• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

Chitchat another day, another ms update

eatshitndie

Alfrescian (Inf)
Asset
Joined
Jul 25, 2008
Messages
60,204
Points
113
here i am in the data center in the wee hours pulling updates from mshit for ms office 2010 64-bit edition clients. again. out of 19 file downloads, 11 are for security patches. there are hundreds of thousands of clients out there, and everyone gets hit with mass patches at the same time as they are being pushed out simultaneously. and this is only the tip of the proverbial iceberg of looming updates. there are other updates in the pipeline, most notably from adobe, webex, wireshark, and filezilla. adobe is the other constant nagger with updates almost every other week. luckily, tens of thousands of clients not on ms are using macbooks, and that number will rise. very little problem with that bunch. as for this batch of ms downloads, even with 11 security patches, sure enough, the network on both client and server sides gets stormed with new threat vectors, almost instantly after patches are installed and clients rebooted. well over 1 billion suspicious attempts on both client and server sides in 1 hour. the usual number before updates is a tad below 1 billion. if we junk ms, we'll probably see the attempts going south by a majority. those guys are likely using bot armies infected on millions of gadgets out there, including mobiles, to swarm in to check for new ms (update) vulnerabilities at this hour, at least at over 1000 attempts an hour per device. fortunately the 2 layers of massive idp stacks in geographic redundancy are holding up. let's wait and see.
 
Excuse me sir. Bedok sure quite happening at this wee hour from your description. You should get your land lady make coffee for you.
 
Excuse me sir. Bedok sure quite happening at this wee hour from your description. You should get your land lady make coffee for you.

she is most likely shagging tfbh my roommate.
 
Glad I'm using Macbook.

mac os is more stable, but ios is not lately. i'm on 9.3.2 up to now, and that is already too many patches too frequently from apple this half year. steve jobs if he were to learn about this would be rolling in his grave. but the ios team is quick to discover security holes and patch them in the bud. the urgency and frequency of releasing the patches indicate serious threats.
 
so far holding out well. tens of thousands of clients logging in the intranet via the internet are on laptops being used as mobile workstations. they need to be out there at tens of thousands of sites on a daily basis. another group of tens of thousands laptops and tablets are used for telecommuting. recent attacks are indicating more attempts at the client side, as the server side is sitting behind 2 powerful layers of very sophisticated load balancers and idp. an advisory has been sent out to intranet client users not to open emails marked with [e] for external unless preview indicates "friendly" content. security features on the email pool of servers scrub the bulk of trash (male enhancement ads), spam and suspicious malware but cannot eliminate all, especially those that pose seemingly "legit" content with a business-like email address and generic tech marketing info. the various links embedded in these emails seem innocuous. but all vpn client users are told not to click on links embedded in [e] emails that got through, including "unsubscribe" tags. just delete them without opening as preview of emails is provided via a nifty security feature, which is also available on vpn client software on mobiles.
 
Uncle Sam often point finger at the chinks is it true the attack? Why chinks always get blamed?
 
Uncle Sam often point finger at the chinks is it true the attack? Why chinks always get blamed?

ip addresses point to china, russia and eastern europe but it can also mean bots are easily embedded in compromised pc's and laptops in these cuntries. the root cause analysis involves pinpointing sources of these bot army, and they mostly point to china. they are preparing for doomsday, i.e. if there's a war and their state-sanctioned cyber hackers will attempt to shut down critical infrastructure and strategic cyber assets of the opposing cuntry. there's a secretive entity in palo alto called palantir that's busy at work trying to forestall that. every other geek-looking coffee drinker on university avenue works for them. my workstation got penetrated and embedded with malware from a eastern european entity, and it was sending numerous streams of tcp and idp pings back to a dns pool in eastern european at the wee hours of the morning when the idp detected the activity, and i had to shut it down, reformat and re-image the workstation, and scrub all backup data before reloading. damage was done and some data were stolen. breaches like this happen very often, usually after patches from vendors. after sanitizing and stabilizing, software upgrades and patches with new features and add-on's open up new threats.

this thread is for the uninformed in order for sinkies to understand that the sg gov and ida are doing their best to protect state data and unnecessarily facing insults and accusations by the uninitiated for doing a thankless job. those who are involved with net admin will truly sympathize. oh, btw, i'm just a jaga on graveyard shift duties.
 
here i am in the data center in the wee hours pulling updates from mshit for ms office 2010 64-bit edition clients. again. out of 19 file downloads, 11 are for security patches. there are hundreds of thousands of clients out there, and everyone gets hit with mass patches at the same time as they are being pushed out simultaneously. and this is only the tip of the proverbial iceberg of looming updates. there are other updates in the pipeline, most notably from adobe, webex, wireshark, and filezilla. adobe is the other constant nagger with updates almost every other week. luckily, tens of thousands of clients not on ms are using macbooks, and that number will rise. very little problem with that bunch. as for this batch of ms downloads, even with 11 security patches, sure enough, the network on both client and server sides gets stormed with new threat vectors, almost instantly after patches are installed and clients rebooted. well over 1 billion suspicious attempts on both client and server sides in 1 hour. the usual number before updates is a tad below 1 billion. if we junk ms, we'll probably see the attempts going south by a majority. those guys are likely using bot armies infected on millions of gadgets out there, including mobiles, to swarm in to check for new ms (update) vulnerabilities at this hour, at least at over 1000 attempts an hour per device. fortunately the 2 layers of massive idp stacks in geographic redundancy are holding up. let's wait and see.

Wah, you techie ah!
 
it has come to pas IT system has must be open source with coding shared and created by coders in today ICT.

If ICT is controlled by MNC they will become bad boys pretenting to sell good stuff hijacking the industry.

In workplace you have to BYOD and connect to internet using tethering from your own Hp. The Hp ram is now 6G enough for most things. Even hp can play serious Game coming soon.

Time of officeless regime is here. embrace the future, bro and time to hack hp into oblivion like the British empire hack Qing Dynasty with opium and created 2 unreasonable opium war with Chinese.

As it has been written, verily verily I say unto you, Chinese don't need Westerners products, say QianLong Emperor of Qing.

the british bastards grow opium in India and export to China and when Chinese defended by growing opium to suppress these bastard opium prices to make it worthless to sell, they turned around to claim Chinese drudged their own people with opium.

These are the works of criminal British empire bastards in yesterday and today, always worry about rising of the East people.

Today these white trash still want to claim white race supremist and pointing bad things done by the East people?

fuck them.

East People mainly Chinese are the best.


ip addresses point to china, russia and eastern europe but it can also mean bots are easily embedded in compromised pc's and laptops in these cuntries. the root cause analysis involves pinpointing sources of these bot army, and they mostly point to china. they are preparing for doomsday, i.e. if there's a war and their state-sanctioned cyber hackers will attempt to shut down critical infrastructure and strategic cyber assets of the opposing cuntry. there's a secretive entity in palo alto called palantir that's busy at work trying to forestall that. every other geek-looking coffee drinker on university avenue works for them. my workstation got penetrated and embedded with malware from a eastern european entity, and it was sending numerous streams of tcp and idp pings back to a dns pool in eastern european at the wee hours of the morning when the idp detected the activity, and i had to shut it down, reformat and re-image the workstation, and scrub all backup data before reloading. damage was done and some data were stolen. breaches like this happen very often, usually after patches from vendors. after sanitizing and stabilizing, software upgrades and patches with new features and add-on's open up new threats.

this thread is for the uninformed in order for sinkies to understand that the sg gov and ida are doing their best to protect state data and unnecessarily facing insults and accusations by the uninitiated for doing a thankless job. those who are involved with net admin will truly sympathize. oh, btw, i'm just a jaga on graveyard shift duties.
 
Last edited:
sometimes, i wonder when MS and apple come out with their operating systems, do their ah neh programmers insert malicious code, how to know? do they ownself check ownself like PAP? intially, i thought that they are so huge a company and they won't resort to risking their reputation.:D
 
bro, malicious codes are caused are stupid coders like Ah neh using bad English grammar and spelling mistakes causing it to stalled.

English or Indu-lish?




sometimes, i wonder when MS and apple come out with their operating systems, do their ah neh programmers insert malicious code, how to know? do they ownself check ownself like PAP? intially, i thought that they are so huge a company and they won't resort to risking their reputation.:D
 
In workplace you have to BYOD and connect to internet using tethering from your own Hp. The Hp ram is now 6G enough for most things. Even hp can play serious Game coming soon.

Time of officeless regime is here.

we do that today by allowing vpn client devices to tether to mobiles running mi-fi. secure laptops are also equipped with wi-fi and 4glte, but in a group or team huddle (scrum), 1 mi-fi device can support up to 10 teammates. the latest can support 20, and all we need is 1 or 2 lte session with the mobile gateway rather than 10 to 20 individual sessions, unnecessarily competing for rf resources. most mobiles occupy 2 sessions simultaneously as 1 goes ott via public access while the other goes internal pdn core via private access. for security, every user will still need to establish ipsec vpn tunnel from their laptop or device tethered to the mi-fi. this allows the user to work securely from laptop or device via any (public) internet connection - an orderly, monitored and encrypted private tunnel within a seemingly chaotic and open public access road, so to speak. i'm a champion of the officeless new age, and we have crafted solutions to make it possible. and now we are using the methodology for hundreds of thousands of vpn clients, soon to be in the millions. we are not referring to ordinary users. bus and train loads of dev ops users are doing it today while stuck in traffic.
 
bro, malicious codes are caused are stupid coders like Ah neh using bad English grammar and spelling mistakes causing it to stalled.

English or Indu-lish?

oi...can dun use the word stupid, i am very sensitive to this word cos' long long time ago.....:(

anyway, how do we know? can you break open the OS?
 
you are a computer science graduate, speaking like a pro ICT professional.

advance Bluetooth technology can solve the problem of hacking as weak RF signal with range of 10 meter make sense to be for office use.

make sense?


we do that today by allowing vpn client devices to tether to mobiles running mi-fi. secure laptops are also equipped with wi-fi and 4glte, but in a group or team huddle (scrum), 1 mi-fi device can support up to 10 teammates. the latest can support 20, and all we need is 1 or 2 lte session with the mobile gateway rather than 10 to 20 individual sessions, unnecessarily competing for rf resources. most mobiles occupy 2 sessions simultaneously as 1 goes ott via public access while the other goes internal pdn core via private access. for security, every user will still need to establish ipsec vpn tunnel from their laptop or device tethered to the mi-fi. this allows the user to work securely from laptop or device via any (public) internet connection - an orderly, monitored and encrypted private tunnel within a seemingly chaotic and open public access road, so to speak. i'm a champion of the officeless new age, and we have crafted solutions to make it possible. and now we are using the methodology for hundreds of thousands of vpn clients, soon to be in the millions. we are not referring to ordinary users. bus and train loads of dev ops users are doing it today while stuck in traffic.
 
open source is something like a library of codes available to share by coders. These codes are contributed by coders themselves to the library.

new style or methods of coding changes frequently and depleted the old codes.

Not worth hacking open source because 1 million and more coders round the world can find ways to shit the hackers.

want to hack the library? better think twice?



oi...can dun use the word stupid, i am very sensitive to this word cos' long long time ago.....:(

anyway, how do we know? can you break open the OS?
 
Last edited:
your family members call you stupid?

just think outside the square and start to pretend like mad professor and family members don't call you stupid.

better be called Xiao lang than stupid, right?

oi...can dun use the word stupid, i am very sensitive to this word cos' long long time ago.....:(

anyway, how do we know? can you break open the OS?
 
Last edited:
Back
Top