Logo Allmyblog
Logo Allmyblog
Lien de l'article    

DOVENDOSI

Batteries d’ordinateur portable Asus | Replacement batterie pour Asus - batterie-portable-asus.com
Contacter l'auteur de ce blog

5 DERNIERS ARTICLES
- Battery for Lenovo IdeaPad S10-3 0647-29U
- Battery for Dell Latitude E5530
- Battery for Samsung AA-PB2NX6W
- Batterie pour ASUS A31-B43
- Akku für Dell Latitude E5420 ATG
Sommaire

CALENDRIER
LunMarMerJeuVenSamDim
010203040506
07080910111213
14151617181920
21222324252627
28293031
<< Août >>

BLOGS FAVORIS
Ajouter dovendosi à vos favoris
 Battery for Toshiba Satellite P775 Alerter l'administrateur Recommander à un ami Lien de l'article 

It is a popular and unique concept born of a night spent on the museum lawns in Sydney’s Circular Quay where lin_s and her friends got together to hack in a capture the flag competition. Total cost was munchies and beer. It turns out lots of people were interested in this kind of thing - we couldn't find anything similar already, so we built something ourselves. Now in its fourth year, WAHCKon remains Perth's first and only hacker con home to a repeat solid line-up of security talks ranging from the technical to the absurd. For the former, speakers this year detailed the security chops of Docker, the perils of SSL, and PHP malware debriding. The latter was catered by the opening talk given by WAHCKon organisers who took delegates on a journey into the skulking malware PC assistant known as Bonzi Buddy who was this year's mascot.These (grassroots cons) are absolutely a thing now, and we're continually hearing about new cons starting all over Australia, Kronicd says. When we began there really wasn't anything of the sort.

The Perth confab was fired up to bridge the 4000 kilometre void between Perth and Australia's big east coast cities. Western Australia is pretty isolated from the community, and we saw that it just wasn't possible for a lot of less established hackers to attend existing hacker cons due to the prohibitive cost of travel and lack of corporate sponsorship, he says. WAHCKon 3 this year. Image: Darren Pauli He also misses the casual vibe of bygone Aussie hacker cons, and so sought with colleagues to build the conference they wanted to attend. The scene in Australia had become extremely corporate, and we wanted a return to the hacker cons we remembered -- we wanted to bring together the WA hacker community and to ensure that everyone had a chance to attend. To this end, organisers are willing to hand out free tickets to those who can't afford the $60 face price.Kronicd like his kin beg each year for their complicated conferences to come to an end, but persistent popularity serves as a defibrillator: Honestly, we've wanted this to stop for years. We're tired. People keep showing up and incredible speakers keep submitting talks. It really isn't up to us anymore.

Who: Wade Alcorn, Scotty Brown, Robert Winkel, Glyn Geoghegan, Gary Gaskell, Ashley Deuble, Anne Luk.CrikeyCon is another community-led charitable not-for-profit con based in Australia's Sunshine State that offers a diverse range of security talks and capture the flag and lock picking events over a day and a half. Co-founder Wade Alcorn says the concept was found at the bottom of a beer glass in a Brisbane pub.Crikey was born over a few beers between mates in Brisbane lamenting the lack of a local con, Alcorn says. We wanted to give something back to the security community that's been great to all of us … and create a local event where people can share, learn and socialise with like-minded enthusiasts.The crew expected the first event to host numbers resembling a large night out, but instead 60 hackers turned up, with 150 attending cons soon after. This year pulled 250.Those punters are a mix of hackers and business infosec types both of whom Alcorn credits with sufficient olfactory sense to sniff out the good cons from the bad. True security nerds try to get to as many things as they can that they get value from - even if it is on their own time, he says.

Wellington is one of the windiest cities in the world. Pilots aborting landings at New Zealand's capital have the Cook Strait – the chasm between mountain ranges running the length of the North and South Islands - to thank. Delegates to Wrong Island Con thank the Cook Strait for similar reasons.The conference in its third year in 2016 was born of a bad situation, and pretty well typifies the impromptu larrikinism of the antipodean hacker scene. Wrong Island Con was basically an in joke that got horribly out of hand, lone con organiser Richo says. He explains how hackers en route to Kiwicon 7 in the dying months of 2013 were diverted from Wellington to Auckland on account of severe weather.Three plane loads of Australian binary breakers ended up on the South island, cloistered in the body of the plane for hours while staff refused to let them disembark. Cabin fever rose among the trapped hackers as they pledged to honour the occasion next year by holding a hacker con on the wrong island.Enough people convinced me that it was a really good idea that we actually had a Wrong Island Con the next year before Kiwicon 8, Richo says, adding thats the low-key con emphasises less is more with talks clipped to 20 minutes. There are exceptions; hacker Snare took the liberty to give an hour-long thesis on uefi, Richo recounts.

The security guy at a US tech company agrees that community cons are proliferating quickly. I think the tipping point was the realisation that basically any idiot can run one -- that's definitely how Wrong Island Con came about.Everyone pays the US$50 to attend, even the speakers, but Richo like others only hopes to cover costs. The community tends to dig deep, and indeed Vulture South has spoken to security companies that save their sponsor cash for grassroots cons, without expectations of returns. Richo started the first Wrong Island Con in Christchurch with no sponsors, and had signed up three by day's end. That was pretty humbling, he says. The former CEO of African regional internet registry Afrinic has apologized for claiming that there was a race-related conspiracy to take over the organization.Adiel Akplogan responded to his original email noting that he had intended it to be a private message. He then apologized to my many friends and colleagues globally who have supported and worked with me over the past 20+ years and who may have felt targeted by its content ... I hope you will not see in this private message anything malicious.

Akplogan stunned the internet community when he responded to concerns that if a certain board candidate was selected, it would mean there would be two members from the same company on the eight-person board.While some saw a corporate conspiracy, Akplogan claimed something else was afoot: It is in fact not about a particular company trying to take over, but a clear racial fight for the white to take over, he wrote.They have always claimed that we Black cannot run an organization like Afrinic.Akplogan clarified that the target of his race-related ire was not the prospective board candidate (who subsequently withdrew his bid), which suggests his outburst was aimed at existing (white) board member Andrew Alston. Alston has become unpopular with existing board members in part by pushing strongly for transparency reforms.While Akplogan apologized for his email being made public, he did not apologize for its contents. Even though I do not deny my frustration, I should have exercised a bit more control and not allowed it to burst publicly, he wrote. The Network Time Protocol (NTP) organisation pushed out a bunch of patches last Thursday, including one high-severity bug.

  Aucun commentaire | Ecrire un nouveau commentaire Posté le 12-08-2017 à 06h33

 Battery for HP ProBook 4540s Alerter l'administrateur Recommander à un ami Lien de l'article 

The vulnerabilities in question are CVE-2016-4957 (another vulnerability in Crypto-NAK found by Cisco), and from Red Hat there's CVE-2016-4953 (an authentication bug), CVE-2016-4954 (server packet spoofing), CVE-2016-4955 (autokey association reset) and CVE-2016-4956 (a broadcast interleave bug).This Damn War “What’s the smallest fire I could start to be noticed, but not so big that I risk burning down the building?” is one of the stranger thoughts to have entered my head, in many years of working in IT. No, I'm not a closet pyromaniac, so why was I entertaining such thoughts?I had found myself stuck in a data centre on a Sunday afternoon and by that point, I’d been in there for over two hours with no sign of rescue. That shouldn’t have been the case, of course, but a series of unfortunate events had led me down that road.The data centre in question was undergoing an enormous refurbishment, and the rack I was working on was one of the last stragglers in an aged hall that was waiting to be decommissioned. When I arrived, the on-site team were very conscientious in pointing out open floor tiles and various other construction-related trip hazards; unfortunately, the contractors had been rather less meticulous.

I completed the work I needed to, then packed up my bag to leave. When I got to the exit however, my access card wouldn’t unlock the door. After a few frustrated swipes I tried the emergency door release button, also to no avail. Following some rather pitiful shoulder bunts against the door, to see if the release was working but the door itself was physically stuck – it wasn’t, it hurt – I conceded that the contractors must have fouled up the access control system somehow.“Not a problem,” I thought to myself, and picked up the telephone on the wall adjacent to the door, normally a direct line through to the operations centre. The line was dead, another casualty of the building work.“Still nothing to worry about,” I mused, and started waving my arms in front of the CCTV camera above the door to get someone’s attention.I jumped around in front of that camera for far longer than I’d care to admit, before I resigned myself to the fact that nobody was watching (or rather, able to watch) and sat down on the floor to take stock of my options.I first reached for my mobile phone which was almost fully charged, but had no signal in the metal sarcophagus of the data centre’s innards. Next up was my laptop: I could grab a network cable, plug directly into the network switch in my rack, and contact the outside world to achieve my freedom. Unfortunately, that was my third stop of the day and I’d already worn my laptop’s meagre battery down… and the power supply was on my desk at home. There wasn’t even a KVM trolley in the hall to use one of our servers to call for help, another casualty of the decommissioning process.

Deflated, I sat on the floor, and wondered how long it would take for someone to notice I was gone. I hadn’t given my wife an ETA for arriving home and as far as my colleagues were concerned this was a “pop in on my way past” flying visit, so they wouldn’t be expecting to hear from me again. By this point, I’d been in there for well over an hour and nobody had been to check on me; I was starting to get worried.What got me really worried was when I couldn’t open the fire door at the back of the hall. I could depress the release bar, but there was some construction detritus behind the door that meant it simply wouldn’t budge. Cue more pathetic shoulder charging, to no avail.I hammered on the fire door for a while and shouted myself hoarse, but nobody heard, so I tried the main door. Shouting for help turned into profanities, which turned into pleading and plaintive wails, but no help was forthcoming.Again, I sat on the floor and stewed for a while, and by the two-hour mark I was starting to feel desperate, which probably explains the (admittedly, very poorly-thought out) ‘start a small fire’ plan; quickly shelved, when I realised the fire alarm didn’t go off when I tried the door.

As I began to contemplate a night in my personal air-conditioned hell, a thought occurred to me: the fire alarm might have been yet another casualty of building works, but it wasn’t the only kind of monitoring.I ran over to my rack and pulled a couple of redundant power cables; not serious enough for an outage, but enough to generate some alerts from our own monitoring. I replaced them and did the same with more servers – lather, rinse and repeat – until the constantly flapping monitors caused one of my team to ring the data centre, to ask them to eyeball our rack and check for ‘power problems’.All told, I’d been trapped in that data centre for less than three hours, but even so when that door did finally open I felt like Shawshank Redemption’s Andy Dufresne. Lenovo is warning users to uninstall its Accelerator support application after it was revealed to have what it says are serious interception vulnerabilities.The company is one of five vendors caught pre-installing dangerously-vulnerable OEM software.

Duo Security researcher Mikhail Davidov reported the holes that would allow eavesdropping attackers to tap into Accelerator's unencrypted update channels to compromise users."A vulnerability was identified in the Lenovo Accelerator Application software which could lead to exploitation by an attacker with man-in-the-middle capabilities," Lenovo says."The vulnerability resides within the update mechanism where a Lenovo server is queried to identify if application updates are available."Lenovo recommends customers uninstall Lenovo Accelerator Application."Unencrypted update channels open an avenue for attackers to among other efforts push malware masquerading as software patches. It is limited in that it requires affected users to connect to malicious or open wireless networks to be exposed.Only those Lenovo machines with Windows 10 pre-installed sport the exposed app.The Lenovo Accelerator Application is used to speed up the launch of Lenovo applications and was installed in some notebook and desktop systems preloaded with the Windows 10 operating system.

Laptops from Acer, Asus, Dell, and HP were also tested and found to have a dozen vulnerabilities. All contained at least one hijacking flaw, most of which are easy to exploit.Lenovo says some 46 notebook and 25 desktop lines are affected, including its top end Y700 gaming laptop, IdeaCentre all-in-one desktops, and Yoga flip netbooks.It follows the 2014 shelling of Lenovo after it bundled the Superfish adware which used a trusted root certification authority certificate that allowed attackers to spoof HTTPS traffic. AMD has officially torn the wraps off its seventh-generation processors for laptops and notebooks. These are, we're told, shipping in volume in gear from Acer, Asus, Dell, HP, and Lenovo.As warned in April, and announced today at Computex 2016 in Taipei, the CPUs use AMD's Excavator architecture as found in Carrizo.AMD's new “Bristol Ridge” seventh-gen family features 35W and 15W versions of AMD's FX, A12 and A10 processors, and the “Stoney Ridge” gang includes 15W A9, A6 and E2 chips. The list of Mini Chipzilla's seventh-gen CPUs is here.

Meanwhile, the $199 Radeon RX 480 graphics processor has popped up, powered by the Polaris architecture, and is aimed at VR geeks. Computers from many of the biggest PC makers are riddled with easy-to-exploit vulnerabilities in pre-loaded software, security researchers warn.The research from Duo Security shows that bloatware is not just a nuisance that causes a lag in system boot-up, but a security risk. Laptops from Acer, Asus, Dell, HP and Lenovo all have at least one security vulnerability that can lead to a full system compromise. Most of the vulnerabilities would be straightforward to exploit even for technically unsophisticated hackers, according to Duo Security.Lenovo copped an enormous amount of flack after it began bundling Superfish adware with some of its computers in September 2014. Superfish adware was installed on some Lenovo PCs with a trusted root certification authority (CA) certificate, allowing an attacker to spoof HTTPS traffic.A machine with Superfish VisualDiscovery installed will be vulnerable to SSL spoofing attacks without a warning from the browser, as US CERT warned around the time the scandal broke in early 2015.

  Aucun commentaire | Ecrire un nouveau commentaire Posté le 12-08-2017 à 06h40


Historique : 12-08-2017
 

SYNDICATION
 
Fil RSS 2.0
Ajouter à NetVibes
Ajouter à Google
Ajouter à Yahoo
Ajouter à Bloglines
Ajouter à Technorati
http://www.wikio.fr
 

Allzic en direct

Liens Commerciaux
L'information à Lyon
Retrouvez toute l'actu lyonnaise 24/24h 7/7j !


L'information à Annecy
Retrouvez toute l'actu d'Annecy 24/24h 7/7j !


L'information à Grenoble
Retrouvez toute l'actu de Grenoble 24/24h 7/7j !


Application Restaurant
Restaurateurs, demandez un devis pour votre application iPhone


Fete des Lumières
Fête des lumières : vente de luminaires, lampes, ampoules, etc.

Votre publicité ici ?
  Blog créé le 11-07-2016 à 05h33 | Mis à jour le 22-08-2017 à 06h51 | Note : Pas de note