571
Off Topic / Re: What is your dream job?
« on: August 17, 2013, 02:53:20 PM »
Programming
Network Infrastructure brown townysis & Network Security
Network Infrastructure brown townysis & Network Security
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
This is exactly the purpose of the SHA-256. It ensures that people cannot just match the file size and the file name, but the file must also contain the same content.Then why aren't you using it on the file contents? From what I read, you're only matching name and file length for integrity. It would make more sense if you used a hash on the files as well.
The operating system is the newest edition of Windows server. Since it is the newest, this OS is much more secure than Windows Server 2008 (which is what all of the other hosting services use). The datacenter edition is packed with a bonanza of features, as opposed to the standard edition.You seem to be following the old "newer = better". Not saying that WS2012 is secure/not secure, but they tend to be more vulnerable the more young they are, since the exploits for the system haven't been discovered yet. This is usually where Microsoft releases a influx of knowledge base patches.
1: File names: This process checks if there are extra executable files in the server's directory. If there are extra .exe or .dll files, the user is identified as a hacker.Quite honestly; this is the most ridiculous "advanced" security system that happens to be very inefficient.
2: File sizes: This process checks the file sizes of all executable files against the values which genuine versions of the files would have. If there is a difference in the file sizes of any of them, the user is a hacker.
3: SHA-256 hash: It is relatively easy for a malicious user to get past the 2 methods above, but this step is far more secure. A SHA-256 hash is a string of characters which is uniquely generated according to the contents of a file. The HamHost control panel server generates a 256-bit hash of all executable files in the Blockland server's directory before launching the Blockland server. If the generated hashes don't match with those of a genuine Blockland installation, the user is a hacker.
It is extremely difficult, if not impossible, for a malicious executable file to match both the file size and the 256-bit hash. Furthermore, the system salts the hashes by adding a random number to them. This way, it makes it harder for a hacker to know exactly what hash the control panel server considers genuine.
HamHost's Blockland server security makes sure that other users cannot delete, steal, copy, modify, or corrupt any of the files in your Blockland server's folder.
WINEMakes me wonder why Wine's name comes from "Windows Emulator" if it's not an emulator.
IS NOT A
loving
EMULATOR!!!!!
And how long will space be there for us to explore it?
1. saying "we need to cure cancer" is like saying "we need to cure disease". the goal of cancer research is prevention/detection.Okay, lets go into space right now without a complete/most understanding about our human biology.
2. NASA will create jobs and inspire children to enter STEM fields, which would help our economy, and could lead to technologies that help the earth in return.
3. in the process of researching how to get farther than the moon with a manned capsule, NASA will likely invent more efficient ways of getting to new places in space.
4. in the process of researching new missions in general, NASA will create technologies that benefit the earth as it has before.
At the rate the human race is wasting resources and killing the earth with greenhouse gases, wars, toxic waste, etc etc, space could be a option - inhabiting space. http://en.wikipedia.org/wiki/Space_habitatTrue, but it's not happening at a rate where we need to immediately rush out humans to space and evacuate Earth to slow/stop stuff.