• About

Radio Barometer

technological instruments

computers

Stations Author

October 8, 2019 by Radiob

In the meantime, they are quite capable of fixing selectively. The author can not say they do so or not, but knows exactly what is possible in principle to itself – have. Someone may say that, to example, the GSM standard, all negotiations on the radio – is encrypted. Serious and powerful. How to fix? My answer: encryption exists only on the radio at the same switch, all data are processed in unencrypted form and do not need any additional equipment, besides the standard interface to SORM to get full access to information. Further, everything happens for a standard scheme.

The same thing – and with Internet traffic: it can be encrypted on subscriber line service provider, but the provider works with unencrypted traffic. More info: Technology Investor. The exception applies only to tunnel junctions, when the public access network used to transmit traffic encrypted sender and that can only decode the recipient! So, the FSB officers have access to resources quite all communications providers and can quite arbitrarily listen to any calls, and analyze traffic any subscriber. But that's not all. Also, they can carry out the substitution rates. But they are not alone. Peter Thiel contains valuable tech resources.

For example, the long evenings on the switch, the author invented a fun one: he cheated on most PBX her phone number and For example, when he phoned her friend, she determines the number of her beloved mother, and not the number of the author. This was done just by pressing a couple buttons on the keyboard. Exactly the same things can make employees KGB: the author made repeated calls to discharge the same way that it was determined the same author's own room! To demonstrate the possibilities, the staff has also been shown to have full access to all resources Stations provaydrov all, to the point that they can just temporarily disable multiple base stations with absolutely no knowledge of the provider. So if your cell phone lost network in the city center, it is quite possible, it is not technical issues, and information blockade during special opertsii. As you can see, the KGB about the opportunities that exist in the FSB, could only dream of, and hence the phrase: let's meet – it's not a phone conversation, not lose its relevance, rather the opposite – Big Brother is gaining momentum.

Posted in: News Tagged: computers, security

Simple Backup-Server

October 22, 2017 by Radiob

Make backup copies needed. Everyone knows that. But in practice it is running low. Need a capacious backup server, a program for creating backups and the ability to manage it all. I propose to consider a decision on the basis of cheap NAS-drive D-Link DNS-323 and free software. I understand that many system administrators smile: to put a little box NAS-drive instead of a full server? But do not rush to conclusions.

Described solution fully satisfy the organization to fifty computers. The general principle is as follows: – All computers are connected to the network – a network drive D-Link DNS-323 is also connected to the network – a network drive create a folder called BACKUP for copies, and a folder for USERS The other files – each computer backs up and dumps it on the NAS-device in the folder BACKUP; – BACKUP folder is accessible only to the network administrator, users do not see this folder, here we will not describe the installation process Network Storage D-Link DNS-323. Box hard drive, the formatting, setting up – all this is quite detailed in the instructions, as well as posted on the Internet. We mention only some important points. Firstly, in our device used firmware (firmware) version 1.03, which we shall consider. Second, hard drive assigned labels 'Volume_1' and 'Volume_2'. Third, the device named 'DNS-323' and the IP-address 62.76.0.2. All these parameters can be viewed on the tab 'STATUS' and change tab 'SETUP'. Thus, all the equipment in the network, start Setup Enter the page controls D-Link DNS-323.

Posted in: News Tagged: computers, security

Alley Software Creates ECatalog

September 12, 2017 by Radiob

Successfully completed a project to digitize the library directory general of the North-West Academy of Public Administration (SZAGS), the largest in the North-West Russia university to prepare state and local government employees. SZAGS Library, the main profile of which – the social sciences, economics, law, sociology and history, is one of the largest in St. Petersburg. Because the academy has 13 branches throughout the North-West Russia, obvious need for an organized Internet access to bibliographic databases. Work on converting paper library catalog in electronic form have been divided into several stages – scanning and filing delivery of software and subsequent data entry and indexing.

The main criterion for choosing a company for the project was best value for money in a relatively short period. As a result of the 2007 and 2008. respective tenders and executing all the works was selected SOFTWARE Alley, one of the biggest players in the development and implementation of software and hardware electronic archives, and streaming scanning and input of large volumes of paper documents. As a control electronic archive of documents was introduced Alley Archives 3, using the web interface which web 2.0 technologies and Ajax, you can arrange easy access to the electronic catalog on the Internet (estimated to become operational in September). "Our company has a long and successful working with libraries, including and university, "- said Stanislav Kim, CEO of Alley SOFTWARE -" so the creation of an electronic catalog for the North West Academy of Public Administration under the President was very important for us and interesting project. We hope that this will be a real help to students and teachers and help SZAGS to meet all its motto – 'classical education, plus innovative technology'. "

Posted in: News Tagged: computers, Software

The Internet

September 12, 2017 by Radiob

Analysis of the system is logical that in order to detect and neutralize malicious program requires the existence of such program. Prevention is prevention, let’s talk about it later, but it must be the first thing to determine is whether the computer viruses in general. For each type of malware, respectively, have their own symptoms, which sometimes visible to the naked eye, sometimes subtle at all. Let’s see what all are symptoms of infection. Since we are talking about a computer connected to the global network, the first symptom is excessive rapid rate, as a rule, outbound traffic is caused by the fact that many Internet worms serve ddos-machines or simply bots. As is known, ddos attack, the quantity of outgoing traffic is equal to the maximum magnitude of traffic per unit time. Of course, the Gigabit it may not be so noticeable if done ddos attack the width of a dialup connection, but usually catches the eye of inhibition at the opening of the Internet resources (I would also like to note that it will focus on viruses that are at least as something to hide yourself system, it is no need to explain anything if you have a Startup folder is a file kfgsklgf.exe who caught a firewall, etc.).

next to list, it is impossible to go to many sites of antivirus companies, failures in the paid programs like crc-error, this is due to the fact that quite many commercial protectors support the function of parity or the integrity of the executable file (and not only protectors, but the developers of protection), that has been done to protect the program against hacking. Let’s not talk about the effectiveness of this method against crackers and reverser, but the alarm to viral infection that might work idealno.Esli you still have picked up the virus, then you have to resort to service removes viruses on your computer. Fee for beginners virmeykerov not kill processes, then that shutdown or restart the computer goes a long completion of a process, or even the computer hangs during shutdown. Think about the processes of speaking is not necessary, as well as about the Startup folder, if there is something strange or new, then perhaps it is a virus, but about that later. Frequent rebooting the computer from the Internet boom, the completion of anti-virus software, server unavailability updates microsoft, inaccessibility sites of antivirus companies, errors when updating anti-virus, bugs caused by changes in the structure of fee-based programs, message windows, that executable files are damaged, the appearance of unknown files in the root directory, it is a short list of symptoms of an infected machine. In addition to direct malware exists a so-called spy software, it’s all kinds of keyloggers, dumper electronic keys, junk ‘Helpers’ to the browser. Frankly, the method of detection can be divided into two opposing camps. Assume keylogger adjoint dynamic library to the shell of the operating system found on the fly extremely difficult, and vice versa, nowhere grafted Assistant (plugin, the search string, etc.) to the internet explorer’u (usually) catches the eye immediately.

Posted in: News Tagged: computers, security
https://youtu.be/w3M4cqAMWQs

Recent Posts

  • Technological Use
  • Insurance
  • Making Money On The Net
  • Dissatisfaction
  • Hidden Games

Archives

  • May 2025
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • March 2019
  • February 2019
  • November 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • April 2017
  • March 2017
  • January 2017
  • December 2016
  • November 2016
  • September 2016
  • July 2016
  • June 2016
  • May 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • August 2011
  • July 2011
  • June 2011
  • April 2011
  • March 2011

Categories

  • News

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Copyright © 2025 Radio Barometer.

Omega WordPress Theme by ThemeHall