Friday, October 31, 2008

Intel Processors Do It Again


Presumably in an (utterly futile) attempt to bring down the power grid all around the Mediterranean, print magazine PC World Greece benchmarked three powerful Nehalem desktop processors -- the Core i7 Extreme Edition 965, and the apparently non-extreme Core i7 920 and 940. Names aside, performance from all three was extreme compared to most stuff currently on the market. The data for number nerds: in 3DMark06 the 920 finished ever-so-slightly behind the Core 2 Extreme QX9770's 4,922 marks with 4,818 while the 940 and the 965 both opened a can of you-know-what at 5,282 and 5,716 respectively. More titillating figures await enthusiasts through the read link, but for you normal folk only concerned that Nehalem wouldn't be fast enough to justify an upgrade (and you weren't), rest assured that it triumphed in this no-holds-barred CPU cage match. So should we think about upgrading or wait till it has been on the market awhile?

Wednesday, October 29, 2008

Free Web Hosting

Free cPanel Web Hosting with PHP5/Mysql - no advertising!Register now: http://www.000webhost.com/90956.htmlWe can offer you a free web hosting package packed with advanced features for hosting & building professional dynamic websites. We provide secure free web space with all the web hosting tools you could possibly ever need.Our package includes:- 1500 MB of Disk Space, 100 GB Bandwidth - Host your own domain (http://www.yourdomain.com)- cPanel Powered Hosting (you will love it)- Over 500 website templates ready to download- Easy to use website builder- Free POP3 Email Box with Webmail access- FTP and Web based File Manager - PHP, MySQL, Perl, CGI, Ruby.- And many more..

Click here to visit us: http://www.000webhost.com/90956.html

Tuesday, October 28, 2008

Wireshark - Must Have Tools for the Network Administrator

Wireshark is the world's foremost network protocol analyzer, and is the de facto (and often de jure) standard across many industries and educational institutions. Wireshark development thrives thanks to the contributions of networking experts across the globe. It is the continuation of a project that started in 1998.

Features

Wireshark has a rich feature set which includes the following:

  • Deep inspection of hundreds of protocols, with more being added all the time
  • Live capture and offline analysis
  • Standard three-pane packet browser
  • Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others
  • Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility
  • The most powerful display filters in the industry
  • Rich VoIP analysis
  • Read/write many different capture file formats: tcpdump (libpcap), Catapult DCT2000, Cisco Secure IDS iplog, Microsoft Network Monitor, Network General Sniffer® (compressed and uncompressed), Sniffer® Pro, and NetXray®, Network Instruments Observer, Novell LANalyzer, RADCOM WAN/LAN Analyzer, Shomiti/Finisar Surveyor, Tektronix K12xx, Visual Networks Visual UpTime, WildPackets EtherPeek/TokenPeek/AiroPeek, and many others
  • Capture files compressed with gzip can be decompressed on the fly
  • Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platfrom)
  • Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2
  • Coloring rules can be applied to the packet list for quick, intuitive analysis
  • Output can be exported to XML, PostScript®, CSV, or plain text

If you are interested in trying the latest version of this software click here.

Sunday, October 26, 2008

Another Windows Patch

If you use a Windows computer connected to a network, a newly discovered bug makes it possible for a bad guy to wreak havoc on the computer without your doing anything. The most vulnerable versions of Windows are XP, 2000 and Server 2003. Vista and Server 2008 are also vulnerable, but not as badly. Microsoft considers the bug important enough to issue the patch immediately rather than waiting for their normal once-a-month patch Tuesday.

Susan Bradley, writing for the Windows Secrets newsletter recommends immediately installing the just-issued patch. Then she offers some unusual advice, suggesting people first restart their computers "to verify that your machine is bootable." Can't hurt. Then she says to install the patch and reboot again. Her article also includes direct links to the patch for each version of Windows. If, for some reason, you can't run Windows/Microsoft Update you can manually download the patch and install it.

A standard of Defensive Computing is that the less software installed and running the better. This particular bug is with a part of Windows known as the Server service. If you are not sharing files and/or printers on a local area network, then you don't need to have the server service running, bug or no bug.

Making a Windows service not run all the time is called disabling and/or stopping. Stopping refers to the instance of the service currently running. Disabling means preventing it from ever starting again. Microsoft describes how to both stop and disable the Server service in Security Bulletin MS08-067. They also suggest doing the same to the Computer Browser service.

Anyone not sharing files and/or printers on a network should also turn off File and Printer Sharing for Microsoft Networks (the Windows XP name) on all network definitions. For example, on a laptop with both wired Ethernet networking and wireless Wi-Fi networking, File and Printer Sharing should be turned off in both network definitions.

If the Server and Computer Browser services are disabled, then some people might consider the last point (and the next) overkill. I think they are a good idea because it means two mistakes would have to be made to enable file and printer sharing as opposed to only one mistake.

For still more safety, look into how your firewall is configured to ensure that it does not allow incoming traffic on TCP port 139 or 445. Again, this is for someone not sharing files and printers. Firewall configuration varies widely, but if you are using the Windows firewall in XP, the exception for this is called "File and Printer sharing."

Firewalls are the first line of defense against this type of problem. With that in mind, you may want to review the series of postings I did recently on adding a second router to a LAN to provide additional firewall protection to your most important computers.

Friday, October 24, 2008

Think Firefox 3 is fast? Try Firefox Minefield

A colleague today showed me a cool, new browser that he's been using to browse the web at blisteringly fast speeds. The browser? Minefield. The author of the code?

Mozilla.

Yes, that same Mozilla that makes the Firefox browser. Minefield is, in fact, a way to glimpse into the future of Firefox, as it's a pre-release/alpha version of the Firefox browser.

After spending some time with Minefield, one thing is clear: the future of Firefox is fast. Lightning fast.

How fast? Some claim that it has the fastest javascript engine on the planet, which means it leaves Google's Chrome browser in the dust. In my own unscientific tests, I'd say that this assertion is correct. Ars Technica pegs Minefield as 10 percent faster than Chrome.

You can download the latest nightly build for Mac OS X, Linux, or Windows, but be warned: it's alpha code. While a quick scan of the Web shows few complaints as to stability, Minefield may not be for you. It doesn't support some of my favorite Firefox extensions (like Adblock Plus), but it actually has surprisingly good support for extensions, given that it's a fast-moving project.

Feeling brave? Or simply feeling like your browser is too slow? Give Minefield a try. It's a separate install so it won't affect an existing Firefox install. You have nothing to lose but your chains. Review by CNET

Wednesday, October 22, 2008

Microsoft - Windows 7

Microsoft have revealed that the name for it's new operating system is going to be "Windows 7", the successor to Windows Vista. This name was previously a code name, with many people suspecting that this would change to something else nearer release."The decision to use the name Windows 7 is about simplicity. Over the years, we have taken different approaches to naming Windows. We've used version numbers like Windows 3.11, or dates like Windows 98, or "aspirational" monikers like Windows XP or Windows Vista. And since we do not ship new versions of Windows every year, using a date did not make sense.

Likewise, coming up with an all-new "aspirational" name does not do justice to what we are trying to achieve, which is to stay firmly rooted in our aspirations for Windows Vista, while evolving and refining the substantial investments in platform technology in Windows Vista into the next generation of Windows." Review by PC Reviews

Sunday, October 19, 2008

Traveling Thru Security Check Points

There's no particular style or type of clothing that you should wear from a security point of view. You are permitted to wear head coverings and religious garments during the screening process.You may be directed to additional screening if your clothing (religious or otherwise) is loose fitting or large enough to hide prohibited items. For more information, click here.

In addition, certain clothing and accessories can set off an alarm on the metal detector and slow you down. Avoid wearing clothing, jewelry or other accessories that contain metal when traveling through the security checkpoints:

1. Heavy jewelry (including pins, necklaces, bracelets, rings, watches, earrings, body piercings, cuff links, lanyards or bolo ties)
2. Clothing with metal buttons, snaps or studs
3. Metal hair barrettes or other hair decoration
4. Belt buckles
5. Under-wire bras
6. Hidden items such as body piercings may result in your being directed to additional screening for a pat-down inspection. If selected for additional screening, you may ask to remove your body piercing in private as an alternative to the pat-down search.
7. Take metal items such as keys, loose change, mobile phones, pagers, and personal data assistants (PDA's) out of your pockets.
8. Place heavy jewelry and other metal items in your carry-on baggage or in plastic bags if they are offered, until you clear security.
9. Pack all your coats and jackets in your baggage when possible. All coats and jackets must go through the X-ray machine for inspection. These include, but are not limited to, trench coats, heavy winter coats, suit jackets, sport coats and blazers. If you choose to wear an outer coat or jacket to the checkpoint, you will need to either place it in your carry-on or put it in the bin that is provided for you.

Disposable booties or slippers may be worn through the checkpoint to help protect your feet, but they must be disposed of prior to leaving the screening area.

Gel-filled bras are permitted through security screening and aboard aircraft.

Security Officers have to identify any metal that is detected at the checkpoint. If you set off the alarm, you will undergo additional screening. This includes a hand-wand and pat-down inspection.

You can remove metal items at the security checkpoint and place them in the plastic bags offered at several airports or in the bins provided. The bins will be sent through the X-ray machine. You can save time by not wearing metal items or by placing them in your carry-on baggage before getting in line.

Saturday, October 18, 2008

Internet Explorer 8 Beta 2 Reviews by CNET

With the public release of its second beta, Microsoft said it intends for the Internet Explorer 8 browser to be more customer-oriented than previous versions of its browser. Our initial impression of Internet Explorer 8 Beta 2 is positive: we think Microsoft has not only caught up with Opera, Safari, and Firefox, but in some cases even surpasses these other browsers with its innovative new features. IE8 offers people several enhancements like color-coded tabs, increased privacy options, and greater security features baked right in. Most of the new features require systems to be running Windows Vista SP1 or Windows XP SP3. The final version of Internet Explorer 8 is expected in November 2008.

The user interface hasn't changed much since Internet Explorer 8 Beta 1, except to add a Security pull-down menu between Page and Tools on the main toolbar. In addition to blocking phishing sites, IE8 now highlights the main domain of any Web site you visit. Thus, if something other than eBay.com is highlighted, chances are you are on the wrong Web site. Perhaps the most anticipated addition is Internet Explorer's new antimalware protection. Opera 9.5 and Firefox 3 both recently added antimalware protection. Safari has so far not announced plans for similar protection. Using mostly its own antimalware technology, Microsoft will block emerging threats by masking the entire IE 8 browser screen with a warning to users. The addition of malware protection to the existing antiphishing protection will be rebranded as the Microsoft SmartScreen filter.

In another feature, known as InPrivate, Microsoft allows the browser to suspend caching functions while you surf. Some scenarios for using InPrivate might be when you're using someone else's computer, when you need to buy a gift for a loved one without ruining the surprise, or when you're at an Internet kiosk and don't want the next person to know which Web site you visited. While you can currently clear the browser cache with a mouse click, it's an all-or-nothing action. InPrivate temporarily suspends the automatic caching functions, allowing you to keep the rest of your browsing history intact.

IE8 also contains a cross-site scripting filter, one of the first in a mainstream browser. Cross-site scripting allows an attacker to execute script on a user's browser without them knowing. When the IE8 filter finds a Web page with a cross-site scripting request, it changes the content on the page with a notice. Users are not presented with an option; IE simply blocks the malicious script from executing and displays the rest of the page.This is just a few of the new features added to Internet Explorer 8 Beta 2.

Are you ready to try this version? What are your thoughts about Internet Explorer 8 Beta 2?It is available at Microsoft's Internet Explorer Home Page for downloading if interested.

Wide area networks news, advice and technical information