Jump to content

mudmanc4

Moderators
  • Content count

    14,617
  • Joined

  • Last visited

  • Speed Test

    My Results
  • Days Won

    204

mudmanc4 last won the day on October 16

mudmanc4 had the most liked content!

5 Followers

About mudmanc4

  • Rank
    TMN Seasoned Veteran
  • Birthday January 1

Contact Methods

  • AIM
    mudmanc4
  • MSN
    mudmanc4
  • Website URL
    http://lime-it.us
  • ICQ
    330539369
  • Yahoo
    mudmanc4
  • Skype
    mudmanc4

Profile Information

  • Gender
    Male
  • Location
    In The Plex

Recent Profile Visitors

76,125 profile views
  1. WPA2 fatal flaw

  2. WPA2 fatal flaw

    We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. The attack works against all modern protected Wi-Fi networks. Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites. The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must update affected products as soon as security updates become available. Note that if your device supports Wi-Fi, it is most likely affected. During our initial research, we discovered ourselves that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others, are all affected by some variant of the attacks. For more information about specific products, consult the database of CERT/CC, or contact your vendor. The research behind the attack will be presented at the Computer and Communications Security (CCS) conference, and at the Black Hat Europe conference. Our detailed research paper can already be downloaded. Source
  3. differance to negative with hughes net

    Welcome to testmy.net forum @mudman59 , Looks as if the connections speeds are rather sporadic, chances are there are a lot of other customers in the area.
  4. Vitesse de telechargement

    @Clerot, Please post here in English, thank you Veuillez poster ici en anglais, merci
  5. testmy.net Folding@Home team

    Team #44352
  6. Is my upload speed the problem?

    @CommanderRyalis, Post your signal / noise ratio from each channel
  7. MAGIC

    @danielkuk Nice!
  8. My net slow

    Maybe run a few more tests here at testmy.net so we have more data to evaluate. Check testmy.net/mirror for various test locations.
  9. Confused by three test results

    It is then of course possible they (the landlord) is looking at this a bit differently as well. Go easy.
  10. If I recall, there have been issues along these lines in the past. More than once.
  11. I would default to looking after an IPB metadata issue
  12. Test PING

    @Ian3005, Head over to testmy.net/mirror Which is the test server selector, hang out for a minute and each server will be tested for latency. Look at the end of each test server line. As well, in the header of testmy.net, over to the right: Excuse: Some of my results are not as good as they could be, due to tunneling ect.
  13. Is my upload speed the problem?

    @CommanderRyalis, are you still paying for 300/ 30 ?
  14. Auto test crashes all major browsers

    My first thought would be add a bit more memory/ and a cpu or two more to the VM
  15. Things sure have changed........

    Yo @ninjageek, of course we remember you , how the hell have you been? Life changes us all, people move on and around. Glad you stopped in to say hey
×
Speed Test Version 15.9
© 2017 TestMy Net LLC - TestMy.net - Terms & Privacy
© 2017 TestMy Net LLC - TestMy.net - Forum - Terms & Privacy