Paul, this is crazy loud whine though. It's so irritating. Much louder than whiney PSUs I've had in the past. Plus...when the whine drops out, my FPS drops out with it. Like power delivery dips out or something. IDK. PSUs aren't my bag. Any recommendations?
[H[. I have a Corsair AX 1200 and a new EVGA 1000 g+. When I received my 2080ti, the Corsair would quite simply just shut down with it installed. I swapped over to an EVGA 1000 g+ and the issue stopped. However, the new EVGA power supply suffers from serious coil whine. Coil whine I can hear...
I agree to a point. Hard to secure laptops and equipment still running Windows ME, XP, NT, etc.. That being said... If a contracting company can't afford to employ SECURE systems / equipment then WHY FFS are they being selected to work in DoD / Gov facilities in the first place.
ALSO...
The Chinese Imperial Procrastination and Punishment Magistrate of the People's Republic of China deems video games as unproductive. You are deducted 500 points. Your social credit score is too low. All toilets locked.
You have urinated on yourself. You are deducted 500 points and have been...
Kyle's not the only [H] with a failed 2080ti. Mine bit the dust earlier this week. Slated for an RMA. Haven't heard back from Green Team on shipping yet. :( Hopefully they hold off on shipping mine until they can figure out what the flying f*** is wrong with their product.
Damn this thread blew up fast! Hopefully 3.3.5 is live when they take it f2p next week. It's really shaping up well. If you are even the slightest bit curious about it try it out... you've got nothing to lose. It's crazy what they have accomplished with it. The scale is impressive.
Not really. HTTP Pinning and Extended Validation is making headway on closing that window. Until it happens though.... If a Certificate Authority gets hijacked a threat actor could issue themselves a valid TLS cert by simply proving they own a given domain. BGP is a long, long way off from being...
Caught it on the network as two devices in one! Malicious network comms! Boards have implanted ships!
Oh my... So here's the thing. To look at these from a hardware implant level you have to do some very time consuming and expensive things:
1: This is the most important! ** THERE ARE NO...
Yeah. Not to mention...What protocol was used to send data back? Was a protocol used to send the data back? Where did the data go? How was command and control facilitated? How did this pass perimeter monitoring for so many huge environments without flagging? There ARE ways to provide good...
I never said nation state espionage doesn't bother me. I am saying that the story itself is missing key technical details it needs to pass my sniff test.
Just going to throw this out there. I am VERY skeptical of this report by Bloomberg. C2 comms have to occur. The data has to cross IDS / IPS to get home. I really want to see a technical write up on this before I pass judgement on SM.
Yeah, this one is interesting. Requires sleep mode to work. Would need physical access to the device. Rewriting the settings of the TCG chip to prevent memory overwrite is a novel approach...but overall, there are many different and easier ways to skin a cat.
This is true for most consumer grade printers for sure. Not true at all for commercial grade. Most service bureaus don't print giant dildos and infinity gauntlets. They print aerospace, automotive, gas and oil, infrastructure, robotics, and DoD related stuff. Defense companies do the same...
Yeah. Nation states and threat actors can monitor exit and entrance nodes and stitch the data together. Not so secure after that. Amongst other things.
You want horrendous... 75 people shot per weekend in South Chicago. Doesn't make the news though. Doesn't fit the narrative. Comparing the US to Europe is apples to oranges by the way. We sport more surface area than most of Europe combined and have population numbers that far surpass any...
Right, but what I'm saying is this. Deeplocker could hide malware in Discord. That version of Discord gets downloaded 20,000,000 times. Maybe it gets pushed as an update. The point being...Those versions of Discord will be completely benign. Nothing will be different until a trigger condition is...
Not exactly. You can change a malicious signature just by XORing some pointers...You don't neccessarily create a new variant when doing that as the functionality remains exactly the same. To boil it down even further... The payload doesn't matter as it is not actively producing a behavior on...
You can test your VPN on 3rd party websites to see if leaks are present. Some of them are much more secure than others. Theoretically, an ISP will see the connection from your real IP to the VPN provider and that's it. Is that always the case? No. Also, if someone really wants to track you...
There would have to be a mechanism in place to measure Speculative Execution and BP metrics and look for significant changes in trends. It would be behavioral. Not saying it's impossible. Just difficult. Very difficult.
From memory. Bandwidth is pretty low on these attacks, so it could take forever for them to find what they are looking for to begin with. That might improve over time though. Just too man unknowns right now to be absolutely sure.
The type of attack you mentioned would gain very little if no benefit from Spectre / Meltdown. If you want to look at crypto mining based attacks, I would suggest starting with Adylkuzz.