Jump to content
xisto Community

ne0

Members
  • Content Count

    14
  • Joined

  • Last visited

  1. Hmm , maybe there's another method of cooling... to use refrigerator (or air-conditioner) method. The metall located on top of the chip (radiator as we call it) is cooled with gase - "freon" (that's used in refrigerator to cool). As it's known from refrigerator technology if we increase the velocity of gase flow (the velocity of "freon") the surfaces having contact with freon will cool, so the metall-radiator. In order not to overcool we should replace (or connect) onto the metall-radiator thermocouple (or thermopair in other terms) in that way to control the temperature of the metall-radiator by increasing/decreasing the velocity of freon. So that the constant temperature will be held.This method would be expensive, some dangerous (because of freon, there may be some safety solutions) but exactly, precisely efficient! And would not depend the room you have it in.
  2. I wanna open my own shop site. Suggest me, where can i download free shop templates, scripts, shopping carts? Thanks!
  3. 3 or 4 months ago i borrowed CDs of Linux Suse v 10.1 from my friend. I tried to install it near Windows. Because i wanted to work on both of them . At last i installed it. But after installing i could do nothing because i'm new to linux (up to this time i was a windows user). It, all worked properly . Suddenly, (i don't remember when it was) when i turned on my PC it suddenly reloaded after approx. 15-20 seconds and then no of OSs booted up. All my data were deleted. So please help installing it correctly .. what do i have to do? I really want to learn linux, but i have problems such like this. And i don't have any other HDDs to install it separately from Windows. How to make partitions?(maybe there was a problem with partitioning ) Isn't linux a free? so aren't its books free? OK, where can i find free tutorials?
  4. Probably there are no trojans there. First look at the connection status. Are there any sent/received bytes? My best recommendation to you is to hook all the connections (TCP/IP). To do this you should download a tool named CPorts (or CurrPorts). You can download it from http://www.nirsoft.net/ . So what does this tool do ?It shows all the TCP/IP connections, the ports TCP/UDP and all open ports. By this tool you can view what kind of applications are making connections. So then you can find which of your application (or any running process) is connected to somewhere else.By the connection you can find the IP adress of the host that application is connecting to. If that IP address belongs to untrusted "X" host then you can kill that application (process). But before killing that proces i recommend to capture for data on that connection. By capturing you can exactly know what kind of informations are uploading/downloading. So in order to capture i recommend you to download a tool named SmartSniff from http://www.nirsoft.net/. SmartSniff captures all the TCP/IP packets that pass through your network adapter. After that probably you will be sure that "x" process is doing "x" things.Or there maybe some another things ... It's up to your reply. :)Happy New Year!
  5. Here is an exploit source code : http://forums.xisto.com/no_longer_exists/ used a shellcode that binds a port on 4444.
  6. While researching the properties of crosslinked polyethylene, i had mademany searches by the internet to find a method of determination the degree of crosslinkingof PE. And i found some standarts like ASTM D2765, EN579, ISO 10147. But all of themwere for a cost of above 50$. Even they were for 1$ i would not buy them. I used to find all the things (scientific) for free (because i am only a student). Many days of thinkingfinally i had found a method of determination the degree of crosslinking of PE.In order to show the method , first of all let's formulize what the degree of crosslinkingof PE is.The degree of crosslinking of PE - is a ratio of mass of crosslinked state of a PE to the whole mass of PE.But how can we know which part of PE is crosslinked?In order to answer to this question first we should the dissolver of PE.As it's known that PE dissolves in many organic dissolvers like xylol, toluol, etc., and above 80 degree Celcius. But the crosslinked state of a crosslinked PE does not dissolve, It only becomes a gel. By this way volume of a gel increases. And the size of a macromolecule increases too. Then i guessed a little technology:I took a cylinderic container made of a metall(Aliminium). The dimensions of a container is shown below:Height of the cylinderic container was 30 millimeters.Diameter of the base of cylinderic container was 20 millimeters.Then i made many holes (approx. 40-60) onto this container (mainly onto the bottom). The diameter of holes should be as little as 0.2-0.3 millimeters. But in my case the diameterof holes were 0.5 millimeters, because i could not find a drill with a diameter less than 0.5 millimeters. And then i took a sample of crosslinked PE (crosslinked with dicumyl peroxide) and cut itwith a knife. The cut samples were ~0.3 millimeters of thin and 15-20 millimeters of length.The mass of cut samples was 1 gramm. I replaced them into the container and closed the "mouth" of the container with aliminium foil made some little holes on it. Then replaced the container into a flask filled with toluol. And connected the "mouth" of the flask withbackflow condenser. And replaced the flask into the hot water bath - a vessel, hot water in it and that vessel located on top of an electric range. By this water boiled and the temperature reached 96 degree Celcius so was the temperature in the flask. So that the whole process continued 8 hours (minimum required time). After that ( 8 hours left) took thecontainer and dryied it at temperature 130-140 C approximately 3-4 hours. And got its mass.And after some calculations ,C = (mP - mC)*100/(mS-mC), %.C - the degree of crosslinking of PE.mP - the mass of the container after the whole process.mC - the mass of the dry (nothing in it) container.mS - the mass of the container with crosslinked PE in it before the whole process.got the results. I did the whole process 5 times. And took the arithmetic mean of the results.This article can be useful for students who are researching on the properties of crosslinkedPE and who are searching the standarts like ASTM D2765, EN579, ISO 10147 and who does not have money to buy them ) .
  7. I installed Windows Vista three months ago and i didn't like it because my PC's performance is out of Vista's requirements. My PC's configuration is show below:CPU: Celeron 1200 MHz.RAM: DDR 512 Mb.HDD: IDE ATA 160 Gb.Motherboard: VIA CLE266.Video card : integrated in motherboard (chipset CLE266). Memory : 64 Mb.Even this configuration is normal for MS requirements for Vista , my PC worked slowly than the previous versions of Windows (XP). And i often waited for some operations to complete.Graphically Windows Vista is very beautiful. I think because of my Video memory ( 64 Mb) i had worse performance while working with Windows Vista than previous versions of Windows.
  8. In my opinion virus itself is dangerous when it's invisible. Mainly the viruses are-worms-trojans-backdoorsWorms are the most dangerous ones, because they walk from computer to computer and infect them. A virusmaker (worm coder) uses vulnerabilities of operating systems or of any softwarein order to code a worm that then his/her worm could easily infect another computer without his/her interaction. And then the process of infecting goes on automatically. And that's why the worms are the most dangerous because they infect their victims faster than other types of viruses.Trojans are just like thieves. They steal passwords, banking accounts , or any sensitive information.Backdoors are just like "back doors" . While on victims computer they open a port (TCP/IP)like a tunnel or "back door". Through this "back door" an attacker enters the victims computer and does what he/she want. Nowadays these open ports are easily closed by firewalls.And that's why these types of viruses are not effective.The "virus" in your case hm.. is only a part of script of a body of a virus listed above. And it cannot be run with user interaction (we should assume that users are not babies or .. ) . Mainly it can be used to cover the tracks of an attacker (by modifyingthe content of your batch script , of course by not deleting the whole $WINDOWS$ ).
  9. But, how to get crosslinked polyethylene? How to make polyethylene to become crosslinked?There are 2 methods of making the polyethylene to become crosslinked:+ physical+ chemicalPhysical method is based on crosslinking the polyethylene with radioactive rays. These radioactive rays passed through polyethylene macromolecule form free radicals . After that these free radicals form bonds between macromolecules - making them crosslinked. There is also another type of physical method. This type of crosslinking is based on passing through polyethylene electrons with a high velocity. Chemical method is based on crosslinking the polyethylene with organic peroxides, silanes and other crosslinking agents.
  10. The only one big problem is that , there isn't any patches for this issue. So, it may become potentially dangerous.
  11. Probably you are right. But first of all let's analyze the source code of an exploit given at : _downloads.securityfocus.com/vulnerabilities/exploits/21688.c_ In my opinion (i'm not good at coding), probably the kernel of Vista is similar to the kernel of previous versions of Windows (NT based ones) . I mean there maybe similarity with ring0s between Windows versions. Only the change in Vista versions of Windows from previous ones is related to user-level APIs , i think. As known user API calls are directed to ntdll.dll (Native API, not documented). I think MS (or M$ ) did not changed these ntdll functions (or some of them are changed) . They probably changed the kernel32.dll , user32.dll , and especially gdi32.dll (because there are many changes in graphics in Vista) and of course maybe there are some more other changes. And that's why, probably , Vista is also affected too.
  12. It is known that polyethylene is one of the most popular polymers ever used(approxiamtely 65-70%). And it's range of usage is very wide. But there are some limitations to use it on some applications. For example, to use it as a pipe forhot water supply. Because of its low physical and mechanical properties, polyethylene itself cannot be used to produce pipes for hot water supply. In order to increase its physical and mechanical properties the term "crosslinking" should be provided. So what does the "crosslinking" mean? The term "crosslinking" is used for bonds between the macromolecules of the polyethylene. As it's known that the macromolecules of polyethylene are linear. Because of this linearity the polyethylene shows low physical and mechanical properties. To increase physical and mechanical properties these linear macromolecules should be crosslinked (there should become bonds between linear macromolecules). After crosslinking the macromolecules form bigger macromolecule , each of them has bonds between each other. The structure of crosslinked state is shown below :-----------(1) -----------------------(1) -------------------(1)| | | | | | | | | | | | | | | | | | | | .. .......------------------------(1) -----------------------(1) | | | | | |.....................................................1 - linear macromolecules| - bondsBecause of crosslinking the motion of macromolecules are limited relatively to each other.This means that crosslinking increases thermostability. And not only but other properties too. Here below is shown the change in properties after crosslinking:Density - D (decreases)thermostability - I (increases)Plasticity - DStability to low temperatures- IStability to UV light - IChemical stability - I
  13. There's a vulnerability in MS Windows that may cause serious problems related with the module csrss.exe . Here below is listed vulnerable systems: The only way to be secure against this vulnerability is not to download untrusted applications (viruses) . If downloaded, may cause serious problems like information disclosure and etc. With this vulnerability a virusmaker is able to code an exploit that may steal passwords from dial-ups, steal some informations from cookies, or bank accounts , etc. Or a keylogger maybe coded.
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.