• Content count

  • Joined

  • Last visited

Community Reputation

1 Neutral

About Engineering

  • Rank
    I broke 10 posts and all I got was this lousy title!

Profile Information

  • Gender
  • Location
  1. AMD Phenom II X4 945 Deneb 3.0GHz 4 x 512KB L2 Cache 6MB L3 Cache Socket AM3 95W Quad-Core or go with an i7? What is the wiser choice?
  2. At $200 range and nearly equally priced.... which is most ideal and a better buy? What do you know? Any suggestions? i7 920 vs i7 860?
  3. What is this for? I'm aware there is system performance improvements, but what is the main technical use for purchasing this? What are these Fatal1ty cards for? CS4 Premiere work? Gaming? Creative Sound Blaster X-Fi Titanium Fatal1ty Champion Series 70SB088600007 7.1 Channels 24-bit 192KHz PCI Express x1 Interface Sound Card
  4. Which is a good starting hand held, ham or scanner? What would you recommend? Business & marine radios? CB & Ham radios? Scanners? Any suggestions? & Is there a site better (stock/pricing) than Radioshack for buying radio devices?
  5. Is there a way to enable a disabled boot device (e.g. CD-rom boot) on a password-ed BIOS config to a physically locked machine? Or BIOS password + disabled boot devices + machine physical lock is the safest security setting for a PC? Can this be bypassed? or impossible? What do you know?
  6. What was the batch variable for current dir path? When working with windows xp... Like if an app is run from a connected drive, how to designate on batch the working dir and not the OS native dir (c://) Is it %homedir%? or something like that. The parameter used to conflict and always reached C://, but I don't recall... long since worked on batch. You know what am talking about?
  7. Which implantation is technically less exploitable and safer/reliable for a secure enterprise environment? Which of the two would you personally use? (And why, security-wise.) (POP3/RFC 1939 vs. IMAP4rev1/RFC 3501) - or whichever is implemented on the major email providers nowadays.
  8. Is there such a way to perhaps flash or modify the serial code of a USB thumb drive? (I'm technically speaking beyond a formatting) What do you know?
  9. Yahoo? Gmail? Hotmail? Aol? Lavabit? Gmx? Zenbe? Gawab? Mail? Which email provider is more ideal for the security inclined practitioner? I've read some have a history to either: *Keeping forever records of account logs (including logins/ip's/transactions and more) *Doesn't not "permanently" delete inbox messages (remain in "backup" servers for indefinite amount of time) *Leaks user info to third parties *Shitty/Flawed privacy agreement policy *No resistance over subpoenas (aka doesn't defend/advocate privacy rights) *And even though they say they don't do any of the above, they in fact do under the sheets to meet their "agenda". What provider is trustworthy? what are your opinions? What would you, or do use? Which to stay with, which to stay away from?
  10. How good of an idea is it to rely on DD-WRT firmware to handle router security instead of it's manufacture's firmware? How reliable is this firmware? Stable? Robust security? No malicious source code? Backdoors? What are you experiences with DD-WRT... any thoughts, comments, or concerns?
  11. Cement? How about some kind of metal mesh? Is there an inexpensive way to build a Faraday cage?
  12. How is Windows 7 superior to Windows XP?
  13. What would you use? And why? Or if several depending the scenario, which ones then? Come on don't be lazy, shed some insight to a fellow User. ^^
  14. this safer than Google? In terms of user tracking, anonymity, reliability, etc. What do you think?
  15. What do you do to secure your Windows XP OS? What can you comment or contribute to the following checklist: *Only crucial system services running (less exploitable processes + performance improvement), *Hardened Hosts files (blacklists), *Uninstalling Telnet/Net meeting/Messenger/WMP/DCOM vulnerabilities, what else?, etc (generic Windows bloatware), *Disabling UPnP, Administrative shares (IPC$,etc), LMHash, Null sessions, epmap (port 135), SMB (port 445), SSDP (port 1900), etc *Disabling DCOM, paging from executives, remote desktop, remote registry, TCP/IP NetBIOS Helper (NetBT), etc *Secure file deletion (DOD 5222.20-M), *Any server based network hosting capabilities unavailable, *Group Policy Enforcement in place (based on NSA checklists) *Latest Windows Patches, *Firewall + AV + Peerguardian (ipblock lists) + IDS app, etc *Web browser with javascript security policies and cookie management, (Firefox w/ Noscript) *Registry tweaks (which?), *HDD encryption (which?), *User without Admin rights, *etc etc... What else can you think of? HTTP + SSL + HTTPS + Nothing else. (And yes I have read multiple pages of Google query results. I'd like to hear your personal practices and security habits) See where I'm getting to? What else crosses your mind?