Spread Firefox Affiliate Button
Showing posts with label information. Show all posts
Showing posts with label information. Show all posts

AMD Phenom II X4 Processors Over-clocked @7GHz


The first company to bring processors into the GigaHertz space has done it once again with their phenomenal Phenom II quad core chip clocking at
7 GHz.

The team that achieved this goal used a 28 multiplier with a 250.1MHz bus clock on a 1.25GHz bus. The motherboard that was used for the testing was a DFI “LANParty” UT 790FXB-M3eH7 that sported a digital PWM. An AMD 790FX rev 00 NB and ATI SB750 rev 00 SB were present on the board, and the team also placed on it dual ATI Radeon HD 4870 X2 graphics boards, along with 2GB DDR3 dual-channel 667MHz RAM.

Posted on 8/19/2009 07:14:00 PM by ket@n and filed under , | 0 Comments »

win32:sality virus

I was playing with a few softwares when my "avast antivirus" warned me of this "win32:sality virus".As usual i neglected it.This was a big mistake i made.Two hours later my antivirus declared VLC as virus, 4 hours later notepad was declared as virus and 24 hours later almost all exes were declared as virus. Many programs terminated abnormally.


I started searching net for information on this virus.When i got the following info about it:-
Characteristics
Type : Virus
Category : Win32
Also known as: W32.HLLP.Sality (Symantec)



Description
Win32/Sality is a polymorphic virus that infects Win32 PE executable files. It also contains trojan components. Win32/Sality has been known to be downloaded by variants of the Win32/Bagle family.
Method of Infection
When an infected file is executed the virus decrypts itself and drops a DLL file into the %System% directory. The DLL file is injected into other running processes. The virus then executes the host program code.
Some examples of the names used by the Sality DLL file as reported to CA from the wild include the following:
%System%\syslib32.dll
%System%\oledsp32.dll
%System%\olemdb32.dll
%System%\wcimgr32.dll
%System%\wmimgr32.dll

Note: '%System%' is a variable location. The malware determines the location of the current System folder by querying the operating system.


Method of Distribution
Via File Infection
Sality searches local drives C:\ to Y:\ for Windows PE executable files to infect. Some variants do....

Posted on 8/16/2009 01:02:00 AM by ket@n and filed under , | 0 Comments »

Dual core Vs Core 2 Duo -- Which is Better?

A few years ago, Intels best processor was the Pentium 4. It had one processor inside of it. Then, Intel put two of those into one package to make a dual core processor. This just means that there are two cores on one processor(Pentium D ok!) So there were two Pentium 4's inside the processor.

Three years ago, Intel introduced a new processor. It was a much more efficient design, and it came with two cores in one package by itself. Instead of putting two different processors in one package, it was just built like that "natively". These new processors were called the Core 2 Duos beat the older Pentium D's (the dual core Pentium 4's) by a lot.

Since the introduction of the Core 2 Duos, there have been a few less powerful processors introduced, that were slightly different and at a lower price, but still based off of the same architecture. So, they were still dual core processors, but not necassarily a Core 2 Duo.

These less expensive processors typlically had a smaller amount of cache, and a lower Front Side Bus standard(FSB).

The models that only have 1MB of cache are named "Dual-Core" prrocessors, to seperate them as "having less cache". It really means nothing, other than the less cache.
Posted on 8/10/2009 10:01:00 PM by ket@n and filed under | 0 Comments »

How to Protect ORKUT profile from being Cracked

I know people are bothered about protecting their Orkut account and safe guarding their privacy, so what do you need to know of protectting a Google Account?

  1. How the account can be cracked.
  2. How to get it back, once it’s gone out of your reach.
  3. Take the precautions!

Google Accounts or any other web based service is immune from being cracked due to a flaw or a security hole in the system, in *MOST* cases, the account gets hacked due to ignorance of the user, the chances including, making yourself a victim of phishing, using the “Remember Me” feature on public computers, saving the passwords on browsers in computers which may be accessed by someone without your consent, etc.

So what are the things an ignorant user normally does that makes him a victim of account hijacking or cracking?....

Posted on 8/08/2009 05:52:00 PM by ket@n and filed under , , | 1 Comments »

What are Trojans?

What is a trojan?
A trojan horse could be either:
a) Unauthorized instructions contained within a legitimate program. These instrcutions perform functions unknown to (and probably unwanted by) the user.
b) A Useful program that has been altered by the placement of unauthorized instructions within it.
These instructions perform functions unknown to (and probably unwanted by) the user.
c) Any program that appears to perform a desirable and necessary function but that (because of
unauthorized instructions within it) performs functions unknown to (and probably unwanted by) the user.

Under a restricted environment (a restricted Unix shell or a restricted Windows computer), malicious trojans can't do much, since they are restricted in their actions. But on a home PC, trojans can be lethal and quite destructive.
Posted on 6/18/2009 12:26:00 AM by ket@n and filed under , | 0 Comments »