Overclockers Australia!
Make us your homepage. Add us to your bookmarks  
Major Sponsors:
News
Current
News Archive

Site
Articles & Reviews
Forums
Wiki
Image Hosting
Search
Contact

Misc
OCAU Sponsors
OCAU IRC
Online Vendors
Motorcycle Club


Hosted by Micron21!
Advertisement:

OCAU News
Wednesday Afternoon (3 Comments) (link)
 Wednesday, 13-April-2016  17:08:42 (GMT +10) - by Agg

Australia continues to increase bandwidth usage. Call it the 'Netflix effect': Australians' hunger for data skyrocketed in the last year as online video streaming took the nation by storm. In the three months to December 2015 we chewed through a record 1.7 exabytes of data Ė or 1.7 million terabytes.

Phoronix have a worklog about their basement-sized testbed setup. It was just over one year ago that I wrote about turning a basement into a big Linux server room (and then the six month redux). With having just finished tiling the floor and making some other modifications, here is a one-year look at the project where there are more than fifty systems running Linux/open-source benchmarks daily as part of Phoronix, OpenBenchmarking.org, and LinuxBenchmarking.com, among other Phoronix Media efforts for enriching the Linux hardware experience.

PCPerspective discuss issues with benchmarking VR setups. My conundrum, and the one that I think most of our industry rests in, is that we donít yet have the tools and ability to properly quantify the performance of VR. In a market and a platform that so desperately needs to get this RIGHT, we are at a point where we are just trying to get it AT ALL. I have read and seen some other glances at performance of VR headsets like the Oculus Rift and the HTC Vive released today, but honest all are missing the mark at some level.

Chris spotted this warning from CERT about Australian small businesses and RDP attackers. These insecurely configured servers are running the Windows operating system with external access provided through the Windows Remote Desktop Protocol (RDP). The Windows RDP allows remote access to a Windows desktop and is often used for administration purposes. Criminals use 'brute force' attacks targeting weak passwords to guess the server logon password. 'Brute force' is where an automated tool is used to work through all possible passwords until it finds the correct one. Once logged on, criminals can manually encrypt business files, including databases in some examples. They then leave a ransom notice on the server or send the business owner an email demanding they pay a ransom for the 'key', or code, to unlock the files. Ransom amounts have been known to reach up to AUD$8,000.



Return to OCAU's News Page

Advertisement:

All original content copyright James Rolfe. All rights reserved. No reproduction allowed without written permission.