Jump to content

CyberAbc

Retired Staff
  • Content Count

    519
  • Donations

    $0.00 
  • Joined

  • Last visited

  • Days Won

    18

Everything posted by CyberAbc

  1. CyberAbc

    Sayin Howdy To Everyone

    welcome to our family Enjoy the touch Our helping hands always towards u
  2. Real story - Joshua Bell playing incognito in the metro station A man sat at a metro station in Washington DC and started to play the violin; it was a cold January morning. He played six Bach pieces for about 45 minutes. During that time, since it was rush hour, it was calculated that thousands of people went through the station, most of them on their way to work. Three minutes went by and a middle aged man noticed there was musician playing. He slowed his pace and stopped for a few seconds and then hurried up to meet his schedule. A minute later, the violinist received his first dollar tip: a woman threw the money in the till and without stopping continued to walk. A few minutes later, someone leaned against the wall to listen to him, but the man looked at his watch and started to walk again. Clearly he was late for work. The one who paid the most attention was a 3 year old boy. His mother tagged him along, hurried but the kid stopped to look at the violinist. Finally the mother pushed hard and the child continued to walk turning his head all the time. This action was repeated by several other children. All the parents, without exception, forced them to move on. In the 45 minutes the musician played, only 6 people stopped and stayed for a while. About 20 gave him money but continued to walk their normal pace. He collected $32. When he finished playing and silence took over, no one noticed it. No one applauded, nor was there any recognition. No one knew this but the violinist was Joshua Bell, one of the top musicians in the world. He played one of the most intricate pieces ever written,with a violin worth 3.5 million dollars. Two days before his playing in the subway, Joshua Bell sold out at a theater in Boston and the seats average $100. This is a real story. Joshua Bell playing incognito in the metro station was organized by the Washington Post as part of a social experiment about perception, taste and priorities of people. The outlines were: in a commonplace environment at an inappropriate hour: Do we perceive beauty? Do we stop to appreciate it? Do we recognize the talent in an unexpected context? One of the possible conclusions from this experience could be: If we do not have a moment to stop and listen to one of the best musicians in the world playing the best music ever written, how many other things are we missing? TRUE STORY !!!
  3. An annual list of the most commonly used passwords, a source of both humor and sadness to the human race, shows a change at the top for the first time in three years. SplashData, a maker of password management software, started analyzing passwords leaked by hackers in 2011 and for the first two years of its study found that "password" was the most commonly used password, ahead of "123456." How an epic blunder by Adobe could strengthen hand of password crackers Engineers flout universal taboo by encrypting 130 million pilfered passwords. The two switched places in 2013, according to the latest list released over the weekend. The new rankings were influenced by a hack on Adobe that revealed 130 million passwords protected only by reversible encryption. Security firm Stricture Consulting Group was able to reveal the top 100 passwords from the Adobe hack, and "123456" came in first by a long shot. Stricture found 1.91 million uses of "123456" compared to 446,162 uses of "123456789" and 345,834 uses of "password." Only 43,497 people used the password for Druidia's air shield and President Skroob's luggage. SplashData said it pulled from the Adobe list and others in making its top 25. The rankings were "compiled from files containing millions of stolen passwords posted online during the previous year," SplashData said in its announcement. The SplashData list isn't a carbon copy of the Adobe one, but the Adobe influence is clear, given that SplashData's 10th-most-common password is "adobe123." As for "123456" becoming the new king, that may be due more to SplashData having a better data set than any actual change in people's password use. The Adobe breach probably contained passwords used over multiple years, and in 2010 Symantec ranked "123456" ahead of "password" as the most commonly used password of all time. Regardless, the new SplashData list is a good reminder that many Internet users are practically begging to be hacked. If you know someone who fits this category, remind them that it's never too late to start using a password manager that can help create and securely store long, random passwords. Before we go, here is SplashData's list of the top 25 most common passwords in 2013:
  4. Hitachi drives crush competing models from Seagate and Western Digital when it comes to reliability, according to data from cloud backup provider Backblaze. Their collection of more than 27,000 consumer-grade drives indicated that the Hitachi drives have a sub-two percent annualized failure rate, compared to three to four percent for Western Digital models, and as high as 25 percent for some Seagate units. Hard drive manufacturers like to claim that their disks are extremely reliable. The main reliability measure used of hard disks is the mean time between failures (MTBF), and typically this is quoted as being somewhere between 100,000 and 1 million hours, or between 11 and 110 years. These failures are generally assumed to follow a so-called bathtub curve, with relatively high failure rates when the drive is new—"infant mortality," caused by manufacturing defects—and similarly when the drive nears the end of its useful life, but low failure rates in between. Data to actually support these beliefs, however, has always been a little scarce. Even when studies are published, the data within them is often anonymized. Backblaze's data names names and shows some big differences between the manufacturers. The Hitachi disks are consistent performers. The Seagate ones are not. Backblaze's data covers a range of drive models, capacities, and ages. In aggregate, the company has just under 40PB of Seagate storage, 36PB of Hitachi storage, and 2.6PB of Western Digital storage. The company has a few Samsung units (sold to Seagate in 2011) and Toshiba units, but too few to draw any meaningful conclusions. Even from the same manufacturer there are some big differences. The least reliable drives are 1.5TB Seagate Barracudas that are nearing four years old on average, with an astonishing 25.4 percent annual failure rate. The newest Seagate drives, 4TB models, have a much more reasonable 3.8 percent annual failure rate. The units from Hitachi prove a lot more consistent, with the oldest drives, 2TB units averaging about three years old, having a failure rate of 1.1 percent, and the newest, 4TB units, having a 1.5 percent annual failure rate. These numbers show just how useless the manufacturer's MTBF numbers can really be. Those 1.5TB Seagate drives are mostly split between two models. There are 539 model ST31500341AS Barracuda 7200.11 drives, which are specified by Seagate to have an annualized failure rate of 0.34 percent and an MTBF of 0.7 million hours, and there are 1929 model ST31500541AS Barracuda LP drives specified to have an AFR of 0.32 percent and an MTBF of 0.75 million hours. Backblaze recorded AFRs of 25.4 percent and 9.9 percent respectively; substantially worse than the spec sheet number. However, there's a big difference. Backblaze's drives are operated 24/7. They're powered on all the time and aren't spun down or put to sleep by the system software using them. Seagate's AFR and MTBF numbers assume that the drives are powered on for only 2,400 hours each year, but conversely are spun down and backed up either 10,000 times per year (for the Barracuda 7200.11 units) or 50,000 times a year (for the Barracuda LP models). Clearly, Seagate's usage model doesn't correspond at all to the way Backblaze uses the drives. These are consumer desktop drives, being used in a server scenario. However, it's not clear that Seagate's model corresponds very well with even desktop usage. For example, if you leave your desktop turned on 24/7, Seagate's MTBF number is irrelevant to you. If your desktop doesn't power down its hard drive when idle, Seagate's MTBF number is irrelevant to you. While there are sure to be some people who fit the assumptions, it's difficult to say that the specified MTBF actually represents typical usage. In contrast, the company's enterprise-oriented disks calculate their AFRs and MTBFs assuming 8760 powered-on hours per year—which is to say, 24/7 operation. Even these have constraints, though, as they assume that only a certain amount of I/O is performed each year; do more than this amount, and the life of the disk may again be shortened. In practice, it's likely that any large-scale collection of hard drive data is going to have these same discrepancies, leaving little good way to evaluate the accuracy of MTBF specs for desktop drives. The people using hard disks in bulk are going to be those operating data centers, not desktop systems. The use of consumer drives isn't unusual, due to their lower pricing, and clearly the drives do work well enough in servers. The Western Digital drives do show an early drop followed by a leveling out. The Seagates for some reason show a big dip at 20 months. Another feature of the Backblaze data is that it doesn't consistently show the bathtub curve. The Western Digital drives do appear to show a bathtub curve, with an initial burst of failures followed by long-term reliability, but neither the Seagate nor Hitachi drives appear to do the same. Though backups are always important, none of this means that owners of Seagate drives should crack open their PCs and rush to replace their drives. Backblaze notes that its conditions are pretty hostile. Two particular kinds of drives, Western Digital 3TB units and Seagate LP (low power) 2TB units, suffered extreme failure rates. However, the company believes that this is primarily due to the level of vibration in their drive cages which pack 45 disks into a 4U case, combined with both drives being energy-efficient models that aggressively spin down when not in use. These things are less likely to be an issue in regular desktop machines. Even with the higher failure rate, Backblaze says that it is still buying Seagate drives, as they're cost-effective for the company's RAID usage. It might not be best to run out and buy Hitachi drives for their reliability, either. Hitachi sold its drive business to Western Digital last year, and Western Digital subsequently sold the 3.5 inch drive division to Toshiba, and it's too soon to know whether this has had any impact on their longevity.
  5. A software developer who willingly pays about $80 a year for the registration of two domains was unwillingly "opted in" to another charge of $1,850, and it seems he's not alone. Brent Simmons received an e-mail from Network Solutions Chief Security Officer Geof Birchall stating that he was being automatically enrolled in a new security program called WebLock. "To help recapture the costs of maintaining this extra level of security for your account, your credit card will be billed $1,850 for the first year of service on the date your program goes live," according to the e-mail, which Simmons posted on his blog. "After that you will be billed $1,350 on every subsequent year from that date. If you wish to opt out of this program you may do so by calling us at 1-888-642-0265." (UPDATE: Web.com now says the program will be opt-in rather than opt-out. According to Domain Name Wire, which said the e-mail went to Simmons and 48 other customers, Web.com COO Jason Teichman said, “Every one of those customers is getting a call. It’s not our intention to enroll anyone in a program they don’t want.” Web.com planned to roll the program out to 30,000 customers overall but started by notifying just a few dozen "so we can crawl our way into it," Teichman said.) Simmons says he's been a Network Solutions customer since 1997 and pays about $40 a year, per domain, for two domains. He pays them only for domain registration, and not website hosting, he said. "I couldn’t believe that I’d been opted-in, without my permission, to any new product—and I was stunned when I saw how much it cost," he wrote. "And further surprised when I saw that I would have to make a phone call to deal with all this." It wasn't just a typo or a mistake. When Simmons asked if the e-mail was actually a slick phishing attempt, Network Solutions' verified Twitter account confirmed that it was real: We contacted Network Solutions' owner, Web.com, and were told we'd get a response this afternoon. The company has already confirmed that it's rolling out WebLock to its "top 1 percent" of customers, according to a statement published by Domain Name Wire. The Web.com statement reads: Web.com is rolling out enhanced security features for its high traffic, high visibility website customers (approximately 1 percent of Web.com’s customers). The company began communicating this service today to these customers. WebLock employs a multi-level authentication process which is designed to significantly decrease malicious domain hijacking. The security of our customers is a top priority and the reason we developed and are deploying this provisional program for these select customers. Again, WebLock is intended for the top 1 percent of Web.com’s customers who own some of the world’s most highly visible and valuable web properties. In today’s increasingly sophisticated and dangerous cyber environment, Web.com is taking proactive steps to get ahead of the game and protect its customers’ security as thoroughly, as possible. Verisign’s RegistryLock is a component of the WebLock Security Program. The e-mail to Simmons said WebLock's extra security is necessary "given the level of traffic to your website." Simmons told Ars that his blog got 2.3 million page requests in December, a typical amount. The e-mail to Simmons further reads: Starting at 9:00 AM EST on 2/4/2014 all of your domains will be protected via our WebLock Program. Here is how the program works: In order to make changes to your Domain Name's configuration settings you must be pre-registered as a Certified User. All requests for Domain Name configuration changes must be confirmed by an outbound call we make to a pre-registered authorized phone number you establish. A unique 9 digit PIN will be required when we call. A message alert will be sent to all Certified Users notifying the team which Certified User has made the request. In addition WebLock enrolled customers will have access to a 24/7 NOC and rapid response team in the event of any security issues. After Simmons complained on Twitter, the company told him it was "working to get you opted out." To that, one Twitter user responded, "And what about all the others like @brentsimmons presumably receiving the same message? This 'program' needs to go away, now." In any case, the $1,850 charge likely won't ever hit Simmons' credit card. He informed Network Solutions that "I’m just going to transfer my domains." UPDATE #2: We spoke with Web.com COO Jason Teichman and he gave us very much the same message the company had given to Domain Name Wire—that the e-mail was just a mistake and that the company never intended to automatically charge customers. Despite the fact that the e-mail specifically described the program as opt-out, Teichman said, "the program was never designed to be an opt-out program. That e-mail was poorly worded, but does not and has never reflected the intention of this program." Web.com has called most of the 49 people who received the e-mail today, and hopes to connect with all of them by tomorrow, he said. "No one has been billed for this product, and no one will be billed for this product unless they expressly consent to want the product," he said. Teichman said the security service was developed in response to customer concerns about high-profile domain name hijackings. So far, a "handful" of customers have said they are interesting in buying the service. "We are in very early days of this program," he said.
  6. Toshiba's purchase of bankrupt SSD manufacturer OCZ, announced last December, has been completed. The acquisition means that both OCZ's consumer and enterprise products will remain on the market. What was once OCZ Technology Group is now OCZ Storage Solutions, a wholly owned subsidiary of Toshiba. "Substantially all" of OCZ's assets are now owned by Toshiba, and OCZ will retain its headquarters in San Jose and its design centers in California, Israel, and the UK. The bankruptcy and subsequent sale appear to have done little to interrupt OCZ's operations. The company today announced the latest generation of Vertex-branded SSDs, the Vertex 460. The SATA disks are available in 120GB, 240GB, and 480GB capacities, with sequential read and write speeds of 545MBps and 525MBps, respectively; integrated AES-256 encryption; and an endurance of 20GB per day of writes for three years. According to OCZ's Ralph Schmidt, the company's bankruptcy came on the back of "credit issues," NAND flash supply problems, and increasing competitiveness in the SSD space. Spinning magnetic disks still retain the large majority of the storage market, but SSDs are predicted to represent a third of sales by 2017.
  7. Network and security experts are still trying to nail down the cause of an outage on Tuesday that briefly redirected huge amounts of China's Internet traffic to US destinations. The incident left a large portion of China's 500 million Internet users unable to visit websites ending in .com, .net, and .org. Requests for addresses ending in those top-level domains were instead sent to IP addresses operated by US-based Dynamic Internet Technology or, according to The New York Times, a 1,700-square-foot house in Cheyenne, Wyoming. Local officials in China said the incident was the result of a malfunction in the country's domain name system. They called on authorities to do more to protect China's DNS servers. US-based security researchers, however, said a DNS outage or hack was most likely not the cause. A public DNS server operated by Google returned the same faulty IP addresses generated by China's official servers, these researchers said. They pointed out that Dynamic Internet Technology operates services designed to circumvent China's censorship regime, which is often referred to as the Great Firewall of China (GFW). "They have to hack into GFW," researchers at GreatFire.org explained. "If they are indeed capable of doing that, they can accomplish so much more than messing the entire Chinese Internet up. A more likely explanation for Tuesday's outage is a glitch in the GFW that inadvertently routed all requests to Dynamic Internet Technology addresses instead of blocking them as Chinese officials had intended. There's still no working theory on what caused some traffic to be directed to Sophidea Incorporated, which is registered as being located in Cheyenne. The outage, which lasted for several hours on Tuesday morning, probably had the effect of a massive distributed denial-of-service attack on the US addresses on the receiving end of the redirected requests.
  8. After reports earlier this week that IBM was again shopping its x86 server unit around—including talks with Dell—Lenovo executives announced that they had reached an agreement with IBM to buy the business for a price of $2.3 billion. IBM will stay in the high-end server and mainframe business, focusing on its System Z and Power lines as well as its storage systems and specialized server appliances. Big Blue will hand over its System x, BladeCenter, and other x86-based server lines to Lenovo. Once the transaction is finalized, Lenovo will instantly become at least as large a server company as Dell, if not as large as HP. The deal with Lenovo may have been reached after IBM failed to find a better one. Last year's negotiations between the companies reportedly broke down after Lenovo offered under $2.5 billion for the unit, prompting IBM to walk away. While the exact offer Lenovo made in 2013 isn't known, today's deal certainly isn't for more than that. But on the upside for IBM, the transaction will mostly be in actual dollars: Lenovo will pay approximately $2 billion in cash, and the rest of the transaction will be paid for in Lenovo stock. Lenovo and IBM will also enter into a strategic partnership that will allow Lenovo to resell IBM’s storage and cloud computing systems as well as some of its software. And about 7,500 current IBM employees are expected to be hired by Lenovo worldwide. There’s no way to tell exactly how big IBM’s x86 server business is—the company does not break out the unit’s sales in its official accounting. But according to IDC figures, IBM had regained the top market share position in servers overall last year. And IBM’s x86 server sales make up about three-quarters of its overall server business—though not of its server profits. The deal puts Lenovo in a position to better compete with Hewlett-Packard and Dell in the enterprise market in a time when sales of notebook and desktop PCs are particularly soft. “We are confident that we can grow this business successfully for the long term, just as we have done with our worldwide PC business,” Lenovo chairman and CEO Yang Yuanqing said in an official statement on the acquisition. The deal also frees IBM from the last vestiges of its low-margin PC business and allows it to focus more on areas such as its Watson “cognitive computing” platform, cloud computing services, and lucrative consulting business. IBM sold Lenovo its desktop and notebook PC business in 2005.
  9. CyberAbc

    Hello to everyone

    welcome to our family
  10. CyberAbc

    Hello

    welcome to our family
  11. CyberAbc

    Hello

    welcome to our family
  12. CyberAbc

    Hi Folks

    welcome to our family
  13. CyberAbc

    hi all

    welcome to our family njoy
  14. CyberAbc

    Good evening to all

    welcome to our family njoy
  15. CyberAbc

    Hallo friends

    welcome to our family njoy
  16. CyberAbc

    Greetings

    welcome to our family njoy
  17. CyberAbc

    Howdy all

    welcome to our family njoy
  18. CyberAbc

    Hello from an Oldie, Newbie

    welcome to our family njoy
  19. CyberAbc

    hello...

    welcome to our family njoy
  20. CyberAbc

    Hi everyone

    welcome to our family njoy
  21. CyberAbc

    Hi everybody

    welcome to our family njoy
  22. CyberAbc

    Hi everyone.

    welcome to our family njoy
  23. bro from here u can download ur crack/serial/patch/game loader/keygen just virus free http://crackdb.org/ dont worry abt virus bro. its a virus free site
  24. CyberAbc

    Hello for down south.

    welcome to our family
  25. CyberAbc

    Well, helloooo.

    welcome to our family
×