
merciarich
Members-
Posts
42 -
Joined
-
Last visited
Never
Content Type
Profiles
Forums
Blogs
Events
Resources
Videos
Link Directory
Downloads
Everything posted by merciarich
-
Windows Vista Beta 2 Build 5308 Video Issues
merciarich replied to nulls's topic in Tech Support & Discussions Forum
Hello nulls, welcome to Extreme Tech Support - Free PC Help Hmmmm, seems a bit tricky. I would try another graphics card and see if that works Regards, merciarich -
The illustrated guide to breaking your computer
merciarich replied to a topic in Tech Support & Discussions Forum
"Activity 5: Simulation of various climates on printed circuits" lol :P -
We need more places like that, I think. And yeah, I agree. CLAIT isn't the best thing in the world........ Regards, merciarich
-
Hey kthdsn, Nice one. I do like it when technological-minded people like ourselves help those that maybe arent so used to computers. Keep it up, man Regards, merciarich
-
How did freepchelp start?
merciarich replied to PriceChild's topic in Tech Support & Discussions Forum
Greetings RandyL First of all, dont be shy to ask us questions. It's what we are here for - just find the right forum and post away :) Secondly, I am thinking that this site is going to be around now for the future. I know Mike is working hard to produce a fully working website for FPH. Any linking you could do would always be appreciated. I look forward to helping you in the forums :) Regards, merciarich -
Well, it turns out the BETA i had was corrupt............ hmm, got it from the M$ site though never mind, re downloaded it from M$ and reinstalled. Restarted and WOW, another Firefox copycat. The layout reminds me of Firefox 100% lol. M$ have included new pages for when the website cant be found though. Instead of displaying a whole page of worthless trouble shooting tips, it now displays a nice clean friendly error message as shown below in the screenies. Hmm, not sure what to think about this one. Will write a full review once I've played with it for a while. http://img138.imageshack.us/img138/5817/win48lv.jpg http://img418.imageshack.us/img418/6947/win52lt.jpg
-
Pushing a network to its limits
merciarich replied to merciarich's topic in Tech Support & Discussions Forum
-
I have heard some crazy things recently about water cooling.......
-
The first one was ÂŁ85 and took 2 hours. Its supposed to be all black but all one colour was boring so I worked out a way in which I could use some red in there lol. The spikes that come off the design go around to the back of my arm, it does look amazing and I loved the design as soon as I saw it on the internet. Second was ÂŁ20 and took about 25 minutes.
-
Lol, how long have you ever had your PC connected to the net for? My record is the below pic, 10 days. I think I need to restart my PC now because it is being very sluggish. http://img490.imageshack.us/img490/4444/win13wk.jpg
-
I can safely say that Microsoft have succesfully wasted their time yet again. I am yet to see what they have changed in this new version. They claim it is more secure and bug-free but, come on guys. You could have changed the toolbar layouts a little. Give IE a visual change as well, so to speak lol. http://img367.imageshack.us/img367/7245/ms12wn.gif Installation Screen ------ http://img459.imageshack.us/img459/7329/ms28at.gif The same old IE, just a revised version number lol
-
Yey! Got two new tattoos today, thought I would post to the board and see what everyone else thought http://img461.imageshack.us/img461/3182/10004154gk.jpg http://img492.imageshack.us/img492/6918/10004165wp.jpg 1st one is a tribal design that i customised to suit me 2nd is my name in arabic Didnt hurt much really either, thought it would hurt really bad but it was fine :) by the way, give the pics a chance to load, they take about a minute to fully load up and then they resize lol
-
Welcome to Issue 2 of the security newsletter, dated Wed 1st Feb 2006. There is now a new section to the weekly newsletter called "Focus of the Week" where I will take a major security issue and explain exactly what it is and how it can affect you and your business. ---------------------------------------------------------------------------------------- Focus of the Week: Phishing Phishing is the act of tricking someone into giving them confidential information or tricking them into doing something that they normally wouldn’t do or shouldn’t do. For example: sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. There is a neat way of checking if a website is genuine or not. Paste this into your browser address bar: javascript:alert("actual web address:" + location.protocol + "//" + location.hostname + "/"); A box will appear giving you the actual web address - a good way of checking for copycat sites! Ok, so how do you avoid phishing? Don't visit your online bank using a link in an email. Your bank WILL NEVER CONTACT YOU BY EMAIL, as they have no need to. They will send you letters through the post. Use a Favorite or type the web address into the browser. Banks never email their customers and ask for PINs so if you receive a suspicious email, do not enter sensitive information. If your bank is aware of a scam, there will be a warning on its real website so check there. You should also keep an eye on http://www.antiphishing.org, a news site dedicated to exposing similar scams. News In Brief: - Winamp exploit poses hacker risk (See Article 1) - Yahoo issue major phishing warning on their servers - Good Worms on the agenda (See Article 3) Article 1 - Winamp exploit poses hacker risk Hackers have created an exploit targeting a serious security vulnerability in Winamp, the popular media player. Users are strongly urged to update their software to Winamp version 5.13 to guard against attack. A remotely exploitable buffer overflow bug in version 5.12 of Winamp creates a means for hackers to take over machines running the vulnerable software, providing they can trick users into visiting maliciously constructed websites. A malformed playlist file, containing a filename starting with an overly long computer name, would be automatically downloaded and opened in Winamp because of the security bug. Winamp version 5.12 is confirmed as vulnerable and older versions may also be susceptible to attack. Article 2 - Police catch AOL Scammer A California man who allegedly duped AOL users into handing over credit card details to a fraudulent website has been arrested in the US. Police charged Jeffrey Brett Goodin, 46, of Azusa, with wire fraud and other charges over allegations he masterminded an aggressive phishing scam. Goodin allegedly sent thousands of emails that posed as messages from AOL's billing department warning customers needed to update their payment information or risk losing access to their accounts. Prospective marks were directed towards a fraudulent website and invited to hand over sensitive personal details including credit and debit card information that Goodin allegedly used to make fraudulent purchases. Phishing frauds are becoming an increasingly popular scam. According to the latest available figures from the Anti-Phishing Working Group, 17,000 such fraudulent attacks were launched in November alone. Article 3 - Good Worms on the agenda A researcher has reopened the subject of beneficial worms, arguing that the capabilities of self-spreading code could perform better penetration testing inside networks, turning vulnerable systems into distributed scanners. The worms, dubbed nematodes after the parasitic worm used to kill pests in gardens, could give security administrators the ability to scan machines inside a corporate network but beyond a local subnet, David Aitel, principal researcher of security firm Immunity, said at the Black Hat Federal conference. "Rather than buy a scanning system for every segment of your network, you can use nematodes to turn every host into a scanner," he said during an interview with SecurityFocus. "You'll be able to see into the shadow organisation of a network - you find worms on machines and you don't know how they got there." The topic of whether self-propagating code can have a good use has cropped up occasionally among researchers in the security community. In 1994, a paper written by antivirus researcher Vesselin Bontchev concluded that 'good' viruses are possible, but the safeguards and limitations on the programs would mean that the resulting code would not resemble what most people considered a virus. Later attempts at creating 'good' worms have failed, however, mainly because the writers have not adopted many of the safeguards outlined in the Bontchev paper. The Welchia worm - a variant of the MSBlast, or Blaster, worm - had apparently been created to fix the vulnerability exploited by the MSBlast worm, but had serious programming errors that caused the program to scan so aggressively for new hosts, it effectively shut down many corporate networks. Immunity's research is the latest attempt to create a more rigorously conceived framework for creating worms that could spread across specific networks to find and report vulnerabilities. The research essentially offers two advances, a strategy for the controlled propagation of worms and a framework in which reliable worms could be created quickly, Aitel said. "History has repeatedly shown us that people who write worms by hand make mistakes," he said. "Worms are difficult to build and very difficult to test." The nematode worms would have to get permission to spread by querying a central server for a specific digital token, which Aitel dubbed a nematoken, before spreading to a particular machine. Another version of the software would use a whitelist to spread among only the company's computers. Because the worms would be limited to spreading in a specific company's network, they would be completely legal, said Aitel. He noted that penetration testers today are given the right by a company to exploit systems on that company's networks. The distributed nature of the worms do make ascertaining permission more difficult, he acknowledged. Aitel's idea is a new twist on an old concept. An author using the name MidNyte wrote a response to Bontchev's paper in 1999 arguing that a 'good' virus that kept information on the last 100 hosts to which it spread could help defend against bad viruses. However, Aitel also argues that, in today's complex networks, nematodes could significantly reduce the cost of scanning a large network, by bringing the advantages of peer-to-peer concepts to penetration testing and network scanning. Rather than buying a new sensor for each subnet in a company, the nematode could spread using existing pathways to enumerate any computers with a given set of vulnerabilities. Moreover, the technology could be used to move search agents across a network to find specific files or to push intelligence to all desktops without a specific client. On the other hand, the dangers inherent in self-propagating code are hard to overcome, said Jose Nazario, senior security and software engineer for network defense firm Arbor Networks. "I still have my doubts that the controls he described are effective enough," Nazario said. "He addressed how you shut the nematodes down and how you make sure they don't infect other networks, but he hasn't addressed machine instability and the danger when people carry laptops across network boundaries." Nazario, the author of Defense and Detection Strategies Against Internet Worms, believes the best way to find vulnerabilities on a large network is to use dedicated sensors, an approach used by Arbor Networks. "There are a number of ways of finding those vulnerabilities in the network without the inherent risks involved in self-propagating code," he said. This article courtesy of SecurityFocus. Virus of the week BlackWorm, AKA BlackMal, Nyxem, MyWife, Tearec Over the last week, "Blackworm" infected about 300,000 systems based on analysis of logs from the counter web site used by the worm to track itself. This worm is different and more serious than other worms for a number of reasons. In particular, it will overwrite a user's files on February 3rd. At this point, the worm will be detected by up to date anti virus signatures. In order to protect yourself from data loss on February 3rd, you should use current (Jan 23rd or later) anti virus signatures. Note, however, that the malware attempts to disable/remove any anti-virus software on the system (and does this every hour while the system is up), so if the machine was infected before signatures were deployed, obviously, that anti-virus software can't be expected to clean up the infection for you. The following file types will be overwritten by the virus: DOC, XLS, MDE, MDB, PPT, PPS, RAR, PDF, PSD, DMP, ZIP. The files are overwritten with an error message( 'DATA Error [47 0F 94 93 F4 K5]'). If you have this virus, it is likely that you will have to do a full reinstall of Windows. Obtaining good backups is critical! Update your anti virus software immediately The worm spreads via e-mail attachments or file shares. Once a system in your network is infected, it will try to infect all shared file systems it has access to. You may see a new "zip file" icon on your desktop. It will disable most anti virus products and delete them. The worm will e-mail itself using a variety of extensions and file names. It will add itself to the list of auto-start programs in your registry. -------------------------------------------------------------------------------------------------- Thankyou for reading! Issue 3 out next Wednesday, 8th Feb 2006!
-
Mine was a ATI Radeon 256mb 9300 or something like that, available from http://www.dabs.com/uk - I would highly recommend ATI Radeons. They do have some bugs but the majority of the time they are fine. Regards, merciarich
-
American Conquest is the game that causes the most issues with Direct Draw. You need to update your drivers or get a new card. Regards, merciarich
-
hmm, typical windows If I had probs like that, I would just do a system restore. If you are able to go into Safe Mode, you should be able to do a system restore. If this doesnt work, use the Windows master disk Regards, merciarich
-
Hey Grune, nice to hear from you again. I have heard quite a few things about Direct Draw and since I am a regular gamer, I too have these problems. Direct draw seems to have a flaw with most 256MB video cards and it is recommended that you update your drivers either from http://www.ati.com or http://www.nvidia.com depending on which card you use. As far as I am aware, these are the only two make of cards affected. If yours is a different make, go to your video card manufacturer's website. Both ATI and nVidia have extensive support pages and download pages, just select which model of card you have and download the updates. Restart your PC and all should be well and good. Another thing to do is ensure you have the latest version of Direct X from Microsoft, click the link to go to the Direct X site http://www.microsoft.com/windows/directx/default.aspx Let me know how you get on Regards, merciarich
-
-
meh i dont think it would be appropriate
-
Hi again, If there is nothing in the folder, then MSN is set to not record conversations. May I ask the reason for why you want to recall the conversations? MSN may be able to recover them for you, I know they do for the police. Regards, merciarich