Search Results for "data center"

173 results found.

Star-quad cable

Star quad cable is a type of balanced audio cable that specializes in reducing electromagnetic interference. Quad cable is better at rejecting external noise than an equivalent single pair cable. Star-quad cable is a four-conductor cable that has a special quadrupole geometry which provides magnetic immunity when used in a balanced line. Four conductors are

PC hardware vulnerabilities of summer 2022

There has been several BWAIN PC hardware vulnerabilities published this summer. BWAIN is a short name for a Bug With An Impressive Name. BWAIN is an accolade that we hand out when a new cybersecurity flaw not only turns out to be interesting and important, but also turns up with its own logo, domain name

Ethernet over coax – commercial converters

Nowadays it is possible to buy passive and active device to run Ethernet over Coax – some products support data transfer over larger distances then you can get on regular Cat5. The passive converters are typically limited to 100 Mbps maximum speeds up to 100-200 meters distance maximum. If you need faster speed or longer

Ethernet over coax – from UTP to coax

In this post I am talking about adapting 10 and 100 megabit twisted pair Ethernet to use coaxial cable instead of twisted pair wiring. Those 10BASE-T and 100BASE-TX Ethernet st standards use two wire pairs for communications (one for TX and other for RX). In this article I am describing how to adapt them to

New ‘Hertzbleed’ Remote Side-Channel Attack

Critical side-channel vulnerabilities in modern processors became well known in 2018 with Meltdown and Spectre vulnerabilities. And several more same type vulnerabilities followed. Now the newest on this series is called Hertzbleed Attack. It is a a new family of side-channel attacks: frequency side channels. Hertzbleed takes advantage that, under certain circumstances, the dynamic frequency

New Spectre-v2 vulnerability

Meltdown and Spectre are vulnerabilities in modern computers that can be used to leak passwords and sensitive data. Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. The vulnerabilities were found in 2017 by several researches, but were kept secret

Ukraine-Russia cyber war

Ukraine and Russia seems to be at the moments on both traditional and cyber war. We could call that hybrid warfare. We are at a cyber war. Countless examples exist of damage to infrastructure from hostile acts via computer attacks. Russia’s invasion of Ukraine has been a hybrid war from the start, a mix of

Cyber security trends for 2022

Nothing is more difficult than making predictions. Instead of trowing out wild ideas what might be coming, I have collected here some trends other people have predicted or reported. Why the Future Needs Passwordless Authentication https://securityintelligence.com/future-needs-passwordless-authentication/ As of September, Microsoft users no longer have to rely on passwords when logging in to their accounts. Passwords

XLR mic cable tester

I saw presentation of Sound Tools XLR Sniffer/Sender at https://www.ratsoundsales.com/mm5/merchant.mvc?Screen=PROD&Product_Code=soundtools-xlr-snifsend It was described: “Quickly troubleshoot faulty mic lines and cables with this set of remote end cable testers. The XLR Sniffers can also utilize phantom power to test snake lines and cables in live environments, making it simple to diagnose issues and get your show