Jump to content

Visentinel

Member
  • Posts

    227
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    Australia

Everything posted by Visentinel

  1. This Ones a Poll on what we use but Doggie you have to use Nav Corp on Win2k3 I got a 500 Meg Iso of Nav Corp 8 Server+Client i'll live dude.. Ime Sure you will
  2. Harry Potter = HeHe Dun Like Harry :|
  3. Its Comming Together Nicely Tinker
  4. Display Properties / Settings tab / Advanced Button / TroubleShooting Tab / Drag Slider to Full Accell Start / Run / DXdiag / Display Tab / Enable the Accelleration
  5. Windows is Secure Its their Hotmail Software wellll Win2k3 is anyways
  6. Its been a while, and theres some New Ones on Deep Ice Wallpapers. I finnaly got the Gallery Back Online after Almost 4 Weeks DOwntime. I have GuiSkins to thank for the SPonsored WebSpace http://deep-ice.gotdns.com
  7. Anyone been to www.w00t.com There aint much to see ~edit www . w 00 t .com LOL @ the URL before
  8. This Ones a Poll on what we use but Doggie you have to use Nav Corp on Win2k3 I got a 500 Meg Iso of Nav Corp 8 Server+Client
  9. **Visentinel Adds the Source I forgot to add that lol
  10. Yeh i later noticed the Adam one was alrdy posted on here... but the other ones ive posted , i didint see them on the front page
  11. Worm? Trojan? Attack tool? Network administrators and security experts continue to search for the cause of an increasing amount of odd data that has been detected on the Internet. Security software firm Internet Security Systems (ISS) on Thursday declared victory, saying that a new hacker tool that scans for paths into public networks was responsible. But many other security professionals--including those at Intrusec, the company that originally tracked down the hard-to-find code--believe that ISS jumped the gun. The real culprit likely is still out there, said David J. Meltzer, founder and chief technology officer of Roswell, Ga.-based Intrusec. "It is possible that (the tool's code) is causing some of this traffic," Meltzer said. However, he added, key differences between the data that was captured by security professionals and data created by the code suggest that the hacker tool isn't the original culprit. "That would leave us to believe that there is something out there that is creating the (data) packets that isn't this Trojan." However, the security researcher hastened to add that the traffic seen by network administrators isn't ominous. It merely has piqued the curiosity of quite a few researchers. "I don't think it is a serious threat because it's not self-replicating," Meltzer said. "And it hasn't caused serious disruptions to anyone." Since mid-May, security researchers and network administrators have tried to track down the source of odd traffic that they have been seeing on their networks. The data frequently attempted to connect to nonexistent servers or to services not offered by existing servers. The only common thread seemed to be that the data packet had a window size of 55,808 bytes and, in many cases, came from a nonexistent Internet address. The window size is a parameter used by TCP/IP networks to specify the amount of data, in bytes, that devices can send without receiving an acknowledgment from the receiver. The parameter, normally set by the operating system, can make a network more reliable, if set to a lower number of bytes, or faster when long delays are present, if set to a high number of bytes. Typically, when first connecting to another computer, a device on the Internet will use a lower window size--say, 1,024 bytes. "None of the operating systems are going to start with a window size of that (55,808 bytes) size," said Joe Stewart, senior intrusion analyst with managed security service provider LURHQ (pronouced "lurk"), who also did a significant amount of analysis on the strange traffic. In late May, Stewart detected a computer trying to connect to a nonexistent computer on the company's network. The only problem with the traffic was that its supposed source was from an Internet address that couldn't exist; the Internet Assigned Numbers Authority, or IANA, had reserved the block of addresses that contained the number, so no Internet router would have forwarded such data. While such an Internet address in the source field of a data packet will often be transmitted by less vigilant Internet service providers, almost no provider would forward data that had such an address in the destination field. So, while the analyst had seen more than 900 such attempts to connect to a server on his network, he could not track the data back. "It could be a broken scanner or someone trying to map the address space," Stewart said. "I don't think people have really nailed down what was the source of this." ISS believes the code given to the company by Intrusec is responsible. "We feel that a significant portion of the traffic is caused by this code," said Dan Ingevaldson, engineering manager for ISS's incident response team. Previous traffic that doesn't match the current code's data patterns may have been caused by an earlier variant of the code, he said. Theories abound about what the code does. Some people initially believed the data was sent by a worm that used the Internet relay chat (IRC) system, a precursor to the popular instant-messaging networks, to communicate. Others thought that the data had been a low-level denial-of-service attack. Security firm Network Associates classified the code as a worm, which it dubbed W32/Randex.c. However, the most current theory based on analysis of the code seems to indicate that what Intrusec found is a scanner and attack tool that communicates by sending out information to random addresses hoping that another computer infected with the program would be at the other end. The code has so many bugs, however, that it hasn't worked properly. "It is very buggy," Ingevaldson said. "It didn't even write information to its data file correctly." Even if it didn't have flaws, the program would have a tough time working. While it hides the location of the sender and receiver, the technique of broadcasting out data to essentially anybody on the Internet is inefficient at best. LURHQ's Stewart believes the code that has been found is a research effort by some anonymous would-be attacker. However, he's not so sure that something else isn't out there. "Until someone comes up with analysis that matches what I am seeing, I'm going to wait," he said. Source: News.com
  12. A bill introduced in Congress on Thursday would put federal agents in the business of investigating and prosecuting copyright violations, including online swapping of copyrighted works. HR-2517, the Piracy Deterrence and Education Act of 2003, instructs the FBI to develop a program to deter online traffic of copyrighted material. The bureau would also develop a warning, with the FBI seal, that copyright holders could issue to suspected violators. And the bureau would encourage sharing of information on suspected copyright violations among law enforcement, copyright owners and ISPs (Internet service providers). The bill bears the names of two legislators who have been prominent on intellectual property and copyright issues--Reps. Lamar Smith, R-Texas, and Howard Berman, D-Calif. Berman gained attention last year with a bill that would have allowed copyright holders to hack into peer-to-peer networks believed to be distributing protected materials. The new bill also calls for the Department of Justice to hire agents trained to deal with computer hacking and intellectual-property issues, and it requires the Attorney General, in conjunction with the departments of Education and Commerce, to develop programs to educate the public on copyright issues. A lawyer with the Electronic Frontier Foundation said the bill includes a number of troubling aspects, particularly the blurring of distinctions between official prosecution of criminal acts and civil enforcement of copyright provisions. "It's doing a bunch of things to get the FBI more involved with private enforcement of intellectual-property rights," said Wendy Seltzer, staff attorney for the EFF. "It gives them a chance to scare a lot of users into thinking the government is after them." Seltzer said the provision for ISPs to cooperate with police and copyright holders is particularly troubling from a privacy standpoint. "That would probably authorize them to tell ISPs, 'You also need to give information on users to the RIAA (the Recording Industry Association of America) whenever they ask,'" she said. The RIAA and the Motion Picture Association of America applauded the bill. "The Smith-Berman legislation will strengthen the hand of the FBI and other federal law enforcement officials to address the rampant copyright infringement occurring on peer-to-peer networks," Cary Sherman, president of the RIAA, said in a statement. "This common sense, bipartisan bill will help ensure that federal prosecutors across the country have the resources and expertise to fully enforce the copyright laws on the books--especially against those who illegally distribute massive quantities of copyrighted music online." The bill comes just days after Sen. Orrin Hatch, R-Utah, raised alarm by suggesting that copyright holders should be allowed to remotely destroy the PCs of music pirates. news.com
  13. Intel is expected to announce a 3.2GHz Pentium 4 on Monday at $637 a pop. And it is believed that ATI will unveil its latest Pentium 4 chipsets on the same day. The new processor will support a 200MHz frontside bus quad-pumped for an effective 800MHz frequency. It will contain 512KB of on-die L2 cache and be produced using a 0.13 micron fabrication process. Its price should put the new P4 well above the current top-of-the-range model, the 3GHz chip, which is priced at $437, according to Intel's most recent price list. Prices for either chip and the rest of the P4 range are not expected to fall until October, just ahead of the launch of Prescott, Intel's next generation of Pentium processor. ATI is expected to announce its RS300, RS300VE and possibly the RS300M chipsets on 23 June. Officially, the company has said it will release P4 chipsets - branded as Radeon IGP - in the summer, but a Goldman Sachs analyst recently said he believed the products would be launched this month. Timing its own launch to coincide with the Intel announcement is an obvious move. The RS300 supports the P4's 800MHz FSB and HyperThreading, offers dual-channel DDR 400 SDRAM support, and integrates DirectX 8.1 graphics courtesy of a built-in Radeon 9000 core. The chipset is believed to offer Serial ATA, 10/100Mbps Ethernet and support for six USB 2.0 ports, plus six-channel audio. The RS300VE is a lower cost product that supports only single-channel DDR. All other features are expected to match the RS300. What the RS300M offers that the RS300/RS300VE don't (or vice versa) isn't known. However, it is suspected that the RS300M may be intended to operate with Intel's Pentium M processor, aka Banias. ® The Register
  14. In an email from Jackson Shaw (Product Manager of Directory Services/Identity Management in Microsoft Windows Server Marketing), Shaw announced the final release of Active Directory Application Mode (ADAM). "In the next few weeks we will be announcing the formal release of ADAM. We are encouraging ISVs, like you, to announce your support for ADAM at the same time that we issue our press release regarding the availability of ADAM.". Active Directory Application Mode (ADAM) is one of the new capabilities that are part of Microsoft's fully integrated directory service available with Windows Server 2003. Organizations, independent software vendors, and developers who want to integrate their applications with a directory service now have an additional capability within Active Directory that provides numerous benefits. MS Adam Info N***** Unable to Post Source, Board Filters
  15. The Second one looks abit better imo ..
  16. I wish thayd hurry up and allocate the case
  17. You can use the 1337 version of g00gle.. then it will work fine heHe
  18. Yep .. Nothing Beats Those in Real Flesh (Its a Forum .. so its not in real flesh)
  19. the corrections can be usefull Like when u make a zpelling 3rror..
  20. Something f***ed up .. And ime getting Flamed
×
×
  • Create New...