Referinte: - TCP Tune - TCP tuning - Wikipedia, the free encyclopedia In cazul tau, switch-ul dgs-1005d este destinat 'home use' iar tcp windows este undeva la 16k. Am facut multe teste (benchmarks) insa switch-urile erau de la force 10. Apropo, ai folosit jumbo frame ? (mtu 9000) Pentru optimizari legate de tcp, cred ca ar fi bun un thread nou, daca va intereseaza o discutie pe tema asta. Hahaha, sa nu spui ca iti da LACP si iti vine pe 3 porturi gigabit. Sau poate iti cumperi device de 10Gbps ? Hai bre, sa fim seriosi.
-
Nu. In toate routerele de la RDS sunt configurate triggere. In momentul in care ti-ai luat dos/ddos peste flajneta, se anunta adresa_ip/32 in comunitatile BGP de pe extern ca blackhole. (asta se intampla in cateva secunde doar) Daca atacul inceteaza imediat, filtrul este scos in aproximativ 10-15 minute. Daca atacul persista mai mult de 30 de minute, filtrul se scoate doar manual de catre inginerii de la NOC 100 mbps == 12.5 MB/s la download este teoretic. Sa atingi 12 - 12.5 iti trebuie prioridizare pe pachetele ce nu contin payload. Din experienta, 11.4 MB/s este cam maximum ce se poate obtine per flow Ceva referinte: - http://www.benzedrine.cx/ackpri.html - http://phix.me/dm/ - http://lartc.org/howto/lartc.cookbook.fullnat.intro.html // ... se mai pot cauta // sidenote: Stfean_Iordache: Este best-effort. Ala e cel mai scurt raspuns
-
Pai hai ca-ti explic eu. 1. Latimea de banda nu este garantata. 2. Latimea de banda oferita este peering based. Se bazeaza pe faptul ca 80-90% din banda utilizata este catre hosturi cu care au peering. Daca le tragi tu cu 200mbps din SUA sau o sursa/destinatie fara peering, nu le convine pentru ca sunt costuri MARI. 1Gbps garantat costa in jur de 600-700 euro lunar (asta pret de ISP), la end-user ajunge mult mai mult. Majoritatea celor care vor banda de genul, sunt cei care ia de pe torente ... si alea locale. Deci costuri aproape de 0. Practic nu ai acolo decat un LAN/MAN si ceva extern ...
-
Nytro are coaili ala frate ... da cica trebuie mangaiate Eu stiu ca le da decat la femei care lucreaza in IT //edit: sa nu va luati ban de la admini/moderatori cu coailii voastre frate. Pe mine nu ma deranjaza dar poate ca altii considera prea agresiva si prea des facuta gluma.
-
it works, thanks! ;-)
-
Data breaches and security incidents are a constant in the headlines these days. Hackers and cyber criminals are motivated by status or money and finding new innovative and more creative attacks to achieve this. One of them are, Digital Bank robbery - where the thieves didn't need masks and guns to pull off the job, all they need are - Hacking Skills, a computer and the Internet. Another way is Cyber extortion - threat of attack against an enterprise or a bank, coupled with a demand for money to avert or stop the attack. According to Haaretz news, A Hacker - who is the operator of a biggest botnet malware network in the Israel, has threatens 3 major Israeli banks, i.e. Israel Discount Bank, Bank Yahav and the First International Bank of Israel. Banks database, network and websites were not breached in this case, rather the hacker claimed that he holds a huge financial trojan botnet network in Israel that have already infected millions of systems across the nation and collected a massive dump of stolen personal information, passwords, banking information and credit card numbers of 3.7 Million users. The hacker has demanded the payoff in Bitcoin, a untraceable virtual currency, perfect for blackmailers and cyber criminals. Bitcoin is not backed by any central bank or government and can be transferred "peer to peer" between any two people anywhere. Banks declined to comment on the report and immediately reported the threat to the Israel Police. According to the source, some of them do not see the threat as serious. Bank of Israel held a meeting on Tuesday on the issue, we will update you soon about their next step with a new article. Cyber attacks are becoming more and more advanced and sophisticated, more or less any company in the world is on the list of targets to rob. You should keep updating your knowledge about the cyber world to Stay Safe from all threats. Source: Hacker threatens to sell data of 3.7 Million Israeli Bank Customers, demands extortion money in Bitcoin Nota personala: Sa nu fiti pacaliti ca si ziaristii sa folositi termenul hacker pentru orice Escroc care fura bani.
-
Probabil s-au jucat cei de la xServers prin BGP. Aparea /32 ca neanuntat pe extern si cateva route locale. (cel putin asa se vedea din exterior, nu am idee) Ne cerem scuze daca ai pierdut vreo intalnire importanta la drum de seara pe RST sau vreun deal care sa-ti aduca zambetul pe buze si fericire la portofel // edit: Da, e posibil. Mircea Frijan (rechinul/bunicu) ne da flood cu winampul
-
Este legal. Se inscriptioneaza si se citesc cardurile de access control si mai multe. Ca poate fi folosit si in scopuri ilegale, asta e altceva. Daca nu aveti si stiti electronica, va descurcati cu un cap de redare de magnetofon si un preamplificator audio. ps: sa nu intrati naiba la inchisoare pentru cartele de metrou
-
View image: Screen Shot 2013 12 21 at 6 34 15 PM Byte-ul ; Ban 24 de ore (maine la ora 18.40 expira) Motiv: Tutorialele trebuie incurajate. Trebuie evitate discutiile de genul. De asemenea, mesajul de la '-1 rep' este de prost gust.
-
Daca tot este data o metoda de atac DNS Amplification, ar fi interesant sa fie si o solutie pentru asta. O solutie de a mitiga aceasta forma de atac 'low end' este sa configurati bind (named) sa permita 'recursive queries' DOAR de la surse bine stabilite. De exemplu: Fisier: 'named.conf' // lista prefixe, acl acl recurseallow { 216.156.100.0/24; 210.134.32.0/23; 188.243.11.0/24; }; options { // alte optiuni ... recursion no; allow-recursion { recurseallow; }; } Desigur, sunt si alte optiuni, mult mai bune si mai eficiente. Multumim pentru post silvian0 // edit @Byte-ul: Nu e frumos sa faci asa si nici nu cred ca trebuie traducere in lb. Romana. IT-ul se invata in Engleza.
-
The NSA and the GCHQ have compromised much encryption used on the internet through a potent mix of technological theft, spycraft, and collaboration with major technology companies, according to new reports. In a series of news articles that highlight how the code-breaking crypto-fiddling agencies NSA and GCHQ are doing their job, ProPublica, The New York Times, and The Guardian, disclosed on Thursday a wide-ranging campaign by the spies to smash internet crypto methods so to better slurp data from the world+dog. The NSA "has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show," the NYT reports. Though thin on specifics, the stories clearly outline that the agencies have developed a variety of methods to attack and gain access to data secured by either SSL, or inside a virtual private network (VPN). They also imply that they have put backdoors into crypto-systems and potentially widely used digital components, as well. The spies have also worked with technology companies to gain a direct line to data stored in their servers, though the documents do not specify which companies in particular. Analysts can slurp away at the decrypted data through a highly classified program named "Bullrun". "For the past decade, N.S.A. has led an aggressive, multipronged effort to break widely used Internet encryption technologies. ... Cryptanalytic capabilities are now coming online. Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable," one memo from 2010 given to the spies at GCHQ, says. New "groundbreaking capabilities" have also let the agencies inspect data that is intercepted from submarine cables, the reports state. The gist of the reports is that the agencies have probably compromised SSL via gaining certificates and encryption keys to the point where they can perform man-in-the-middle attacks on widely used applications. GCHQ is alleged to have broken the security on some 30 VPN systems, and has plans to get into 300 by 2015. Though mega-leaker Edward Snowden has previously claimed end-to-end encryption can protect users, the thorough ways in which the agencies have worked to compromise endpoints makes it unlikely that users on either end of a communication have access to clean hardware. Source: Reports: NSA has compromised most internet encryption • The Register
-
The US National Institute of Standards and Technology (NIST) has vehemently denied accusations that it deliberately weakened encryption standards to help the NSA's monitoring activities. "We want to assure the IT cybersecurity community that the transparent, public process used to rigorously vet our standards is still in place," said NIST in a statement. "NIST would not deliberately weaken a cryptographic standard. We will continue in our mission to work with the cryptographic community to create the strongest possible encryption standards for the U.S. government and industry at large." According to a memo released by NSA whistleblower Edward Snowden, the intelligence agency's budget included efforts to "influence policies, standards and specifications for commercial public key technologies". In particular, NIST Special Publication 800-90 was referenced, a 2006 encryption standard adopted by NIST which uses four deterministic random bit generators. One of these generators, Dual_EC_DRBG, is based on finding the discrete logarithms of elliptic curves and attracted attention almost immediately, not least because it was considerably slower than the other three methods and was specifically championed by the NSA. A year after its publication, two Microsoft researchers – Dan Shumow and Niels Ferguson – gave a presentation at the CRYPTO 2007 conference which suggested that Dual_EC_DRBG was crackable. They were careful not to accuse the NSA of deliberately inserting a backdoor into the system, but noted that it was potentially unsafe. In Tuesday's statement, NIST said that working with the NSA was standard operating procedure; indeed it was required by law to consult with the NSA on security matters. To reassure users, NIST has reopened the standard to public comment so that it can be checked, but cryptography expert Bruce Schneier, who has examined some of Snowden's material on the matter, warned that this won’t be good enough. "NIST took a big credibility hit unfortunately," he said in a podcast. "There are good people there doing good work but we don't know which of their standards are tainted, we don't know how much collaboration there is with the NSA. "And unfortunately because trust is lost when they get up and say the NSA doesn't affect our standards we don't believe them. We need a way to get back trust." Schneier likened the situation to betraying a spouse, saying that in that kind of situation the only way to get trust back is by full disclosure. "You can't say 'here's most of the things I did and you may find out some more in a few months' – those sort of strategies never work." Source: http://www.theregister.co.uk/2013/09/05/nsa_gchq_ssl_reports/
-
If you own a world-renowned Security Product or a Service, National Security Agency (NSA) is ready to pay you 10 Million or more bribe for keeping intentional backdoor for them. According to an exclusive report published by Reuters, there is a secret deal between the NSA and respected encryption company RSA to implement a flawed security standard as the default protocol in its products. Earlier Edward Snowden leaks had revealed that the NSA created a flawed random number generation system (Dual_EC_DRBG), Dual Elliptic Curve, which RSA used in its Bsafe security tool and now Snowden has revealed that RSA received $10 million from NSA for keeping Encryption Weak. So, anyone who knows the right numbers used in Random number generator program, can decipher the resulting cryptotext easily. Recommending bad cryptographic standard is one thing, but accepting 10 million to deliberately implement is something very shameful for a respected Security company. The new revelation is important, cryptographer and Security expert Bruce Schneier said, because it confirms more suspected tactics that the NSA employs. "You think they only bribed one company in the history of their operations? What's at play here is that we don't know who's involved," he said. RSA, now owned by computer storage firm EMC Corp, and has maintained its stand of not colluding with NSA to compromise the security of its products, "RSA always acts in the best interest of its customers and under no circumstances does RSA design or enable any back doors in our products," Both the NSA and RSA haven't directly acknowledged the deal. But after Snowden revelations, What is the RSA's credibility or of other American software and networking companies? Source: NSA paid $10 Million bribe to RSA Security for Keeping Encryption Weak Also, published on: - Reuters - The Register
-
- emc corp
- national security agency
-
(and 5 more)
Tagged with:
-
E de la skype. Si pe Mac OS X se comporta similar. (nu e de la cpu, am i5)
-
Security experts at Mandiant intelligence firm have discovered a new intrusion into the network of The Washington Post, it is the third time in the last three years. In time I'm writing it is still not clear the extension of the attack neither an estimation of the losses. Mandiant reported the incident to The Washington Post this week, confirming that exposed data include employees' credentials hash. "Hackers broke into The Washington Post’s servers and gained access to employee user names and passwords, marking at least the third intrusion over the past three years, company officials said Wednesday." a post of the news agency said. Early 2013 the New York Times has announced that during the previous months it was a victim of cyber espionage coordinated by Chinese hackers, similar attacks was conducted against principal Americans news agencies. The hackers have tried to compromise the email account of journalists to steal sensitive information, they tried to infiltrate the network of news agencies using several dozen instances of malware, as revealed by forensics analysis conducted by the Mandiant security firm. The attackers obtained password data for all of the Washington Post reporters and other employees. Regarding this last attack there is no evidence that subscriber information such as credit card data or home addresses was stolen neither the information of which offices of the popular media agency were impacted (e.g. Publishing system, employee e-mail databases, HR database). The hackers in many cases targeted server used by the paper's foreign staff to extend their operation to the entire company infrastructure. Investigators believe the intrusion lasted at most a few days, but the news is very worrying considering that large international news organizations have become a privileged target for hacking campaigns. The Washington Post, NYT and Associated Press were subject to numerous attacks conducted by state-sponsored hackers including the popular group of hackers Syrian Electronic Army. Waiting for more detailed results of investigation officials planned to ask all employees to change their user names and passwords on the assumption that a large number of them may have been compromised. Source: 'The Washington Post' compromised 3rd time in the last 3 years
-
World’s largest Bitcoin poker website 'SealsWithClubs' has been compromised and around 42,000 users' credentials are at risk. Seals With Club has issued a Mandatory Password Reset warning to their users, according to a statement published on the website. The service admitted their database had been compromised and revealed that the data center used until November was breached, resulting 42,020 hashed password theft. Seals With Clubs used SHA1 hash functions to encrypt the passwords, but SHA1 is outdated and easy to crack if not salted. 'StacyM', a user then posted the hashed passwords on a web forum operated by commercial password cracking software 'InsidePro' and asked for them to be cracked for $20 in bitcoins per 1000 unique passwords. 2/3rd on the list were cracked by the next day and some cracked passwords are “bitcoin1000000”, “sealswithclubs”, “88seals88” and “pokerseals”. The site also mentioned that they are working to improve security of the website and would implement additional security measures, including two-factor authentication and login from a limited number of IP addresses. - Photo - Source
-
ghosthck11, daca mai vad un singur fu*ai de emoticon iti dau ban instant. Da ce crezi ca e aici ? Emoticoncert cu Mihai Margineanu ?
-
Valium si-a luat ban aici oricum. Si el si ratatul de kronzy. Au pus pe Show-Off site-ul lor cu deface pe el.
-
Vreau si eu webul lu Mariana. E milf ceva ?! @scrimitzu: Nu mai posta aberatii la "Web development". Alege categoria off-topic daca nu ai idee unde se incadreaza. //edit: thread mutat la tomberon.
-
Il inchid ... pana nu va ard moderatorii. Stiu eu cativa care abia asteapta
-
Am interfata ELM (pe bluetooth). Nu o folosesc doar pe o masina. Am testat-o pe Renault (Megane, Clio, Kangoo), Opel (Corsa, Zafira), si un Ford. Movi Pro imi vede multi parametrii dar ma gandeam ca poate exista ceva mai profesional (pt. mac os x). Stiu, as putea sa-mi fac singur o aplicatie pentru asta, eventual ceva simplu, cu ncurses (citesc codurile si returnez mesaje predefinite in functie de coduri), insa cred ca ar lua cateva zile de lucru. pyOBD nu am testat dar o sa incerc zilele astea sa vedem cum se prezinta. ps: nu repar masini, am o curiozitate nebuna despre tot ce e tehnic Multumesc pentru raspunsuri (aveti toti cate un +1 )
- 6 replies
-
- diagnoza auto
- mac os x
-
(and 4 more)
Tagged with:
-
https://rstforums.com/forum/78558-threaduri-de-prost-gust.rst Ban 24 de ore. Sa nu mai vindeti blana ursului din padure.
-
Da-i incolo de pacalici. Era un retard la ei care a scris ca 'haitateam' este doar o echipa de copii nespalati si fara prea multe cunostinte IT. La o saptamana s-au trezit cu deface pe site.(era index-ul mutat, nu s-a sters nimic). A II-a oara, iar au comentat prostii la ei in revista de ras. S-au ales iarasi cu un deface + site-urile sterse. Au anuntat public ca s-au stricat HDD-urile si au reinstalat serverul. Namaci ... Cand multi dintre noi ne jucam pe Linux ei trageau din suzeta si apoi s-au trezit ei sa ne invete cu ce se mananca. Si asta la modul nesimtit.