[H] dead A8N-Sli Deluxe... :(

2006-04-17 Thread James Boswell
For once, the built in obsolescence clock was fast, and it's died  
three days BEFORE the warranty runs out rather than three days after..


and by died, I mean it's totally dead, everything that was on it  
works, but the board just doesn't want to know, doesn't even tell the  
psu to power on.


However, being easter weekend, I can't talk to the supplier until  
tomorrow to get a swap-out arranged, leaving me with no Oblivion  
until further notice :(




the good news is that I'll finally get around to sorting out my  
Aperture library :)


-_-_
James Boswell
[EMAIL PROTECTED]
ICQ : 1653327 | AIM : TorazChryx
MSN: [EMAIL PROTECTED]





[H] Testing PPPOE

2006-04-17 Thread Thane Sherrington (S)
Does anyone know of a simple way to test PPPOE on an XP system?  The 
local telco uses it, while we use regular static IPs with our 
service, so from time to time we get customers who work fine in the 
store, but won't work at home because they are on the telco's 
system.  I'd purchase a separate service from the telco, but I'd have 
to charge people to test their PPPOE to cover the additional cost, so 
I was thinking if there is a way to configure a box in the store as a 
PPPOE server, then that might be the way to go.


T



Re: [H] SoundBlaster PCI 128 CT4730 Auto Play Issues

2006-04-17 Thread chuck


- Original Message - 
From: Rick Quilhot [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; The Hardware List 
hardware@hardwaregroup.com

Sent: Tuesday, April 11, 2006 9:07 AM
Subject: RE: [H] SoundBlaster PCI 128 CT4730  Auto Play Issues


I had something similar to this happen to me, I ended up rolling back a 
bois

update and the on board sound worked great



After all attempts to install a SB PCI 128 failed, I bought a SB Audigy SE 
Model SB0570 and it worked. My 8+ years of experience tells me that name 
brand motherboards are not always impossible, but seldom easy. This is not 
like the first time I have dealt with the name brand dog and pony show. 
Y'all may slam me for damning them, perhaps even take up for them, but 8+ 
years causes me to react according to my experiences. I know I would not 
have had to go out and buy a different sound card if it had been one of my 
custom builds. That SB PCI 128 would have took to the motherboard like a 
duck taking to water. To repeat, I had tried the PCI 128 in each of the 3 
PCI slots, as the only card in a PCI slot, so it being in the wrong slot 
could not have been an issue. With a name brand all the slots are the wrong 
slot because they are on the wrong motherboard. But as many of y'all say, 
That is just me when disagreeing with my opinion of name brand computers. 
If I follow my conscience and stick with real computer, real parts work. My 
stance saves me money. Although you may not speak up here, I strongly feel 
many of y'all have had the same problems getting things to work with the 
motherboards in name brand computers.


Chuck 



Re: [H] SoundBlaster PCI 128 CT4730 Auto Play Issues

2006-04-17 Thread FORC5
Proprietary systems are usually a plaque here also. HP's and Compaq's make my 
head hurt usually. :-!
I stopped referring to them as computers, they are appliances and disposable. 
my $.03
Fp

At 04:44 AM 4/17/2006, [EMAIL PROTECTED] Poked the stick with:

- Original Message - From: Rick Quilhot [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; The Hardware List hardware@hardwaregroup.com
Sent: Tuesday, April 11, 2006 9:07 AM
Subject: RE: [H] SoundBlaster PCI 128 CT4730  Auto Play Issues


I had something similar to this happen to me, I ended up rolling back a bois
update and the on board sound worked great

After all attempts to install a SB PCI 128 failed, I bought a SB Audigy SE 
Model SB0570 and it worked. My 8+ years of experience tells me that name brand 
motherboards are not always impossible, but seldom easy. This is not like the 
first time I have dealt with the name brand dog and pony show. Y'all may slam 
me for damning them, perhaps even take up for them, but 8+ years causes me to 
react according to my experiences. I know I would not have had to go out and 
buy a different sound card if it had been one of my custom builds. That SB PCI 
128 would have took to the motherboard like a duck taking to water. To repeat, 
I had tried the PCI 128 in each of the 3 PCI slots, as the only card in a PCI 
slot, so it being in the wrong slot could not have been an issue. With a name 
brand all the slots are the wrong slot because they are on the wrong 
motherboard. But as many of y'all say, That is just me when disagreeing with 
my opinion of name brand computers. If I follow my conscience!
  and stick with real computer, real parts work. My stance saves me money. 
Although you may not speak up here, I strongly feel many of y'all have had the 
same problems getting things to work with the motherboards in name brand 
computers.

Chuck 

-- 
Tallyho ! ]:8)
Taglines below !
--
Windows XP!  From the folks who brought you EDLIN!




[H] Linux imaging

2006-04-17 Thread Winterlight

What program can image and restore  Linux partitions?



Re: [H] Linux imaging

2006-04-17 Thread Jamie Furtner
Partimage can deal with ext[23]fs, Reiser3, JFS, and XFS partitions.

www.partimage.org is the site.

Jamie

On Mon, April 17, 2006 2:45 pm, Winterlight wrote:
 What program can image and restore  Linux partitions?






-- 
Jamie Furtner [EMAIL PROTECTED]
I aim to misbehave
- Malcom Reynolds (Serenity movie)
It's not safe...
For them.
- River Tam (Serenity movie)




Re: [H] Linux imaging

2006-04-17 Thread Ben Ruset

Symantec Ghost. Acronis TrueImage. Ghost for UNIX.

http://www.feyrer.de/g4u/

Winterlight wrote:

What program can image and restore  Linux partitions?




Re: [H] Linux imaging

2006-04-17 Thread Christopher Fisk

On Mon, 17 Apr 2006, Winterlight wrote:


What program can image and restore  Linux partitions?


You had a couple of responces for actual partition imaging, so I'll go on 
a slightly different vein.


If you were just going for backup, or transfer of a linux system to 
another hard drive you can just use tar, preserve permissions, etc and tar 
up the filesystem and restore to another drive.



Christopher Fisk
--
BOFH Excuse #385:
Dyslexics retyping hosts file on servers


Re: [H] Linux imaging

2006-04-17 Thread Winterlight

At 02:11 PM 4/17/2006, you wrote:

On Mon, 17 Apr 2006, Winterlight wrote:


What program can image and restore  Linux partitions?


You had a couple of responces for actual partition imaging, so I'll go on 
a slightly different vein.


If you were just going for backup, or transfer of a linux system to 
another hard drive you can just use tar, preserve permissions, etc and tar 
up the filesystem and restore to another drive.


Interesting, but this is a dual boot box. Win2K and Suse-10. So it would be 
easy for me to use a program like Ghost. I have Drive Image 7.0 but I don't 
trust it with Linux. Back in version 5 or 6 I discovered that while DI 
would back up Linux it couldn't restore it properly, it wouldn't boot. 
Maybe version 7 is better? But if Ghost works I probably have a copy on a 
old System works disk.






Christopher Fisk
--
BOFH Excuse #385:
Dyslexics retyping hosts file on servers




[H] Ransomware

2006-04-17 Thread Winterlight


http://www.foxnews.com/story/0,2933,187845,00.html

Computer Virus Demands Ransom for Encrypted Files
Wednesday, March 15, 2006
By Ryan Naraine

Virus hunters have discovered a new Trojan that encrypts files on an 
infected computer and then demands $300 in ransom for a decryption password.


The Trojan, identified as Cryzip, uses a commercial zip library to store 
the victim's documents inside a password-protected zip file and leaves 
step-by-step instructions on how to pay the ransom to retrieve the files.


It is not yet clear how the Trojan is being distributed, but security 
researchers say it was part of a small e-mail spam run that successfully 
evaded anti-virus scanners by staying below the radar.


While this type of attack, known as ransomware, is not entirely new, it 
points to an increasing level of sophistication among online thieves who 
use social engineering tactics to trick victims into installing malware, 
said Shane Coursen, senior technical consultant at Moscow-based anti-virus 
vendor Kaspersky Lab.


The LURHQ Threat Intelligence Group, based in Chicago, was able to crack 
the encryption code used in the Cryzip Trojan and determine how the files 
are encrypted and the payment mechanism that has been set up to collect the 
$300 ransom.





According to a LURHQ advisory, Cryzip searches an infected hard drive for a 
wide range of widely used file types, including Word, Excel, PDF and JPG 
images.
Once commandeered, the files are zipped and overwritten by the text: 
Erased by Zippo! GO OUT!!!
The Trojan then deletes all the files, leaving only the encrypted file with 
the original file name, followed by the _CRYPT.ZIP extension.
A new directory named AUTO_ZIP_REPORT.TXT is created with specific 
instructions on how to use the E-Gold online currency and payment system to 
send ransom payments.


The instructions, which are marked by misspellings and poor grammar, 
contain the following text: Your computer catched our software while 
browsing illigal porn pages, all your documents, text files, databases was 
archived with long enought password. You can not guess the password for 
your archived files - password lenght is more then 10 symbols that makes 
all password recovery programs fail to bruteforce it (guess password by 
trying all possible combinations).


The owner of the infected machine is warned not to search for the program 
that encrypted the data, claiming that it simply doesn't exist on the hard 
drive.


If you really care about documents and information in encrypted files you 
can pay using electonic currency $300, the note says. Reporting to police 
about a case will not help you, they do not know password. Reporting 
somewhere about our E-Gold account will not help you to restore files. This 
is your only way to get yours files back.


The Trojan author uses scores of E-Gold accounts simultaneously to get 
around potential shutdowns, according to LURHQ, which published the 
complete list of E-Gold accounts in the advisory.


Officials from E-Gold, which operates out of the Caribbean island of Nevis, 
were not available for comment.
Infection reports are not widespread, so it is not believed this is a mass 
threat by any means, LURHQ said.
However, the company said social engineering malware is typically more 
successful when it is delivered in low volume to get around anti-virus 
detections.
[M]ore attention means the likely closing of the accounts used for the 
anonymous money transfer, LURHQ said.




RE: [H] Ransomware

2006-04-17 Thread Mesdaq, Ali
We were the first to discover Ransomware :-) way back about half a year
or more ago

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Winterlight
Sent: Monday, April 17, 2006 4:27 PM
To: hardware@hardwaregroup.com
Subject: [H] Ransomware


http://www.foxnews.com/story/0,2933,187845,00.html

Computer Virus Demands Ransom for Encrypted Files
Wednesday, March 15, 2006
By Ryan Naraine

Virus hunters have discovered a new Trojan that encrypts files on an 
infected computer and then demands $300 in ransom for a decryption
password.

The Trojan, identified as Cryzip, uses a commercial zip library to store

the victim's documents inside a password-protected zip file and leaves 
step-by-step instructions on how to pay the ransom to retrieve the
files.

It is not yet clear how the Trojan is being distributed, but security 
researchers say it was part of a small e-mail spam run that successfully

evaded anti-virus scanners by staying below the radar.

While this type of attack, known as ransomware, is not entirely new,
it 
points to an increasing level of sophistication among online thieves who

use social engineering tactics to trick victims into installing malware,

said Shane Coursen, senior technical consultant at Moscow-based
anti-virus 
vendor Kaspersky Lab.

The LURHQ Threat Intelligence Group, based in Chicago, was able to crack

the encryption code used in the Cryzip Trojan and determine how the
files 
are encrypted and the payment mechanism that has been set up to collect
the 
$300 ransom.




According to a LURHQ advisory, Cryzip searches an infected hard drive
for a 
wide range of widely used file types, including Word, Excel, PDF and JPG

images.
Once commandeered, the files are zipped and overwritten by the text: 
Erased by Zippo! GO OUT!!!
The Trojan then deletes all the files, leaving only the encrypted file
with 
the original file name, followed by the _CRYPT.ZIP extension.
A new directory named AUTO_ZIP_REPORT.TXT is created with specific 
instructions on how to use the E-Gold online currency and payment system
to 
send ransom payments.

The instructions, which are marked by misspellings and poor grammar, 
contain the following text: Your computer catched our software while 
browsing illigal porn pages, all your documents, text files, databases
was 
archived with long enought password. You can not guess the password for 
your archived files - password lenght is more then 10 symbols that makes

all password recovery programs fail to bruteforce it (guess password by 
trying all possible combinations).

The owner of the infected machine is warned not to search for the
program 
that encrypted the data, claiming that it simply doesn't exist on the
hard 
drive.

If you really care about documents and information in encrypted files
you 
can pay using electonic currency $300, the note says. Reporting to
police 
about a case will not help you, they do not know password. Reporting 
somewhere about our E-Gold account will not help you to restore files.
This 
is your only way to get yours files back.

The Trojan author uses scores of E-Gold accounts simultaneously to get 
around potential shutdowns, according to LURHQ, which published the 
complete list of E-Gold accounts in the advisory.

Officials from E-Gold, which operates out of the Caribbean island of
Nevis, 
were not available for comment.
Infection reports are not widespread, so it is not believed this is a
mass 
threat by any means, LURHQ said.
However, the company said social engineering malware is typically more 
successful when it is delivered in low volume to get around anti-virus 
detections.
[M]ore attention means the likely closing of the accounts used for the 
anonymous money transfer, LURHQ said.




[H] Annoying Asus A7V8X-X on boot up?

2006-04-17 Thread W. D.
Asus A7V8X-X boots up with the following message:


Select Boot Device.
Use UP ARROW or DN ARROW, then Enter
or press Esc to exit.
1. (Hard Drive)
2. (DVD)
3. Floppy
4. SCSI Device


Can't get it to boot automatically.  Looked
at all the BIOS settings.

Has anyone seen this before?




Start Here to Find It Fast!™ - http://www.US-Webmasters.com/best-start-page/
$8.77 Domain Names - http://domains.us-webmasters.com/




Re: [H] Annoying Asus A7V8X-X on boot up?

2006-04-17 Thread FORC5
check your battery
fp

At 09:09 PM 4/17/2006, W. D. Poked the stick with:
Asus A7V8X-X boots up with the following message:


Select Boot Device.
Use UP ARROW or DN ARROW, then Enter
or press Esc to exit.
1. (Hard Drive)
2. (DVD)
3. Floppy
4. SCSI Device


Can't get it to boot automatically.  Looked
at all the BIOS settings.

Has anyone seen this before?




Start Here to Find It Fast!™ - http://www.US-Webmasters.com/best-start-page/
$8.77 Domain Names - http://domains.us-webmasters.com/

-- 
Tallyho ! ]:8)
Taglines below !
--
By the time we've made it, we've had it.




Re: [H] Annoying Asus A7V8X-X on boot up?

2006-04-17 Thread Wayne Johnson

At 12:09 AM 4/18/2006, W. D. typed:

Can't get it to boot automatically.  Looked
at all the BIOS settings.

Has anyone seen this before?


Only when there wasn't a bootable device in any of the drives /or 
the cmos battery had died.



--+--
   Wayne D. Johnson
Ashland, OH, USA 44805
http://www.wavijo.com