Friday 5 August 2011

Hack Attack: How to set up a personal home Subversion server

Subversion is open source version control software used primarily by developers that keeps every revision of important, frequently changing files. However, Subversion can be useful for many different purposes, whether you're a web developer or a novelist - especially if you like to work in plain text.
Think of Subversion as a wiki-like repository for your files. Each time you make a change to a file or group of files that you're happy with, you can commit those changes to your Subversion repository. If you don't like where the changes got you, Subversion can compare your current version with any previously-committed version and pick out the best of the best so you never have to worry about finding your way back to a good or working version of a file.


In this first of my two-part Subversion series, I'll show you how to set up and run your own Subversion server. Next week, we'll get into the nitty gritty of using Subversion.

Breaking into the Vault (a Look Inside the new HP Data Vault)

The new HP Data Vault is really nothing more than a rebranding of the HP MediaSmart Server targeted at the SoHo market (which I think it's a great idea). So it's no surprise that the hardware will be pretty much the same as well, but let's take a look anyway shall we? As the case is identical to the MediaSmart Servers, this means the standard disassembly instructions work here as well.
The layout looks virtually identical to all of the HP MediaSmart Sever mainboards going way back to the EX470. You'll find the processor up front, the chipset behind that and the RAM on the left; when looking from the front (click on image below to enlarge).

image

Why Hackers Write Computer Viruses

http://www.gamesuncovered.com/uploads/2009/06/01/hacker-evolution4-201535.png


Why do hackers hack? Why create a worm that sends out an email to everyone in your contact list, or a Trojan that deletes your term papers? Is it mischief, malice, money, or something else entirely?
This is the question that was on my mind when I met with Mikko Hypponen, a legendary computer security heavyweight who has been hunting viruses for 25 years—since Brain.a, the first PC computer virus.
From the plaza, I walked out to a seat by the water facing the San Francisco Bay. Hypponen was there, waiting for me. I sat down next to him. I felt like we needed code phrases.
"What makes this a New Orleans iced coffee," he asked, as he accepted his drink.
"It's the chicory," I replied.
"Did you know the Finns drink more coffee per capita than any other nation?"
"I did know that," I replied. "I know a lot about coffee."
Okay! I guess we had our code phrases after all.
Hypponen is the lead security researcher for F-Secure in Finland. His takedowns and diagnosis include some of the nastiest, biggest computer viruses out there: Sobig.F, Sasser, Storm Worm. PC World called him one of the 50 most important people on the Web. Hypponen was on his way to a black hat conference in Las Vegas.
We met at the Ferry Plaza in San Francisco, sitting by the pier as commuter boats came and went. I wanted to ask him about the long history of personal computer viruses, now in their 25th year, from the simple to Stuxnet, and the shifting motivations that inspire virus writers to act. We had an hour.

Protect yourself from the Conficker Worm virus

The Conficker worm is a computer worm that can infect your computer and spread itself to other computers across a network automatically, without human interaction.
If you are an IT professional, please visit Conficker Worm: Help Protect Windows from Conficker.
On This Page

ETB

 

Saturday 30 July 2011

YouTube Thus Winners To Be More Aggressive in the Field of Media

Never admit you're very familiar with the virtual world if not to know the big names Youtube. Yes, the online streaming video provider is not yet at the time of ride which leaves so many people strive to show videos on the website. But even if no longer be at the apex of the media, does not mean the Youtube lost her mind to continue the struggle to expand service.

http://success.hubspot.com/Portals/993/images/youtube-logo.png

Get ready, There Danger Lurking Hostpot Network Commercial Not Safe!

You often use the public hotspot network service? Are you more interested in the access with a password (key) or open (free)? Hm, it seems you now need to be careful when using public hotspot service without a password (free). The reason is based on a national survey conducted by USA Today said that currently there are about 32% of people surveyed in the United States recognizes that the services they use Wi-Fi hotspots are not given a password or key by the provider. That way they can be copied directly into and use the Wi-Fi network services without verifying it first.


http://www.wi-fi.org/images/logo_abgn_final.jpg