« on: January 27, 2013, 06:43 PM »
Worth it for deadlight alone!
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Running an i3/6GB of RAM and I have not noticed this to be the issue. This laptop currently has a full load of office, kaspersky A/V 2013, VS 2010 and several other tools. I am to a desktop in about 12 seconds after boot and login with approximately 14 start-up processes.-Josh (January 25, 2013, 10:21 AM)
The startup/shutdown times aren't that big a deal to me. But I don't reboot a lot.
I'm more concerned with data access speeds and programs opening and closing since I'm in and out of things constantly with what I do. I should probably shrink my tookit down and just leave everything open. Different OS - different workflow, right?
-40hz (January 25, 2013, 05:58 PM)
Audio interview with the sudent:
http://www.cbc.ca/pl...treal/ID/2327525012/-mouser (January 21, 2013, 02:58 PM)
If anyone listened to that... the student was GIVEN A TESTING ACCOUNT. What do you do with test accounts? Errr... test maybe?
Just to add insult to injury, he was given all zeros for all his grades.
Nice. Kick 'em while he's down why don't ya? Show 'em who's the boss.
Proportionality has disappeared from "laws/rules/regulations/whatever". I could give recent examples that would simply blow your mind, however, as they're real, and so utterly insane, they can only be put in the Basement.The fact that he, on his own, informed them about the vulnerabilities the first time, tells you everything you need to know about his intentions, his moral character, and the nature of the "threat" he supposedly posed.-mouser (January 21, 2013, 03:06 PM)
+1 - Agreed. Now if he'd have polked it twice all sneeky and quiet...then I'd be up for a BBQ. But that ain't what happened.-Stoic Joker (January 21, 2013, 03:15 PM)
+1 and +1
Nothing better than BBQing a Good Samaritan though! They're not all that common, so when ya find 'em, better cook 'em up real quick!-Renegade (January 21, 2013, 08:19 PM)
The machine never falters in voting for itself...(as that is its primary purpose)...So if I gotta pick a direction coming outta the gate, Damn Straight I'm backing the dog.-Stoic Joker (January 21, 2013, 06:16 PM)
duh! sorry for over-reacting -- i can see now you were making a joke.. I guess this episode struck a little close to home for me and it's got me a little quick on the draw.-mouser (January 21, 2013, 05:53 PM)
Out of curiosity...does anybody know what the school's official written policy is on this? The schools I'm familiar with all require signed agreements before granting access to the university's data centers and their network. IIRC the two I dealt with both had unambiguous policies regarding the unauthorized use of scanning and related tools, along with severe penalties for doing so.-40hz (January 21, 2013, 04:17 PM)
An automatic client script analyzer allowing for security testing of Ajax and Web 2.0 applications
Industries' most advanced and in-depth SQL injection and Cross site scripting testing
Advanced penetration testing tools, such as the HTTP Editor and the HTTP Fuzzer
Visual macro recorder makes testing web forms and password protected areas easy
Support for pages with CAPTCHA, single sign-on and Two Factor authentication mechanisms
Extensive reporting facilities including VISA PCI compliance reports
Multi-threaded and lightning fast scanner crawls hundreds of thousands of pages with ease
Intelligent crawler detects web server type and application language
Acunetix crawls and analyzes websites including flash content, SOAP and AJAX
Port scans a web server and runs security checks against network services running on the server
This is a story about Doom 3's source code and how beautiful it is. Yes, beautiful. Allow me to explain.
After releasing my video game Dyad I took a little break. I read some books and watched some movies I'd put off for too long. I was working on the European version of Dyad, but that time was mostly waiting for feedback from Sony quality assurance, so I had a lot of free time. After loafing around for a month or so I started to seriously consider what I was going to do next. I wanted to extract the reusable/engine-y parts of Dyad for a new project.
When I originally started working on Dyad there was a very clean, pretty functional game engine I created from an accumulation of years of working on other projects. By the end of Dyad I had a hideous mess.
In the final six weeks of Dyad development I added over 13k lines of code. MainMenu.cc ballooned to 24,501 lines. The once-beautiful source code was a mess riddled with #ifdefs, gratuitous function pointers, ugly inline SIMD and asm code—I learned a new term: "code entropy." I searched the internet for other projects that I could use to learn how to organize hundreds of thousands of lines of code. After looking through several large game engines I was pretty discouraged; the Dyad source code wasn't actually that bad compared to everything else out there!
Unsatisfied, I continued looking, and found a very nice analysis of id Software's Doom 3 source code by the computer expert Fabien Sanglard.
I seem to be booting straight to the desktop using Start8 but I still have to see the silly (and completely pointless) "Lock Screen" and either log in to an email address or enter a Pin.Email Address? PIN?
Does anyone know a way to by pass the Lock Screen and mandatory login so I switch on and it goes straight to the desktop?-Carol Haynes (January 08, 2013, 02:49 AM)
Just create an "offline account" - at least that's still possible. Why on earth would you want to bypass authentication on the lockscreen, though?-f0dder (January 08, 2013, 03:16 AM)