Jump to content

ROM-DOS

Inactive Moderator
  • Posts

    1,599
  • Joined

  • Last visited

    Never
  • Days Won

    1
  • Speed Test

    My Results

Everything posted by ROM-DOS

  1. . . .way too awesome!! ~ [even with a 10 min. dial-up download] ~ Great Job ~ thanks reno and everyone [see how much I trust you guys ~ dial-up sux for stuff like this ~ but this was worth it]
  2. Online crooks shift to players, software: http://today.reuters.com/news/newsArticle.aspx?type=internetNews&storyID=2005-11-22T060322Z_01_RID220070_RTRUKOC_0_US-CYBERSECURITY.xml NEW YORK (Reuters) - Online criminals shifted their attacks in 2005 from computer operating systems such as Windows and others to media players and software programs, according to a study released on Tuesday. Among the software programs that attackers are now targeting are anti-virus software as well as programs used to listen to online audio and video programing, according to the SANS Institute, a nonprofit research group based in Bethesda, Md. Attackers are changing their targets after Internet service providers and operating systems designers such as Microsoft started shoring up their systems following a barrage of worms, viruses and other online threats in recent years. Network devices such as routers and switches that direct Internet traffic also are being targeted, SANS said. Cisco Systems Inc. made the list with its "IOS" router product line. "Network devices often have on-board operating systems and can be programmed like computers," the group said in a statement. "Compromises of network devices can provide attackers one of the most fruitful platforms for eavesdropping and launching targeted attacks." SANS released the study in cooperation with the U.S. Department of Homeland Security's Computer Emergency Response Team, the UK's National Infrastructure Security Co-Ordination Center and Canada's Cyber Incident Response Center.
  3. Google Scans Great Works http://www.redherring.com/Article.aspx?a=14584&hed=Google+Scans+Great+Works&sector=Industries&subsector=InternetAndServices Search king donates $3 million to U.S. Library of Congress to begin scanning world
  4. Fake FBI e-mails deliver viruses Posted on Tue, Nov. 22, 2005 http://www.fortwayne.com/mld/newssentinel/news/local/13233381.htm Messages that appear as if they
  5. Critical Security flaw in IE http://www.enn.ie/news.html?code=9654533 Alarm raised over 'critical' IE flaw Tuesday, November 22 2005 PC users have been hit with yet another critical security flaw that could leave their systems open to exploitation by hackers. The Internet Explorer security flaw, which was previously thought to be relatively harmless, exploits a problem with Javascript that could be used to take control of a Windows system. The vulnerability affects users of Internet Explorer versions 5.5 and 6 on XP Service Pack 2, and Internet Explorer 6 running on Windows 2000 SP4. Users can trigger the vulnerability by visiting a site hosting malicious code; the exploit can then be controlled remotely. At present, there is no patch for the vulnerability, despite the fact that it has been known since May this year. However, it wasn't considered to be a way to execute code, but simply a way to crash a user's PC or carry out denial of service (DoS) attacks. "Contrary to popular beliefs, the aforementioned security issue is susceptible to remote, arbitrary code execution, yielding full system access with the privileges of the underlying user," said Cyber Terrorism's security advisory. Until a patch is released by Microsoft, users can reduce their vulnerability by disabling Javascript in Internet Explorer, or choosing an alternative browser. However, changing browser may not be the answer to all problems, as alternative browsers increasingly come to the attention of malware writers. Code that could be used to launch attacks on Firefox, Mozilla and Netscape users was published online in September, after a vulnerability in the software was discovered. An updated version of the Firefox and Mozilla Suite software is now available.
  6. Check out the [glow=red,2,300]Gates of Hell[/glow] . . .if you dare!!
  7. Machines and objects to overtake humans on the Internet Monday, November 21, 2005 Machines will overtake humans to become the biggest users of the Internet in a brave new world of electronic sensors, smart homes, and tags that track users
  8. One of the many problems we all have at times is "thinking out-loud". . . .I think we all just victims of the "hyper-speed" of this so-called information age and trying (in our quest) to keep up with it and everyone else? <img src="http://imagehouze.com/uploader/files/126/BurningMan.gif" alt="BurningMan.gif" /> . . .of course, we do other bizzare things, too
  9. ROM-DOS ~ Really Old Memory-Defective Operating System It's really my play on Richard Alpert's spiritual name (Ram Dass), who while at Harvard in the early 60's, began explorations into the human consciousness, in collaboration with Timothy Leary, Ralph Metzner, Aldous Huxley, Allen Ginsberg, and others, to pursue intensive research with psilocybin, LSD-25, and other psychedelic chemicals. [just like me, only my reseach began in the 70's] But, techically ~ ROM-DOS is responsible for such activities as disk access and memory allocation; ~ bypassing ROM-DOS and communicating directly to the hardware is like sky diving without a second chute. You can do it, but if something goes wrong, you are in for a world of trouble. http://datalight.com/products/romdos/howitworks.php
  10. ". . .I want real answers." now that's one of the problems ~ females always want real answers, even if there aren't any!! ~ and thus the war began. . . Seriously, testmy.net is basically a competitive sport to see who can be the fastest, which some females think is rather boring. . .and really inconsiderate of there needs. [not me, of course]
  11. . . .I'm the cool looking one!, but I'm tired ~ got to go to work in a few. [are you gonna edit your poll to include us geek/nerds/ ` lol]
  12. Wal-Mart employee fired for Christmas email . . .when the giant US big box retailer Wal-Mart recently changed a greeting from "Merry Christmas!" to "Happy Holidays!" it drew complaints. And here the troubles began. The emails duly arrived, and a customer-facing rep took it on herself to explain the change with this ill-advised exhibition of learning. The employee, who we know only as Kirby, launched into a fantastically earnest historical explanation of what the Christmas Holiday Season
  13. They already have! ~ my advice; make sure you have at least one pop-up blocker program running while your surfing (I've got 3 running). If a pop-up gets through to your browser window (that you don't trust),
  14. My advice is ~ Never click on any Pop-ups telliing you to do something like this! <img src="http://imagehouze.com/uploader/files/126/spy_bldos9_720x300.gif" alt="spy_bldos9_720x300.gif" /> There's also a really good pop-up out there that has totally emulated an official looking "Microsoft Security Warning!" It pops right onto your desktop ~ if you ever see that one, immediately cut the power to your PC. It took me three days of trying to catch that trojan, I couldn't open any folders or go anywhere on that drive, except connect to the internet! I went in from another drive where I have XP installed and found the bugger, but everytime I deleted it ~ it would pop right back into the WINDOWS folder within less than a second. Finally, the only cure was to uninstall SP2, then reinstall it again. It was a beauty/beast of a trojan ~ one of many that have wormed their way into SP2 holes. . . .so, be careful ~ seeing isn't always believing!!
  15. Fate enjoys playing cruel tricks on those who delude themselves into a positive state of mind.
  16. "so, what's the consensus, shall i go into the free energy business?" . . .would this be based on the Mobius distortion effect or some new higher dimensional swirly twister?
  17. resopalrabotnick, It's getting harder to monitor all the adware and spyware which can be distributed by 'piggybacking' on legitimate downloads and the phishing of unsolicited e-mail that pretends to be from a legitimate source but actually tries to steal personal information. We also need to more aware of keyloggers installing on our computers. Password-stealing keyloggers skyrocket http://www.channelregister.co.uk/2005/11/18/keylogger_growth_survey/ So far this year I've caught 2 keyloggers, 5 adware/spyware programs, and 1 Virus ~ on my computer! . . .and those snuck on passed all the real-time/on-line scanners(9 always active) I have running and my firewall! Keep us posted if you find out what the surreptitious malware is or doing!
  18. LOL ~ yeah, but I don't just think 'a little'; do you think he has problems getting his FAQ's straight?
  19. NASA's Gravity Probe B spacecraft has gathered all the data physicists need to check a bizarre prediction of Einstein's relativity. November 16, 2005: Is Earth in a vortex of space-time? We'll soon know the answer: A NASA/Stanford physics experiment called Gravity Probe B (GP- recently finished a year of gathering science data in Earth orbit. The results, which will take another year to analyze, should reveal the shape of space-time around Earth--and, possibly, the vortex. <img src="http://imagehouze.com/uploader/files/126/vortex1_med.jpg" alt="vortex1_med.jpg" /> + Play Audio Time and space, according to Einstein's theories of relativity, are woven together, forming a four-dimensional fabric called "space-time." The tremendous mass of Earth dimples this fabric, much like a heavy person sitting in the middle of a trampoline. Gravity, says Einstein, is simply the motion of objects following the curvaceous lines of the dimple. If Earth were stationary, that would be the end of the story. But Earth is not stationary. Our planet spins, and the spin should twist the dimple, slightly, pulling it around into a 4-dimensional swirl. This is what GP-B went to space to check
×
×
  • Create New...