mudmanc4

Moderators
  • Content count

    14,248
  • Joined

  • Last visited

  • Speed Test

    My Results

2 Followers

About mudmanc4

  • Rank
    TMN Seasoned Veteran
  • Birthday January 01

Contact Methods

  • AIM mudmanc4
  • MSN mudmanc4
  • Website URL http://lime-it.us
  • ICQ 330539369
  • Yahoo mudmanc4
  • Skype mudmanc4

Profile Information

  • Gender Male
  • Location In The Plex

Recent Profile Visitors

68,750 profile views
  1. Jason You car is not a mechanical device. Nope. Your car is “probably the most complex distributed system that you personally own,” Professor Stefan Savage explained earlier this month in a talk at USENIX Enigma 2016 entitled “Modern Automotive Security: History, Disclosure, and Consequences“.   This is why: This are the basic computing features of most any car purchased in the last 5 years. But the computerization of cars began 45-years ago with the advent of the airbag. A typical automobile network is now vastly most complex than what most of us have in our homes.   And there’s a good chance that your “off-the-shelf, unmodified sedan” could be compromised by a third party. “Compromised” as in your brakes could remotely be made useless, as Professor Savage did for this episode of 60 Minutes. The answer to these problems isn’t simply “hire better people and it will all be better,” Savage explained. Cars are vulnerable for a lot of reasons — including the security problems emerging in much of the Internet of Things. Savage calls it “a huge amount of pressure on feature creation.” Often, in the rush to add functionality, security is often not considered or actively ignored.   Additionally, there are underlying issues with code ownership and laws that deny even security researchers access to internal workings of car software. “The thing that parents need to know about smart toys is that they’re new terrain for parents and children, but also manufacturers,” our security advisor Sean Sullivan told Newsweek. And his critique of the connected toys industry is certainly true of the computing revolution that’s been going on inside our cars over the past decade. From OnStar to keyless entry to electric car charging station, two-way digital communication makes vulnerabilities likely if not inevitable.   Car companies seem to have changed their approach and heightened their concern for security after the Jeep hack last summer, which led to the recall of more than a million Chrysler automobiles. But recalls aren’t a very effective way to update cars, given the large percentage of owners who just won’t bring their cars in unless they stop working.   Savage told the story of a vulnerability his team discovered in Generation 8 OnStar units that they decided not to disclose based on the low rediscovery risk. Five years later it came out that GM had updated all of the units even though Generation 8 OnStar “has no ability to do remote updates.” So what happened? “I’m not saying that GM hacked millions of its own cars…” Savage mused. “But something happened.”   Source
  2. Jenna McLaughlin Feb. 11 2016, 7:00 a.m. If the U.S. government tries to strong-arm American companies into ending the sale of products or applications with unbreakable encryption, the technology won’t disappear, a group of researchers conclude in a new report. It would still be widely available elsewhere. Some U.S. law enforcement officials argue that unbreakable encryption is interfering with legal surveillance of suspected criminals and terrorists. And some members of Congress are pushing for a nationwide requirement that encryption allow for law-enforcement access. But the three researchers — Bruce Schneier, a cryptologist and fellow at the Berkman Center for Internet & Society, Kathleen Seidel, an independent researcher, and Saranya Vijayakumar of Harvard — compiled a list of at least 865 hardware and software encryption products available in 55 different countries. More than 500 of them come from outside of the United States. “The report calls into question the efficacy of any U.S. mandates forcing backdoors for law-enforcement access. Anyone who wants to avoid U.S. surveillance will have 546 competing products to choose from,” Schneier wrote in a press release. “Any U.S.-only restrictions will adversely affect U.S. companies in this worldwide market,” he continued. “Criminals and terrorists will switch to more secure foreign alternatives, and the people who will be most affected are the innocent Internet users who don’t know enough to use non-backdoored alternatives,” he wrote. It’s not entirely clear which overseas encryption products are truly unbreakable, and which have been compromised by government surveillance backdoors. Even so, Schneier and his co-authors insist that “cryptography is very much a worldwide academic discipline” and “there is no reason to believe that foreign-designed or foreign-developed encryption products are any worse (or better) than their U.S. counterparts.” Source
  3. Read it for yourself in the TOS https://aws.amazon.com/service-terms/
  4. Looking for help in diagnosing slow upload speeds

    Haha, sorry not funny, but geezus!   Rather than adding a basic switch,  dropping a line through the attic, or crawl even duct,  and doing what you wish at the other end, they wanted to add a secondary drop? Do it, of course there should be no fee lol
  5. 8Mbps download speed on 150Mbps connection?

    You might want to head over to http://testmy.net/mirror and pick the California servers. You've been testing to Dallas, which is fine, but from what you are explaining, it's obvious the tests you were taking at the other place, are not telling the complete story.    
  6. Google Safe Browsing Updated

    Posted by Lucas Ballard, Safe Browsing Team In November, we announced that Safe Browsing would protect you from social engineering attacks - deceptive tactics that try to trick you into doing something dangerous, like installing unwanted software or revealing your personal information (for example, passwords, phone numbers, or credit cards). You may have encountered social engineering in a deceptive download button, or an image ad that falsely claims your system is out of date. Today, we’re expanding Safe Browsing protection to protect you from such deceptive embedded content, like social engineering ads. Consistent with the social engineering policy we announced in November, embedded content (like ads) on a web page will be considered social engineering when they either:   Pretend to act, or look and feel, like a trusted entity — like your own device or browser, or the website itself.  Try to trick you into doing something you’d only do for a trusted entity — like sharing a password or calling tech support.   Below are some examples of deceptive content, shown via ads: This image claims that your software is out-of-date to trick you into clicking “update”.    This image mimics a dialogue from the FLV software developer -- but it does not actually originate from this developer.   These buttons seem like they will produce content that relate to the site (like a TV show or sports video stream) by mimicking the site’s look and feel. They are often not distinguishable from the rest of the page.   Our fight against unwanted software and social engineering is still just beginning. We'll continue to improve Google's Safe Browsing protection to help more people stay safe online.   Will my site be affected?   If visitors to your web site consistently see social engineering content, Google Safe Browsing may warn users when they visit the site. If your site is flagged for containing social engineering content, you should troubleshoot with Search Console. Check out our social engineering help for webmasters.
  7. How to  import an existing OpenVZ container into a running OpenVZ container?   Not doable as I understand. Yet there must be a way to take one virtual server dump and get it running in a completely different instance. Not having control over the HW node itself.   The cruft of it all if you think it will help:    
  8. iphone results waaaayyy better than pc(cable connection)

    Are any of the results within your database here at testmy.net, results just after the HDD format, before installing steam and other applications?
  9. MOIDEEN C PARAMBIL

    Hi Moidcher,  Not being familiar with the web interface of this router:  You'll have to find where to set a subnet reservation, out of the DCHP pool range. Leaving plenty for DCHP to start with. If the default is say 192.168.1.1, the assign a pool to 192.168.1.100-254 ; this way you have  ~98 static IP addresses, and  ~156 for the DHCP, you could set it where you wish. Though, it appears as if this router may handle the specific reservations setting itself. As pictured below.   For the second router, you could turn off DHCP, assign the second router a static IP within the range of of lose DHCP addresses on the first router (that is if you intend on accessing the second router itself for any reason after initial configuration)   Otherwise, on the second router the more simply way would be to leave DHCP on the WAN set, and turn off the internal DHCP itself, and allow the first router to manage everything. On the second router, plug the cat5 into theWAN LAN, and connect this to a LAN port on the first router.   Here is the manual itself: http://www.dlink.com/-/media/Consumer_Products/DIR/DIR%20850L/Manual/DIR850LA1manual041913v10US.pdf
  10. removing test results from old Is ISP

    Hey that is awesome, I read what I could find in the time I had and how they were planning on getting rid of the cap they stated after the buyout. It's great they chose to leave it open. When I was with them there was no cap, I only heard from them if I went a bit wild and popped up in there 'high percentage of usage'. Even then they never penalized me for it.
  11. Speed test

      Hello Farhad,  You can view your test results here: http://testmy.net/quickstats/Farhad%20Lahijhonie   From there you can share results :   Just click 'share' then chose which way you would like to share them:     This will open a dialog with the code to copy, and paste wherever you wish: I chose 'Copy 4 Forums' :   Then highlight or copy the code, and paste it into the forum of your choice.  
  12. Best Free Anti-Virus

    Hey it's all good. That's why we have threads that last so long
  13. Best Free Anti-Virus

    Well then, bringing a post back to life from 2008, nice
  14. removing test results from old Is ISP

    I was just having a look at this myself   Not to mention the TWC cap will certainly be costly at some point. With Buckeye, after the cap is hit, it's ten bucks per 10 gig.   From what I can see, without a TWC account, they charge $1/GB over {whatever is in the contract agreement} same thing as Buckeye, if it still stands.
  15. Understanding single thread sluggishness

    Everything you have said, mainly the section on removing the switch from the equation produces the same results, I would continue submitting tickets to the ISP, they will eventually respond and send a tech.   Of course they will not be responsible for administering the local network, but with enough perseverance they should responsibly cave, and get someone out there.