Comment 36 cores? Network on a chip? Meh! (Score 1) 143
http://www.adapteva.com/epipha...
64 cores, mesh network that extends off the chip, in production.
Try harder MIT
http://www.adapteva.com/epipha...
64 cores, mesh network that extends off the chip, in production.
Try harder MIT
A: Dismantle Google.
Apple builds OSs that largely get out of your way so you can get work done.
Enterprises like OSs that can be locked down until you can't get any work done.
Polar opposites in agendas really.
It's not about brute force ssh attacks, that's just an example, it could be RDP, or PPTP VPN for all I care, it's about ramming home the point that in a 24 hour period someone was trying to break through weak passwords. 3000 attempts, and that's a slow night.
You're ramming home the point that there is always someone trying to break in to something, doesn't matter if it's a social networking site, the VPN, or the webserver, if you're putting something online, assume it will be attacked and secure it appropriately.
Everyone knows you need a secure password. Now show them the log of the 3k connection attempts to the SSH port that occurred overnight.
Unknown Entries:
authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.46.49.199 : 2366 Time(s)
authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.73.205.44 user=root : 364 Time(s)
authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.116.236.46 user=root : 80 Time(s)
authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.73.205.44 : 73 Time(s)
Maybe ask permission to do a live demonstration of a password cracking tool. See how many passwords you can get in 2 minutes. This may be dangerous though, hide the results, just show the usernames, you don't want to find out who is using the CEO's wife's name as a password.
Really get their attention with some specifics like that.
"How to make a million dollars: First, get a million dollars." -- Steve Martin