Hello mates! Long time...
So now I have a child who is studying motion graphics and I have not been in the PC building scene for a while.
She spec'd this out and I wanted to get your pro feedback.
Much appreciated.
CPU: Intel Core i9-10900K 3.7 GHz 10-Core Processor ($529.99 @ Best Buy)
CPU...
yeah i can get 64bit key.
yo, so here is what I got now, whatcha think?
- Case COOLER MASTER HAF 922 RC-922M-KKN1-GP Black Steel + Plastic and Mesh Bezel ATX Mid Tower Computer Case $102.99
- Mobo ASUS P8Z68-V LE LGA 1155 Intel Z68 HDMI SATA 6Gb/s USB 3.0 ATX Intel Motherboard with UEFI...
Thnx E4g1e for you info. I didnt even look for onboard video, so I just removed the Geforce.
I can use the onboard video. This is basically going to be just a webcasting and potentially video encoding system
Sorry here are some answers. Im noob here getting back into building systems.
1) What will you be doing with this PC? Gaming? Photoshop? Web browsing? etc
Using custom app to stream live broadcasts of church meetings to 4 or 5 regionally remote locations.
2) What's your budget? Are tax...
What you think of this build?
- COOLER MASTER HAF 922 RC-922M-KKN1-GP Black Steel + Plastic and Mesh Bezel ATX Mid Tower Computer Case
- ASUS P8Z68-V LE LGA 1155 Intel Z68 HDMI SATA 6Gb/s USB 3.0 ATX Intel Motherboard with UEFI BIOS
- Intel Core i7-2600K Sandy Bridge 3.4GHz (3.8GHz...
Hi
i got this computer im working on, the tech prior, locked it down hard. Bios pw(bypassed), AV uninstall pw(bypassed), didnt know admin password(cracked).
the one thing i couldnt do is the following.
they locked out the C:\ partition from me. i can install stuff, but cant explore the C...
have you tried any of the google search links?
http://www.google.com/search?aq=t&oq=awola+re&hl=en&safe=active&q=atwola+removal&btnG=Search
i havent had specific experience with this one.
If you had to scan a system to allow it on your network, and it had HIPS software installed, but the user didnt have admin rights to temporarily disable the HIPS agent for purposes of running the vulnerability scan, would you scan it anyways and if no vulns showed would you allow it on your...
http://www.buy.com/retail/product.asp?sku=206577939&adid=17654&dcaid=17653
this seems like a hella good deal for 89 bucks with google check out.
not sure what recertified is, a type of refurbishment? Actually yes, there is an explanation on the link. not a bad deal though
Arcsight!
lol
but for real, i dont know that you want to use syslog for this purpose, that is what a proxy server would be used for.
Let the router route, and the firewall/proxy filter. ;)
ok, then this is just for lower level certs like Security or Network +
I would say get a GIAC or CISSP, cert, but the materials cost would be too high.
So say for example you have a LAN. This lan is protected by border router and firewalls.
Now internal in the lan we have a department, we can call sales. It is separated from the Main Company Network and assets by an Internal Firewall.
Now obviously the main comany network and domain is...
I would knock on the door and tell them but I live in some apartments and have a neigbor above me, to the left and to the upper left. I dont know who they are. I guess I can knock on all 3 doors.
I know Arcsite is the big one.
Also Symantec has one.
Have you heard about NitroSecurity? That states they do Anomaly Detection, SIM, and Enterprise Management.
looks sweet.
http://www.nitrosecurity.com/media/
Do you guys use a SIM type product that gathers info from IPS, routers...
if you can ftp to other servers, I would say that its not the pix.
whats the kebreros dealio?
I would run a tcpdump on the firewall and see if there isnt any type of authentication traffic getting blocked. might be some config on the ftp server.
If you run smooothwall as your perimeter firewall I believe it comes with tcpdump.
you can run this command:
tcpdump -nnvpXi eth0 dst port 24224 -w 24224.text
where eth0 is you internal port. So if you see any traffic you know it is getting past your firewall. you can let that run and...
Lets see how this goes.
What do you think? What do you use for scanning websites for vulns like, sql inject, cross site scripting and other vulns.
You can have a firewall, but it will permit 80 and thats all that is needed.
I have eval'd SPI Dynamics and soon will eval Cenzic, after...
I actually had something similar happen to a different type of device for me.
Turns out I had a .255 default route, lol, misconfigured for the interface that was sending the acks. I fixed it with its appropriate default route and all was good.
in other words, i pinged one interface and got...
I am a network security guy so I want to load snort, metasploit, wireshark, and a whole slew of utilities for sniffing packets and analysis.
So I want 2 gb atleast
help a brotha out!
will you have each end of the hose go inside to your garage/house? so if in the case of condensation you may blow air down one of the ends and ensure all is good. :p