Jump to content

Fi8sVrs

Active Members
  • Posts

    3206
  • Joined

  • Days Won

    87

Everything posted by Fi8sVrs

  1. Fi8sVrs

    hellaw '

    Salut. Bine ai venit!
  2. A new cyberweapon could take down the entire internet – and there's not much that current defences can do to stop it. So say Max Schuchard at the University of Minnesota in Minneapolis and his colleagues, the masterminds who have created the digital ordnance. But thankfully they have no intention of destroying the net just yet. Instead, they are suggesting improvements to its defences. Schuchard's new attack pits the structure of the internet against itself. Hundreds of connection points in the net fall offline every minute, but we don't notice because the net routes around them. It can do this because the smaller networks that make up the internet, known as autonomous systems, communicate with each other through routers. When a communication path changes, nearby routers inform their neighbours through a system known as the border gateway protocol (BGP). These routers inform other neighbours in turn, eventually spreading knowledge of the new path throughout the internet. A previously discovered method of attack, dubbed ZMW – after its three creators Zhang, Mao and Wang, researchers in the US who came up with their version four years ago – disrupts the connection between two routers by interfering with BGP to make it appear that the link is offline. Schuchard and colleagues worked out how to spread this disruption to the entire internet and simulated its effects. Surgical strike The attack requires a large botnet – a network of computers infected with software that allows them to be externally controlled: Schuchard reckons 250,000 such machines would be enough to take down the internet. Botnets are often used to perform distributed denial-of-service (DDoS) attacks, which bring web servers down by overloading them with traffic, but this new line of attack is different. "Normal DDoS is a hammer; this is more of a scalpel," says Schuchard. "If you cut in the wrong places then the attack won't work." An attacker deploying the Schuchard cyberweapon would send traffic between computers in their botnet to build a map of the paths between them. Then they would identify a link common to many different paths and launch a ZMW attack to bring it down. Neighbouring routers would respond by sending out BGP updates to reroute traffic elsewhere. A short time later, the two sundered routers would reconnect and send out their own BGP updates, upon which attack traffic would start flowing in again, causing them to disconnect once more. This cycle would repeat, with the single breaking and reforming link sending out waves of BGP updates to every router on the internet. Eventually each router in the world would be receiving more updates than it could handle – after 20 minutes of attacking, a queue requiring 100 minutes of processing would have built up. Clearly, that's a problem. "Routers under extreme computational load tend to do funny things," says Schuchard. With every router in the world preoccupied, natural routing outages wouldn't be fixed, and eventually the internet would be so full of holes that communication would become impossible. Shuchard thinks it would take days to recover. "Once this attack got launched, it wouldn't be solved by technical means, but by network operators actually talking to each other," he says. Each autonomous system would have to be taken down and rebooted to clear the BGP backlog. Meltdown not expected So is internet meltdown now inevitable? Perhaps not. The attack is unlikely to be launched by malicious hackers, because mapping the network to find a target link is a highly technical task, and anyone with a large enough botnet is more likely to be renting it out for a profit. An alternative scenario would be the nuclear option in a full-blown cyberwar – the last resort in retaliation to other forms of cyberattack. A nation state could pull up the digital drawbridge by adjusting its BGP to disconnect from the internet, just as Egypt did two weeks ago. An agent in another country could then launch the attack, bringing down the internet while preserving the attacking nation's internal network. Sitting duck Whoever launched the attack, there's little we could do about it. Schuchard's simulation shows that existing fail-safes built into BGP do little to protect against his attack – they weren't designed to. One solution is to send BGP updates via a separate network from other data, but this is impractical as it would essentially involve building a shadow internet. Another is to alter the BGP system to assume that links never go down, but this change would have to be made by at least 10 per cent of all autonomous systems on the internet, according to the researchers' model, and would require network operators to monitor the health of connections in other ways. Schuchard says that convincing enough independent operators to make the change could be difficult. "Nobody knows if it's possible to bring down the global internet routing system," says Mark Handley, an expert in networked systems at University College London. He suggests that the attack could cause "significant disruption" to the internet, with an effect greater than the Slammer worm of 2003, but it is unlikely to bring the whole thing down. "The simulations in the paper make a lot of simplifying assumptions, which is necessary to simulate on this scale," he explains. "I doubt the internet would behave as described." Schuchard and colleagues presented their findings at the Network and Distributed System Security Symposium in San Diego, California, on Tuesday. Source
  3. Fi8sVrs

    Cifre din PI

    In an astounding and record-breaking mathematical feat, a Japanese man has calculated the value of pi to 5 trillion decimal points using a home made computer. Shigeru Kondo, a 55-year-old systems engineer, calculated the ratio of the circumference of a circle to its diameter - usually abbreviated to 3.14 - in 90 days and seven hours, reports The Telegraph. The whole project nearly came crashing down when his daughter tripped a circuit breaker when she turned a hair dryer on. The project was saved when the computer switched to an emergency 10-minute back-up power source. Kondo was also forced to remove casings from the computer and blow cool air onto the machine with fans as the temperature in his home rose to 40 degrees in the hottest Japanese summer since 1946. Kondo's computer costs 11,550 pounds and has a hard-drive capacity of 32 terabytes. Now, he intends to try to compute the value of Pi to 10 trillion digits, saying that he only used an estimated 60 percent of the machine's capacity. ANI http://www.numberworld.org/misc_runs/pi-5t/details.html
  4. A Comprehensive History of Computers [infographic] Lets sit back and think about what life was like before computers were everywhere. You actually had to send letters via the postal service, go to stores to buy things, and actually visit Uncle Larry at his house instead of at the prison where he is serving time for a hard drive full of illegal images. Any way, even though a mostly computerless world wasn’t that long ago it really is hard to explain to some of the younger generation what a pain it really was. So in honor of the great technology we use everyday I present to you ‘Computers – A Chronological Timeline’. Enjoy! Source
  5. a mai fost postat?
  6. Cosmote Romania lanseaza Frog - un nou brand dedicat tinerilor moderni si activi - ce le ofera un pachet avansat de comunicare. Cartela Frog este un produs prepaid adaptat tinerilor si nevoilor lor specifice de comunicare, oferind avantaje multiple de voce si servicii cu valoare adaugata foarte atragatoare. Aceasta este in prezent oferta cea mai avantajoasa pe piata pe segmentul prepaid. "Frog a fost conceput pentru tinerii moderni si activi, care folosesc telefonul mobil ca pe un portal de comunicare si divertisment si care apreciaza o solutie de comunicare inteligenta. Pe langa ofertele de voce si text, acestia primesc beneficii atractive si interesante, care le fac viata mai usoara, mai placuta. Cu Cartela Frog, oferim clientilor nostri, in premiera pentru piata de telecom din Romania, un pachet atractiv de comunicare, respectand-ne promisiunea de a oferi cele mai relevante solutii de comunicare, intr-un mod accesibil. Iar acesta este doar inceputul. Sub umbrela Frog vor mai fi lansate multe alte surprize incitante." a declarat Costas Kapetanopoulos, Director de Marketing si Comunicare, Cosmote Romania. Cartela Frog este activata cu o reincarcare de cel putin 4 euro. Prin intermediul Cartelei Frog, utilizatorii pot beneficia de un bonus de 48 de euro (1 euro bonus / luna pentru o perioada de 48 de luni, primit la prima reincarcare de minim 4 euro, in cadrul lunii respective). Odata ce Cartela Frog este achizitionata, utilizatorii pot activa extraoptiunea care merge dincolo de pachetele traditionale ce includ servicii de voce si SMS, oferind solutii avansate de comunicare, intr-un singur pachet. Astfel, cu extraoptiunea Frog, clientii vor beneficia de servicii cu valoare adaugata foarte atractive, cum ar fi: Navigare nelimitata pe Internet de pe telefonul mobil prin intermediul serviciului web'n'walk 15 MMS-uri incluse catre utilizatorii Frog si Cosmote Notificari gratuite atat de la cat si catre Twitter Serviciul Muziton Serviciile cu valoare adaugata vin in completarea unui pachet foarte generos de voce si SMS care include: Apeluri nelimitate de voce si SMS-uri in grupul Frog 1000 de minute si 1000 SMS-uri catre Cosmote 70 minute si 70 SMS-uri catre alte retele nationale Costul extraoptiunii este de 6 euro. De asemenea, pentru utilizatorii Frog a fost creat un nou serviciu gratuit si usor de utilizat - acestia vor putea verifica daca un anumit numar de telefon apartine Cartelei Frog, fie prin accesarea standard de canale Self Care (1234 / *100#) fie prin formarea numerelor scurte 777 / *777#. Utilizatorii Cartelei Frog vor avea acces la toate metodele si valorile de reincarcare, deja disponibile pentru Cartela Cosmote. Sursa
  7. e copie dupa british got talent Got Talent - Wikipedia, the free encyclopedia nimic original
  8. Fi8sVrs

    videosz.com

    cripteaza -
  9. Trilulilu - Blanos Distruzos feat Vexxatu Vexx - Soldatul Vexx - Muzic? Diverse
  10. punele in fisier.txt sa nu se indexeze
  11. trimite lor mail cu detalii despre cont: mail-uri sent-inbox, data activarii, alte alea
  12. http://rstcenter.com/forum/31227-internet-cine-stie.rst
  13. PORT.ro - Ochi de vultur Jerry Shaw (LaBeouf) ?i Rachel Holloman (Michelle Monaghan) sunt doi str?ini aduna?i laolalt? de un apel telefonic misterios al unei femei. pe care niciunul dintre ei nu a cunoscut-o. Necunoscuta îi amenin?? pe Rachel ?i Jerry c? le ia via?a lor ?i familiilor lor, for?ându-i astfel s? intre în jocuri periculoase ?i în situa?ii limit?, urm?rindu-le fiecare mi?care prin intermediul unor dispozitive care ast?zi, fac parte din cotidian ?i se g?sesc pân? ?i în supermaket-uri. Vine momentul în care situa?ia escaladeaz?, iar cei doi oameni absolut obi?nui?i devin cei mai c?uta?i oameni din ?ar?, care acum trebuie s? descopere împreun? ce se întâmpl? cu adev?rat, ce este în spatele acestui joc . Luptându-se pentru via?a lor, cei doi devin pionii unui inamic f?r? chip ce pare s? dispun? de puteri nelimitate, ?i care manipuleaz? totul. Film distribuit de Ro Image. Data premierei: 24 octombrie 2008
  14. Fi8sVrs

    Un shell

    Nu sunt ale mele http://digilander.libero.it/giovanni_garulli/php/r57.php http://kair111.jino-net.ru/r57shell.php http://wwwnpo.moph.go.th/uc/files/c99shell.php
  15. Fi8sVrs

    Caut poster

    // removed
  16. AdSense ?
  17. The Colors of the Web is a very cool infographic by ColourLovers.com. Looking at the color distribution of the icons of the top 100 web brands. When we released our report on the colors of the social web, based on data analyzed by our Twitter theme tool, we were surprised that blue was such a dominant color in people’s profile designs. Was Twitter’s default color influencing their design decisions? Or is blue really THE most popular and dominant color online? …We decided to look at the colors in the brands from the top 100 sites in the world to see if we could paint a more colorful picture. Maybe a yellow icon wasn’t the best choice I’ve ever made… Sursa
  18. au mai fost: http://rstcenter.com/forum/30691-creativemonkeyz.rst
  19. Index of /~admin
  20. I have been one of those luckiest guys who used Windows 3.1 to the fullest. Windows has come so far since then with the recent launch of Windows 7. But for true Windows fans here is chance to lay their hands on Windows 3.1 again. Windows 3.1 was one of the first Operating System which was built using a Graphical User Interface. Windows 3.1 bought with itself a number of applications like Notepad, Internet Explorer and Program Manager. Here is a chance to experience Windows 3.1 again. Visit michaelv.org. Here you can find a fully functional Windows 3.1 with working applications like Internet Explorer, Notepad and Command Prompt. Just give it a try! Sursa
  21. Durban - The advancement of technology in the information and communication technology (ICT) sector has cost thousands of jobs in the past few years, the Communication Workers' Union (CWU) said on Monday. "In the past few years, Telkom had a workforce of 69 000, but now it has only 23 000 workers. There have been huge retrenchments in this sector," said CWU first deputy president Karthi Pillay. He was speaking during the union's conference in Durban, which started on Monday. Pillay said job losses were mainly due to the advancement of technology in the ICT sector. "We call on these corporations to make sure that they avoid retrenchments. Those who have been retrenched have to be retrained and opportunities be created for them," he said. The union was also worried that the vacancy rate was high at the Society and Network for Technology in Education through Collaboration (Santec). "Bad management at Santec is also a major problem," said Pillay. African National Congress (ANC) secretary general Gwede Mantashe and Congress of SA Trade Unions general secretary Zwelinzima Vavi are expected to address the delegates. The conference ends on Wednesday. - SAPA Sursa
  22. Sursa? http://rstcenter.com/forum/30853-cum-au-furat-hackerii-24-de-milioane-de-euro-de-la-holcim.rst
  23. pentru ce versiune de CS?
  24. http://rstcenter.com/forum/30855-search-engine-sumbitter.rst http://siteexplorer.search.yahoo.com/
×
×
  • Create New...