andLinux is a Linux distro with a difference. It’s based on a port of the the Linux kernel to Windows coupled with an X server and other software. In short, it allows you to run Linux software seamlessly on the Windows desktop without recompiling it or using a virtual machine.
For this overview, I choose the minimal/Xfce edition which comes in the form of a 200MB Windows .exe file. The kernel used is from the coLinux project. Apart from that, the bulk of the rest of the system consists of Ubuntu 9.04 coupled with the Xming X server and the PulseAudio audio system. File access is split into three parts: the root partition is stored in a .vdi file and files on the Windows partition can be accessed via either the coLinux filesystem or the Samba file sharing system. Make sure that filesharing is enabled on the Windows machine if you want to use it, by default, it isn’t. The installation contains a quite a few options, but I found that I was able to accept all of the defaults.
My old GPU (8600GS) took a nervous breakdown earlier , after watching a 911 documentary last night i powered down and had a good nights sleep , then on powering up this morning both my VDU’s were stuck in power saving mode, thats was a first for me so i set about troubleshooting, i began by swapping out DVI/HDMI cables but the symptoms persisted, i could get both VDU’s working via onboard GFX so i knew the problem was the GPU , i remembered a friend was selling a GPU so promptly picked up the phone to ask if it was still availible , i was pleased to hear it was as i could not live without my dual monitors i asked my friend to deliver it and we done the trade, I then set about instaling the new GPU and everything went well, so i thought id post a review on said card, it may be 3 years old tech but for me its easy the best card i have owned.
The GeForce 8 Series has been a very popular one for gamers, but there had always been a noticeable gap between the mainstream GeForce 8600 GTS and the higher-end GeForce 8800 GTS. This got worse when ATI introduced the Radeon HD 3850 and 3870 512MB tandem, which filled in nicely, and forced NVIDIA to make a move. The transition to a 65nm process allowed the debut of the GeForce 8800 GT reference cards, and these had an immediate impact.
But even a great gaming card can be made better, and companies like ASUS and Gigabyte have worked hard to differentiate their products from the rest of the pack, where only a sticker might separate one from the other. Some custom models offer enhanced features, such as voltage control, enhanced cooling or out-of-the-box overclocking, while others like the ASUS EN8800GT TOP 512MB card, offer a combination of these.
The attacks of Sept. 11, 2001 sparked a new urgency to predict future threats to the United States. And though the reviews of our physical security assets, geopolitical strategy, and intelligence gathering apparatus probably gathered the most headlines, the desire to better prepare the nation’s defenses didn’t stop there.
Security experts also drew attention to potential vulnerabilities in our digital infrastructure.
In an age of growing military and economic dependence on information technology connected by networked computers, there was a fear that we might someday experience a “digital 9/11” at the hands of terrorists, or worse, an even more devastating “digital Pearl Harbor” sneak attack by another country that might elude identification as the perpetrator thanks to the camouflage provided by cyberspace.
In the wake of the 9/11 attacks, academic papers, books, and Congressional reports were written on the topic of cyberterrorism. Prominent figures like Richard Clarke, the former White House “Terrorism Czar” and Special Advisor to the President on cybersecurity, voiced the opinion that the potential for massively disruptive cyber-attacks was real.
So with all that new attention being paid to computer security, and given the benefit of hindsight, how much did we get right in the days after 9/11 about the real cyber-threats that we face today? How much did we get wrong and what did we miss entirely? And perhaps most importantly, how well have we prepared ourselves for current and future attacks on our networked digital infrastructure in the decade since the attacks?
We asked some of the top minds in IT security to weigh in on those questions. Interestingly, what we found was that most of the experts agreed that one thing we got very wrong at the time was the conflation of threats to computer security with terrorism.
Computer pranks to freak out your friends and make them crying for mummy
1. Crash a Computer System With Nothing But a URL!
WARNING: CLICKING ON THE LINK BELLOW MAY CAUSE A CRASH! USE AT YOUR OWN RISK!
Half of businesses have lost sensitive or confidential information due to USB memory sticks, with many incidents involving those infected with malware.
Strategic Security Survey: Global Threat, Local Pain
(click image for larger view and for full slideshow)