February 28, 2013
I turned the computer on one day and my screen was flashing like a strobe light. I knew something was majorly wrong. Knowing that it could be several different things, my first guess was the power supply. So I took it apart and to my discovery it was the power supply capacitors. I replaced the capacitors and this fixed this the issue. With shipping and handling, the total repair cost was $12 dollars. I bought extra capacitors just in case this happens again. I also have a friend who has the same monitor and might need a repair in the future as well. If you are not technically inclined enough to repair your own electronic equipment, Please contact me and we can arrange repairs in the United States for a reasonable price. ——– 25v 330uf – www.mouser.com 25v 820uf – www.mouser.com
Tags: capacitors, discovery, education, future-as-well, inclined-enough, knew-something, monitor problem, own-electronic, power, united, video not working
Posted in Monitor Problem | No Comments »
January 19, 2013
[Recorded Jan 26, 2005] Whitfield Diffie, a key figure in the discovery of public-key cryptography, traces the growth of information security through the 20th century and into the 21st. In the 1970s, the world of information security was transformed by public-key cryptography, the radical revision of cryptographic thinking that allowed people with no prior contact to communicate securely. “Public key” solved security problems born of the revolution in information technology that characterized the 20th century and made Internet commerce possible. Security problems rarely stay solved, however. Continuing growth in computing, networking, and wireless applications have given rise to new security problems that are already confronting us.
Tags: 20th, allowed-people, discovery, growth, internet, new-security, prior-contact, problems-born, problems-rarely, radical, revolution, science & technology, the-discovery, the-revolution
Posted in Software Functioning Abnormally | No Comments »
December 30, 2012
HACKING CISCO PHONES Just because you are paranoid doesn’t mean your phone isn’t listening to everything you say We discuss a set of 0-day kernel vulnerabilities in CNU (Cisco Native Unix), the operating system that powers all Cisco TNP IP phones. We demonstrate the reliable exploitation of all Cisco TNP phones via multiple vulnerabilities found in the CNU kernel. We demonstrate practical covert surveillance using constant, stealthy exfiltration of microphone data via a number of covert channels. We also demonstrate the worm-like propagation of our CNU malware, which can quickly compromise all vulnerable Cisco phones on the network. We discuss the feasibility of our attacks given physical access, internal network access and remote access across the internet. Lastly, we built on last year’s presentation by discussing the feasibility of exploiting Cisco phones from compromised HP printers and vice versa. We present the hardware and software reverse-engineering process which led to the discovery of the vulnerabilities described below. We also present methods of exploiting the following vulnerabilities remotely. Cisco PSIRT has assigned CVE Identifier CVE-2012-5445 to this issue. The issue is being disclosed via a Release Note Enclosure per the Cisco Vulnerability Policy. The Vulnerability Policy can be found at the following location: www.cisco.com I have included the contents of the Release Note Enclosure (RNE) that will be available via the Cisco Bug Search tool bellow …
Tags: being-disclosed, discovery, do it your self, education, enclosure, internet, operating, phone, release-note, search
Posted in Internet Network Problem | No Comments »