Jump to content

VerdinaNET

Members
  • Posts

    55
  • Joined

  • Last visited

Everything posted by VerdinaNET

  1. Used to use steel series 4H but since there was no bass at all i changed to roccat kave with surround sound but not happy with them either. Right not i plug 5.1 surround speakers into receiver with DTS Neo from the motherboard and it's absolutely outstanding Recommending this setup:)
  2. How do you enjoy gaming guys ? Headphones, 5.1, 7.1 system ?
  3. Even better than the first one. I like well optimized games so that my gtx 780 can handle it well. Good puzzles, very fascinating gameplay and outstanding graphics.
  4. Including skype teams sounfs very good and useful. Communicating while working in large projects is very important. This surface PC sound also interesting for art people and designers. Some will buy it for sure.
  5. Smart, smart but where is the end of all this smart revolution. If something happens and internet disconnets it wouldn't be possible to fry some egs:)(figuratively speaking). I like smart gadgets of course but still trying not to stare at my phone every second when i don't have anything to do or just waiting for something. Even though, for good or bad, that's the future for sure.
  6. Hi guys, i am a fan of the game Crysis since the first one. There is being a while since third part is out and meybe fourth coming in 2017 ? What do you think ?
  7. Very good and optimized game. I like it very much. Quite intensive and hardcore gameplay.
  8. For fps improvement easiest way is better video card or meybe lower the details and filters:) Defragmenting and ccleaner activities are fine for general optimization. Nice one.
  9. Looks quite interesting and convinient. Another way of companies like apple to gain more and more control over our everyday life:)
  10. Don't know why but i don't like it. I see technology that is in at least 4 5 smartphones ( processor, ram, screen etc.) and that's my personal opinion but no waterproof The design doesn't grab me too:)
  11. As the iphone 7 came do you think there is point upgrading from last generation ?
  12. Depends a lot what are you going to use it for.
  13. Linux-operated botnet Distributed Denial of Service attacks surged in this year's second quarter, due to growing interest in targeting Chinese servers, according to a Kaspersky Lab report released this week. South Korea kept its top ranking for having the most command-and-control servers. Brazil, Italy and Israel ranked among the leaders behind South Korea for hosting C&C servers, according to Kaspersky Lab. DDoS attacks affected resources in 70 countries, with targets in China absorbing 77 percent of all attacks. Germany and Canada dropped out of the top 10 most-targeted countries, replaced by France and the Netherlands. The Linux server is the go-to platform for orchestrating DDoS attacks because of its latent vulnerabilities, said Charles King, principal analyst at Pund-IT. A common problem is that they are not protected by reliable security solutions. "That makes them prime targets for hackers, especially those that leverage C&C servers to centrally manage and carry out DDoS attacks," he told LinuxInsider. "Deploying leading security solutions, as well as utilizing and updating established Linux distros, can go a long way to protecting against these issues." Hardware to Protect All devices are vulnerable -- servers and desktops running any flavor of Linux, along with switches, routers, ADSL modems, wireless devices and cars. Internet of Things devices running embedded Linux also are vulnerable, said Oleg Kupreev, lead malware analyst at Kaspersky Lab. "The main reason is in most cases it is hard to update or reconfigure vulnerable software ASAP -- especially on highly loaded, critical servers -- or to update outdated software that is not supported by manufacturer devices," he told LinuxInsider. Companies that rely on Linux servers must protect them against this growing threat. For Linux servers, it is very important to harden, or tweak, the security of the system, Kupreev said. It's important to understand and implement SELinux, keep the software and the kernel up to date, and adopt a strong password policy, he explained. Attack Vectors It appears that nothing much is new about the methods hackers used in their recently stepped-up activities. "We don't see any changes in tactics. Brute-forcing passwords, exploiting common vulnerabilities in Web applications, hijacking or sniffing wireless communications -- these are old and well-known threats, said Kupreev. "Of course, each year we see some new threats, like remote-controlled cars -- but it's not a trend, it's just a reality." SYN DDoS, TCP DDoS and HTTP DDoS remained the most common attack scenarios in the second quarter, according to Kasperky's report. The share of attacks from Linux botnets almost doubled, to 70 percent. The proportion of attacks using the SYN DDoS method increased 1.4 times, compared with the previous quarter, accounting for 76 percent. For the first time, there was an imbalance between the activities of Linux-based and Windows-based DDoS bots, based on the report's findings. Linux bots are the most effective tool for SYN-DDoS. "Linux is becoming more commonplace and is used in most embedded systems," noted John McCarty, CISSP and senior security consultant at AsTech Consulting. "These implementations often are not hardened or patched and upgraded regularly, which has led to these systems being compromised and becoming a part of a botnet," he told LinuxInsider. Time Matters Too The duration of the DDoS attacks has increased, Kaspersky's report shows. For instance, the proportion of attacks that lasted for up to four hours fell from 68 percent in the first quarter of this year to 60 percent in the second quarter. The proportion of longer attacks grew considerably. Those lasting 20-49 hours accounted for 9 percent (4 percent in Q1) and those lasting 50-99 hours accounted for 4 percent (1 percent in Q1). The longest DDoS attack in Q2 2016 lasted 291 hours (12 days), a significant increase from Q1's longest attack, which was eight days. Contributing Factors Linux can be an extremely secure operating system, according to AsTech's McCarty. When it is properly configured and locked down, Linux can be hardened to withstand many of the current exploits and attacks. "However, this reputation can lead to some administrators feeling that these systems are inherently secure and do not need the level of configuration and attention necessary to protect the systems from attack," he said. Another factor that encourages hackers to exploit Linux loopholes is the lack of security professionals and security software to maintain systems properly, said Dodi Glenn, vice president of cybersecurity at PC Pitstop. "These systems usually host services, which can be used to reflect malicious activities," he told LinuxInsider. Linux is not inherently insecure, and it has become ubiquitous, observed Weston Henry, website security research analyst at SiteLock. "The number of cloud servers and devices running Linux/BusyBox online with security as an afterthought may lead to insecure devices and services," he told LinuxInsider. Treating the Cause Companies must ensure they are hiring the right people to maintain the Linux systems, said PC Pitstop's Glenn, and proactive security is key. "When securing these systems, create a baseline of the system or a profile of the system, noting its usage of resources in normal operation modes," he advised. Organizations using Linux should ensure the systems are patched, securely configured and hardened, so that unnecessary services and applications are not running or even installed on them. It would help to toss in an intrusion prevention system and next-generation firewall as well. "This will help minimize the overall attack surface of these systems, limiting the ability of a hacker to take over the system and use it within a botnet or for any other purpose," said McCarty. DDoS attacks still seem to be about quashing competition -- from online gaming and gold farming sites in the past to bitcoin sites now, noted SiteLock's Henry. The uptick in Linux botnets stems partly from the stated router and set-top box compromises. "A decreased barrier to entry into cloud servers and services may also add to the vulnerable pool," he said. "Consider security during system design. That is, design security into the system instead of adding it on after deployment." Other steps to take prior to launch, according to Henry, include assessing network and hosting services for DDoS robustness; beginning a relationship with a DDoS mitigation service; having a DDoS mitigation plan in place; and using a robust content delivery network to take any initial brunt. Source:http://www.technewsworld.com/
  14. When developing business I believe every enterpreneur need to do his best. Do you think webinars are important part of development and do you personally often participate in webinars? According to you free or paid webinars is better.
  15. Today I'm listening some Michael Jackson's songs
  16. We differ with fast, secure, reliable servers; powerful dedicated hosting on enterprise hardware; experienced, kind and responsive support 24/7.
  17. Graphics card maker EVGA isn't a company that lets anopportunity go to waste, and it seized advantage of a doozy after TechPowerUp and other sites outed Asus and MSI over GeForce GTX 1080 review sample shenanigans. On Tuesday, EVGA sent out a graphic to press stating that it does not deliver graphics cards with tweaked clockspeeds to reviewers. “With EVGA,” the company said. “What you see is what you get.” What it’s all about The whole controversy started on Thursday of last week. TechPowerUp reported that both Asus and MSI sent the hardware-focused site graphics cards set to run slightly faster than what you’d get from a retail store. The hope, obviously, was that Asus and MSI would see better reviews for their products and get an edge over the competition. The companies also had an excuse for the tweaked clock speeds, since customers could easily get the same speeds the reviewers were seeing. All they had to do was flip a setting in the special software that comes with each new graphics card. MSI has a software package called MSI Gaming, while Asus offers GPU Tweak II. These graphics cards come with three basic clock settings that users can easily manipulate: gaming mode, OC (“overclock”) mode, and silent mode. The first is the standard retail setting that most of us see when we open those glorious boxes housing a new gateway to gaming joy. Silent mode runs the slowest of the three since it puts the card at reference clock speeds. OC mode, meanwhile, squeezes a little more performance out of the card. TechPowerUp said it received cards set to OC mode, meaning they given review samples set to a profile that offers more performance than what buyers actually receive in stores. Soon after that initial report, PC Perspective agreed this was a bad practice on the part of the companies. But PC Perspective also pointed out that the difference in speeds might result in about a one percent performance improvement overall. (What did you expect for a quick, one-click tweak?) Nevertheless, TechPowerUp argues that even a small performance gain provides an unfair advantage. That small boost could, in fact, be the deciding factor for gamers looking to squeeze every ounce of performance they can from a specific graphics card. Asus confirmed to PC Perspective that it does send its cards to reviewers in OC Mode in order to showcase the card’s maximum performance. Why this matters: Technically, both companies can say the cards sent to reviewers and to retail stores are the same since they only tweak a factory setting. The marginal improvement in clock speed is also easily obtained by consumers if they enable the right profile for their card. Nevertheless, companies shouldn’t send reviewers a product that doesn’t match what consumers get, right down to the factory settings. That’s especially important for graphics cards reviews where many readers skip right to the benchmarks to compare numbers. Source: http://www.itnews.com/article/3086303/hardware/
  18. I want to download some more wordpress social media plugins, but I'm still wondering what to choose . According to you what are the best ones?
  19. Microsoft this week released the second upgrade for Office 365 commercial subscribers on the slow train, and warned those still running the original Office 2016 applications that they have four more months before they will be required to update. Alongside a large number of Windows security updates issued Tuesday, Microsoft also released build 1602 of the Office apps to corporate Office 365 subscribers who hew to the "Deferred Channel" track. Deferred Channel is the slower of the two main release tracks Microsoft established for Office 365. (Until February, it was called "Current Branch for Business" to match the name of a slow release track for Windows 10.) Unlike the faster "Current Channel" (CC), which boasts monthly updates to the Office 2016 applications -- Word, Outlook, Excel and the like -- Deferred Channel (DC) only provides updates every four months. Consumers who subscribe to Office 365 Personal or Office 365 Home are on the CC track; they don't get a choice. IT administrators managing commercial Office 365 plans, such as Business Premium, E3 and E5, may select either CC or DC for some or all users. The slower pace of DC is designed to give organizations time to test the updates before deployment, and essentially sets those on the CC track as testers for DC customers. Microsoft follows the same practice with Windows 10, using consumers as a large test group to identify, and fix, flaws or compatibility issues, before the operating system's major upgrades reach the more important corporate customers. So far, Microsoft has issued two DC updates: One in February 2016, the second this month. The two were labeled 1509 and 1602, respectively. Build 1509 was the original release of the Office 2016 client applications, which, as its nomenclature indicated, was the original launch code shipped in September 2015 to consumers and companies on the Current Channel track. Office 365's applications are on an every-four-months schedule for DC, with updates slated to release in February, June and October of each year. The cadence is important for customers to remember because Microsoft has set rules for Office 365 subscribers who adopt DC. They may skip an update, but no more than one, sticking with an individual Office 2016 feature set for no longer than eight months. For example, those running 1509 -- again, the original versions of the Office 365 apps -- since February must apply 1602 or later by October. If they do not, the apps will no longer receive security patches and other fixes. "The existing Office 365 ProPlus version (1509) within the Deferred Channel will continue to be serviced for an additional four months," Amesh Mansukhani, a senior program manager on the Office engineering team, said in a post to a company blogTuesday. In October, the DC will receive the 1605 update, the same one issued to CC customers this week. The rolling release tempo for Office 365's Deferred Channel allows corporate customers to pass on one update. In this opening scenario, where DC users have been on 1509 since February, they will be allowed to skip 1602, but not both 1602and 1605. In October, they may upgrade to either 1602 or 1605. The former falls off the support list in February 2017, while the latter will be "serviced" -- to use Mansukhani's term -- until June 2017. Yes, it can be confusing. This story, "Microsoft starts clock ticking on Office 2016's first upgrade" was originally published by Computerworld. Source: http://www.infoworld.com/
  20. Apple on Monday kicked off its Worldwide Developers Conference with the biggest-ever release of its iOS mobile operating system. CEO Tim Cook called iOS 10, coming this fall, "gigantic" and "the mother of all releases." Among the new offerings in the upcoming version of iOS are more features in Messaging, all new designs for News, Music and Photos, and increased opportunities for developers to integrate their apps with Siri, Maps and Messages. "Long term, the most interesting thing is the fact that Apple opened up Siri and Messaging and Maps to developers to add to those services," said conference attendee Bob O'Donnell, chief analyst at Technalysis Research. "It reflects the way the world is moving. It's moving away from standalone apps and into integration with services," he told TechNewsWorld. "Apple is acknowledging that by opening these things up for other developers to provide add-on functionality for these services." Smarter QuickType The new iOS enhances the user experience at the lock screen and home screen with rich notifications, as well as interaction with apps through the expanded use of 3D touch. QuickType received an upgrade in the new iOS. "We're bringing Siri intelligence to the keyboard," Craig Federighi, Apple's senior vice president for software engineering, told the audience at the Bill Graham Civic Auditorium in San Francisco. QuickType has incorporated deep learning to produce more intelligent results and to react proactively to information on a screen, he explained. If someone sends you a message asking where you are, for instance, you may be prompted to send a map. The photo app in the new iOS is more robust with the addition of facial recognition, as well as scene and object identification. Advanced search techniques support a "memories" feature that automatically will scan your photos to create a montage and video of a past event. The Maps app in the new iOS, which Apple has opened to developers, will be more proactive. It not only will allow you to see traffic patterns ahead, but also will suggest alternative routes if it sees you're heading into a traffic jam. New Messaging Features Both the News and Music apps are redesigned in the new iOS, and a new Home app is included in the portfolio of native apps. Home acts as a hub for controlling all home accessories -- garage door, security camera, light dimmers and such. The new iOS adds voice mail transcription to its Phone app and numerous new features to Apple's messaging app, including rich links, easier insertion of photos and video into messages, and larger emojis. Messages also will display highlighted text that can be clicked for quick insertion of emojis. "Apple has added a ton of features for people who like to live in their messaging platforms, said conference attendee Patrick Moorhead. principal analyst at Moor Insights and Strategy. "That's particularly true in China, where they get into WeChat and they never want to leave," he told TechNewsWorld. Better Watch In addition to previewing the new iOS, Apple revealed changes in WatchOS, tvOS and its desktop operating system, renamed "MacOS." The new WatchOS improves the Apple Watch's performance and makes navigation and access to apps easier. "If the experience is as good as they showed on stage today, Apple could start selling a lot more watches," Moorhead said. Apple announced a number of channel additions to the new tvOS and a new single sign-on feature that eliminates the need to enter user credentials every time you access a service through Apple TV. It also announced an app that allows an iPhone to be used like an Apple TV remote, including access to Siri. The new MacOS Sierra provides access to both Siri and Apple Pay. It includes picture-in-picture video, a desktop everywhere feature for accessing a Mac's desktop across devices, and a universal clipboard that allows items to be cut and pasted across devices. "One of Apple's main goals in this year's WWDC keynote was to open developers' eyes to opportunities beyond the iPhone," said conference attendee Charles King, principal analyst at Pund-IT. "That's a critical issue, since faltering sales for smartphones -- including Apple's -- have got to be a prime concern among Apple developers," he told TechNewsWorld. "So we saw the company announce the integration of key phone technologies, like Siri and Apple Pay, in Mac desktops and laptops. That could spark new opportunities for developers," King noted. "Many of the other announcements -- the iOS updates, design fixes for Apple Music and Apple TV, and promises of software fixes that will make the Apple Watch more responsive -- were more in the line of necessary and often badly needed housekeeping," he said. "The main takeaway from the keynote is that Apple recognizes the value developers bring to the company's business, and will do all it can to keep them happy and profitable." Source: http://www.technewsworld.com/
×
×
  • Create New...