“When in doubt, use brute force.” – with scalable distributed power the rate per second is mostly limited by cost , or the size of your botnet. Sure a login rate limiter or IP whitelist will help but in some cases that’s impractical. If you are lucky enough that the attacker has an IDS-usable signature that covers you some of the time (Like the current WordPress one). But eventually the password you chose is going the lynchpin of your security system. How complex is yours?
I needed more space for something so I grabbed a 256GB Vertex 4 to replace a 128GB. Looks promising so far , write speed is much faster , almost 100MB/s over the 128GB . See OCZ Vertex 4 128GB
Version 1.96 ——Sequential Output—— –Sequential Input- –Random-
Concurrency 1 -Per Chr- –Block– -Rewrite- -Per Chr- –Block– –Seeks–
Machine Size K/sec %CP K/sec %CP K/sec %CP K/sec %CP K/sec %CP /sec %CP
lwhDT 48136M 1035 99 496483 39 220350 29 4921 99 537790 36 2880 130
Latency 11188us 70174us 347ms 4566us 8008us 6706us
Version 1.96 ——Sequential Create—— ——–Random Create——–
lwhDT -Create– –Read— -Delete– -Create– –Read— -Delete–
files /sec %CP /sec %CP /sec %CP /sec %CP /sec %CP /sec %CP
16 21359 40 +++++ +++ +++++ +++ +++++ +++ +++++ +++ +++++ +++
Latency 95us 862us 337us 82us 19us 95us
This winter I got a low-end mag trainer to ride indoors, I had nothing but terribly boring memories of rollers (when its not a race) and first-gen mag/fan trainers so I wasn’t expecting much. Turns out the trainers have gotten … Continue reading
So I got a new laptop, completely different company, different CPU, different everything. I pulled the hard drive out of the old one, put it in place of the one that came with the new one…. Boot up and it’s as if I didn’t change computers. No activation phone call, No re-installation, No migration, no restoring from backup. It just runs.
I didn’t even think about it, this is the third time I’ve done it.