|
Advertisement:
|
OCAU News |
Wednesday Afternoon
(3 Comments)
(link) Wednesday, 13-April-2016 17:08:42 (GMT +10) - by Agg
|
Australia continues to increase bandwidth usage. Call it the 'Netflix effect': Australians' hunger for data skyrocketed in the last year as online video streaming took the nation by storm. In the three months to December 2015 we chewed through a record 1.7 exabytes of data – or 1.7 million terabytes.
Phoronix have a worklog about their basement-sized testbed setup. It was just over one year ago that I wrote about turning a basement into a big Linux server room (and then the six month redux). With having just finished tiling the floor and making some other modifications, here is a one-year look at the project where there are more than fifty systems running Linux/open-source benchmarks daily as part of Phoronix, OpenBenchmarking.org, and LinuxBenchmarking.com, among other Phoronix Media efforts for enriching the Linux hardware experience.
PCPerspective discuss issues with benchmarking VR setups. My conundrum, and the one that I think most of our industry rests in, is that we don’t yet have the tools and ability to properly quantify the performance of VR. In a market and a platform that so desperately needs to get this RIGHT, we are at a point where we are just trying to get it AT ALL. I have read and seen some other glances at performance of VR headsets like the Oculus Rift and the HTC Vive released today, but honest all are missing the mark at some level.
Chris spotted this warning from CERT about Australian small businesses and RDP attackers. These insecurely configured servers are running the Windows operating system with external access provided through the Windows Remote Desktop Protocol (RDP). The Windows RDP allows remote access to a Windows desktop and is often used for administration purposes. Criminals use 'brute force' attacks targeting weak passwords to guess the server logon password. 'Brute force' is where an automated tool is used to work through all possible passwords until it finds the correct one. Once logged on, criminals can manually encrypt business files, including databases in some examples. They then leave a ransom notice on the server or send the business owner an email demanding they pay a ransom for the 'key', or code, to unlock the files. Ransom amounts have been known to reach up to AUD$8,000.
Return to OCAU's News Page
|
|
Advertisement:
All original content copyright James Rolfe.
All rights reserved. No reproduction allowed without written permission.
|
Advertisement:
|
|
|