Search Results for "data center"

169 results found.

Ethernet over coax – from UTP to coax

In this post I am talking about adapting 10 and 100 megabit twisted pair Ethernet to use coaxial cable instead of twisted pair wiring. Those 10BASE-T and 100BASE-TX Ethernet st standards use two wire pairs for communications (one for TX and other for RX). In this article I am describing how to adapt them to

New ‘Hertzbleed’ Remote Side-Channel Attack

Critical side-channel vulnerabilities in modern processors became well known in 2018 with Meltdown and Spectre vulnerabilities. And several more same type vulnerabilities followed. Now the newest on this series is called Hertzbleed Attack. It is a a new family of side-channel attacks: frequency side channels. Hertzbleed takes advantage that, under certain circumstances, the dynamic frequency

New Spectre-v2 vulnerability

Meltdown and Spectre are vulnerabilities in modern computers that can be used to leak passwords and sensitive data. Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. The vulnerabilities were found in 2017 by several researches, but were kept secret

Ukraine-Russia cyber war

Ukraine and Russia seems to be at the moments on both traditional and cyber war. We could call that hybrid warfare. We are at a cyber war. Countless examples exist of damage to infrastructure from hostile acts via computer attacks. Russia’s invasion of Ukraine has been a hybrid war from the start, a mix of

Cyber security trends for 2022

Nothing is more difficult than making predictions. Instead of trowing out wild ideas what might be coming, I have collected here some trends other people have predicted or reported. Why the Future Needs Passwordless Authentication https://securityintelligence.com/future-needs-passwordless-authentication/ As of September, Microsoft users no longer have to rely on passwords when logging in to their accounts. Passwords

XLR mic cable tester

I saw presentation of Sound Tools XLR Sniffer/Sender at https://www.ratsoundsales.com/mm5/merchant.mvc?Screen=PROD&Product_Code=soundtools-xlr-snifsend It was described: “Quickly troubleshoot faulty mic lines and cables with this set of remote end cable testers. The XLR Sniffers can also utilize phantom power to test snake lines and cables in live environments, making it simple to diagnose issues and get your show

Vastaamo breach is horrible

Bombshell data breach ransom incident exploded in Finland. Psychotherapy center Vastaamo patient records were breached and ransom demands for not publishing data was sent to both company and patients. Patient data of 300 were already published on-line. Vastaamo, which has branches throughout the Nordic country of 5.5 million and operates as a sub-contractor for Finland’s

Quantum Supremacy Achieved ?

Quantum computers has been on news a lot lately. Scientists claim to have achieved “quantum supremacy”, a breakthrough that could change computing history. But has that breakthrough really happened or not? Google Confirms Achieving Quantum Supremacy https://gizmodo.com/google-confirms-achieving-quantum-supremacy-1839288099 Google scientists confirmed in a blog post that their quantum computer had needed just 200 seconds to solve