Sunday, August 12, 2007

Weekend Reading

DDR3 offers no improvement over DDR2

However, until Intel moves away from its 64-bit FSB bandwidth, the figures we'll continue to see will suck. Some still bizarrely talk about incredible bandwidth, but we're very sorry to report that bandwidth just isn't there. Seeing 8.7 GB/s of memory bandwidth with memory at 2GHz just does not make any sense. Single channel and Dual-Channel just do not make sense before Nehalem shows up.

Take a look HERE.

==================================================================
Hack Attack: Intermediate guide to BitTorrent

Last week's beginner's guide to BitTorrent got you all up to speed on what BitTorrent is and how you can use it to download and share large files. It was a pretty good start, but there are a couple settings that any avid BitTorrent-er should tweak to keep their files sharing smoothly over BitTorrent.

Take a look HERE.


==================================================================
Unix/Linux Command Cheat Sheet

Lifehacker has a great item for Linux users: Don't fear the terminal! Take the plunge and learn the basics of the terminal with the printable guide put together by FOSSwire. FOSSwire covers the very basic ins-and-outs of the terminal on a one page PDF. Included in the guide are commands for: working with files, obtaining system information, managing processes and file permissions, file compression, shortcuts, network management, and SSH. This guide is perfect for recent switchers ready to take the terminal head-on.

Take a look HERE.


==================================================================
Delete This!

A series of legal events means that companies that have no business reason to retain documents or records may be compelled to create and retain such records just so they can become available for discovery.

Read the article HERE.


==================================================================
The Return of the IPv4 Shortage

Many years ago I was told dismissively, by smart people, that "we'll never run out of IP addresses!" But now people who really should know not only see it happening, they see the pool of IPv4 addresses exhausting in "late 2009 / early 2010." Yikes! That's just around the corner!

Take a look HERE.

==================================================================
Exploit hunter ponders ethical hacking

Like spies in a John LeCarré novel, network security professionals inhabit an ethically shadowy world. Gunter Ollman, Director of Security Strategy for IBM Internet Security Systems recently posted a blog entry discussing some of the ethical dilemmas faced by security services vendors in dealings with software vulnerability brokers

Take a look HERE.


==================================================================
BitTorrent goes closed source

Developers are being told that they cannot have access to the code of the latest version of BitTorrent. The problem with using an Open Sauce licence was that people were taking the product, repackaging it, charging for it or loading it with spyware.

Take a look HERE.


==================================================================
Using Darknets to See the Light

Firewalls, intrusion detection and prevention systems, antivirus – they’re all old tricks of the trade that IT has traditionally deployed to maintain the security of large and complex networks.

Take a look HERE.


==================================================================
The data theft time bomb

While viruses and worms remain the most pesky security problems, data theft concerns simmer beneath the surface. Despite the billions of dollars spent on information security products, the aggressive patching and repairing of operating systems and applications, and the heightened awareness of the need for computer users to guard against identity theft, most organizations aren't feeling any more secure than they were a year ago.

Take a look HERE.


==================================================================
Do Botnets Dream of Digital Sheep?

Right now, botnets are one of the most concerning problems in information security and are considered to be source of all evil like spam, click frauds and denial of service attacks.

Take a look HERE.

0 Comments:

Post a Comment

<< Home