Jump to content
xisto Community

ne0

Members
  • Content Count

    14
  • Joined

  • Last visited

Posts posted by ne0


  1. Hmm , maybe there's another method of cooling... to use refrigerator (or air-conditioner) method. :) The metall located on top of the chip (radiator as we call it) is cooled with gase - "freon" (that's used in refrigerator to cool). As it's known from refrigerator technology if we increase the velocity of gase flow (the velocity of "freon") the surfaces having contact with freon will cool, so the metall-radiator. In order not to overcool we should replace (or connect) onto the metall-radiator thermocouple (or thermopair in other terms) in that way to control the temperature of the metall-radiator by increasing/decreasing the velocity of freon. So that the constant temperature will be held.This method would be expensive, some dangerous (because of freon, there may be some safety solutions) but exactly, precisely efficient! And would not depend the room you have it in.


  2. 3 or 4 months ago i borrowed CDs of Linux Suse v 10.1 from my friend.
    I tried to install it near Windows. Because i wanted to work on both of them . At last i installed it.
    But after installing i could do nothing because i'm new to linux (up to this time i was a windows user). It, all worked properly .
    Suddenly, (i don't remember when it was) when i turned on my PC it suddenly reloaded after approx. 15-20 seconds and then no of OSs booted up. All my data were deleted.
    So please help installing it correctly .. what do i have to do?
    I really want to learn linux, but i have problems such like this. And i don't have any other HDDs to install it separately from Windows.
    How to make partitions?(maybe there was a problem with partitioning )

    If any of you guys are total beginners at Linux, I have some ebooks for you but I wont post it on these forums as it probaly would be classified as warez (cause you need to pay for these ebooks), and some other good distrobutions of Linux are Ubuntu, Fedora, Mandrake etc.

    Isn't linux a free? so aren't its books free? OK, where can i find free tutorials?

  3. Probably there are no trojans there. First look at the connection status. Are there any sent/received bytes? My best recommendation to you is to hook all the connections (TCP/IP). To do this you should download a tool named CPorts (or CurrPorts). You can download it from http://www.nirsoft.net/ . So what does this tool do ?It shows all the TCP/IP connections, the ports TCP/UDP and all open ports. By this tool you can view what kind of applications are making connections. So then you can find which of your application (or any running process) is connected to somewhere else.By the connection you can find the IP adress of the host that application is connecting to. If that IP address belongs to untrusted "X" host then you can kill that application (process). But before killing that proces i recommend to capture for data on that connection. By capturing you can exactly know what kind of informations are uploading/downloading. So in order to capture i recommend you to download a tool named SmartSniff from http://www.nirsoft.net/. SmartSniff captures all the TCP/IP packets that pass through your network adapter. After that probably you will be sure that "x" process is doing "x" things.Or there maybe some another things ... It's up to your reply. :)Happy New Year!


  4. WinZip is prone to a remote code-execution vulnerability in an ActiveX control that is installed with the package.
    Exploiting this issue allows remote attackers to execute arbitrary machine code in the context of applications using the affected ActiveX control and possibly to compromise affected computers.

    WinZip versions in the 10.0 series prior to build 7245 are vulnerable to this issue.


    Here is an exploit source code : http://forums.xisto.com/no_longer_exists/
    used a shellcode that binds a port on 4444.

  5. While researching the properties of crosslinked polyethylene, i had mademany searches by the internet to find a method of determination the degree of crosslinkingof PE. And i found some standarts like ASTM D2765, EN579, ISO 10147. But all of themwere for a cost of above 50$. Even they were for 1$ i would not buy them. I used to find all the things (scientific) for free (because i am only a student). Many days of thinkingfinally i had found a method of determination the degree of crosslinking of PE.In order to show the method , first of all let's formulize what the degree of crosslinkingof PE is.The degree of crosslinking of PE - is a ratio of mass of crosslinked state of a PE to the whole mass of PE.But how can we know which part of PE is crosslinked?In order to answer to this question first we should the dissolver of PE.As it's known that PE dissolves in many organic dissolvers like xylol, toluol, etc., and above 80 degree Celcius. But the crosslinked state of a crosslinked PE does not dissolve, It only becomes a gel. By this way volume of a gel increases. And the size of a macromolecule increases too. Then i guessed a little technology:I took a cylinderic container made of a metall(Aliminium). The dimensions of a container is shown below:Height of the cylinderic container was 30 millimeters.Diameter of the base of cylinderic container was 20 millimeters.Then i made many holes (approx. 40-60) onto this container (mainly onto the bottom). The diameter of holes should be as little as 0.2-0.3 millimeters. But in my case the diameterof holes were 0.5 millimeters, because i could not find a drill with a diameter less than 0.5 millimeters. And then i took a sample of crosslinked PE (crosslinked with dicumyl peroxide) and cut itwith a knife. The cut samples were ~0.3 millimeters of thin and 15-20 millimeters of length.The mass of cut samples was 1 gramm. I replaced them into the container and closed the "mouth" of the container with aliminium foil made some little holes on it. Then replaced the container into a flask filled with toluol. And connected the "mouth" of the flask withbackflow condenser. And replaced the flask into the hot water bath - a vessel, hot water in it and that vessel located on top of an electric range. By this water boiled and the temperature reached 96 degree Celcius so was the temperature in the flask. So that the whole process continued 8 hours (minimum required time). After that ( 8 hours left) took thecontainer and dryied it at temperature 130-140 C approximately 3-4 hours. And got its mass.And after some calculations ,C = (mP - mC)*100/(mS-mC), %.C - the degree of crosslinking of PE.mP - the mass of the container after the whole process.mC - the mass of the dry (nothing in it) container.mS - the mass of the container with crosslinked PE in it before the whole process.got the results. I did the whole process 5 times. And took the arithmetic mean of the results.This article can be useful for students who are researching on the properties of crosslinkedPE and who are searching the standarts like ASTM D2765, EN579, ISO 10147 and who does not have money to buy them :)) .


  6. I installed Windows Vista three months ago and i didn't like it because my PC's performance is out of Vista's requirements. My PC's configuration is show below:CPU: Celeron 1200 MHz.RAM: DDR 512 Mb.HDD: IDE ATA 160 Gb.Motherboard: VIA CLE266.Video card : integrated in motherboard (chipset CLE266). Memory : 64 Mb.Even this configuration is normal for MS requirements for Vista , my PC worked slowly than the previous versions of Windows (XP). And i often waited for some operations to complete.Graphically Windows Vista is very beautiful. I think because of my Video memory ( 64 Mb) i had worse performance while working with Windows Vista than previous versions of Windows.


  7. In my opinion virus itself is dangerous when it's invisible. Mainly the viruses are-worms-trojans-backdoorsWorms are the most dangerous ones, because they walk from computer to computer and infect them. A virusmaker (worm coder) uses vulnerabilities of operating systems or of any softwarein order to code a worm that then his/her worm could easily infect another computer without his/her interaction. And then the process of infecting goes on automatically. And that's why the worms are the most dangerous because they infect their victims faster than other types of viruses.Trojans are just like thieves. They steal passwords, banking accounts , or any sensitive information.Backdoors are just like "back doors" :). While on victims computer they open a port (TCP/IP)like a tunnel or "back door". Through this "back door" an attacker enters the victims computer and does what he/she want. Nowadays these open ports are easily closed by firewalls.And that's why these types of viruses are not effective.The "virus" in your case hm.. is only a part of script of a body of a virus listed above. And it cannot be run with user interaction (we should assume that users are not babies or .. :) ) . Mainly it can be used to cover the tracks of an attacker (by modifyingthe content of your batch script , of course by not deleting the whole $WINDOWS$ :) ).


  8. But, how to get crosslinked polyethylene? How to make polyethylene to become crosslinked?There are 2 methods of making the polyethylene to become crosslinked:+ physical+ chemicalPhysical method is based on crosslinking the polyethylene with radioactive rays. These radioactive rays passed through polyethylene macromolecule form free radicals . After that these free radicals form bonds between macromolecules - making them crosslinked. There is also another type of physical method. This type of crosslinking is based on passing through polyethylene electrons with a high velocity. Chemical method is based on crosslinking the polyethylene with organic peroxides, silanes and other crosslinking agents.


  9. The only one big problem is that , there isn't any patches for this issue.
    So, it may become potentially dangerous.

    Currently we are not aware of any vendor-supplied patches for these issues.Microsoft has acknowledged the problem with the Client Server Run-Time Subsystem. The vendor is currently investigating the problem to determine its scope and impact.



  10. What I find funny is that this venerability has been around since Win2K and has spread into some builds of Vista! Who really believes that Vista is a complete re-write?

    Probably you are right.
    But first of all let's analyze the source code of an exploit given at :

    _downloads.securityfocus.com/vulnerabilities/exploits/21688.c_

    In my opinion (i'm not good at coding), probably the kernel of Vista is similar to the kernel of previous versions of Windows (NT based ones) . I mean there maybe similarity with ring0s between Windows versions. Only the change in Vista versions of Windows from previous ones is related to user-level APIs , i think. As known user API calls are directed to ntdll.dll (Native API, not documented). I think MS (or M$ :) ) did not changed these ntdll functions (or some of them are changed) . They probably changed the kernel32.dll , user32.dll , and especially gdi32.dll (because there are many changes in graphics in Vista) and of course maybe there are some more other changes. And that's why, probably , Vista is also affected too.

  11. It is known that polyethylene is one of the most popular polymers ever used(approxiamtely 65-70%). And it's range of usage is very wide. But there are some limitations to use it on some applications. For example, to use it as a pipe forhot water supply. Because of its low physical and mechanical properties, polyethylene itself cannot be used to produce pipes for hot water supply. In order to increase its physical and mechanical properties the term "crosslinking" should be provided. So what does the "crosslinking" mean? The term "crosslinking" is used for bonds between the macromolecules of the polyethylene. As it's known that the macromolecules of polyethylene are linear. Because of this linearity the polyethylene shows low physical and mechanical properties. To increase physical and mechanical properties these linear macromolecules should be crosslinked (there should become bonds between linear macromolecules). After crosslinking the macromolecules form bigger macromolecule , each of them has bonds between each other. The structure of crosslinked state is shown below :-----------(1) -----------------------(1) -------------------(1)| | | | | | | | | | | | | | | | | | | | .. .......------------------------(1) -----------------------(1) | | | | | |.....................................................1 - linear macromolecules| - bondsBecause of crosslinking the motion of macromolecules are limited relatively to each other.This means that crosslinking increases thermostability. And not only but other properties too. Here below is shown the change in properties after crosslinking:Density - D (decreases)thermostability - I (increases)Plasticity - DStability to low temperatures- IStability to UV light - IChemical stability - I


  12. There's a vulnerability in MS Windows that may cause serious problems related with the module csrss.exe .

    Here below is listed vulnerable systems:

    Microsoft Windows XP Tablet PC Edition SP2Microsoft Windows XP Tablet PC Edition SP1
    Microsoft Windows XP Tablet PC Edition
    Microsoft Windows XP Professional SP2
    Microsoft Windows XP Professional SP1
    Microsoft Windows XP Professional
    Microsoft Windows XP Media Center Edition SP2
    Microsoft Windows XP Media Center Edition SP1
    Microsoft Windows XP Media Center Edition
    Microsoft Windows XP Home SP2
    Microsoft Windows XP Home SP1
    Microsoft Windows XP Home
    Microsoft Windows Vista December CTP
    Microsoft Windows Vista beta 2
    Microsoft Windows Vista Beta 1
    Microsoft Windows Vista Beta
    Microsoft Windows Server 2003 Web Edition SP1 Beta 1
    Microsoft Windows Server 2003 Web Edition SP1
    Microsoft Windows Server 2003 Web Edition
    Microsoft Windows Server 2003 Standard Edition SP1 Beta 1
    Microsoft Windows Server 2003 Standard Edition SP1
    Microsoft Windows Server 2003 Standard Edition
    Microsoft Windows Server 2003 Enterprise Edition SP1 Beta 1
    Microsoft Windows Server 2003 Enterprise Edition SP1
    Microsoft Windows Server 2003 Enterprise Edition
    Microsoft Windows Server 2003 Datacenter Edition SP1 Beta 1
    Microsoft Windows Server 2003 Datacenter Edition SP1
    Microsoft Windows Server 2003 Datacenter Edition
    Microsoft Windows 2000 Server SP4
    Microsoft Windows 2000 Server SP3
    Microsoft Windows 2000 Server SP2
    Microsoft Windows 2000 Server SP1
    Microsoft Windows 2000 Professional SP4
    Microsoft Windows 2000 Professional SP3
    Microsoft Windows 2000 Professional SP2
    Microsoft Windows 2000 Professional SP1
    Microsoft Windows 2000 Professional
    Microsoft Windows 2000 Datacenter Server SP4
    Microsoft Windows 2000 Datacenter Server SP3
    Microsoft Windows 2000 Datacenter Server SP2
    Microsoft Windows 2000 Datacenter Server SP1
    Microsoft Windows 2000 Datacenter Server
    Microsoft Windows 2000 Advanced Server SP4
    Microsoft Windows 2000 Advanced Server SP3
    Microsoft Windows 2000 Advanced Server SP2
    Microsoft Windows 2000 Advanced Server SP1
    Microsoft Windows 2000 Advanced Server


    Microsoft Windows Csrss HardError Messages Multiple Vulnerabilities.
    Microsoft Windows is prone to a local denial-of-service and information disclosure vulnerabilities because the operating system fails to handle certain API calls with unexpected parameters.

    A local unprivileged attacker may exploit these issues by executing a malicious application.

    Successful exploits will allow attackers to retrieve sensitive information or crash the operating system, denying further service to legitimate users. Reportedly, these issues may also be exploited to execute arbitrary code with SYSTEM-level privileges.


    The only way to be secure against this vulnerability is not to download untrusted applications (viruses) . If downloaded, may cause serious problems like information disclosure and etc.
    With this vulnerability a virusmaker is able to code an exploit that may steal passwords from dial-ups, steal some informations from cookies, or bank accounts , etc. Or a keylogger maybe coded.
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.