Tag Archives: list

I7 5960x (retail) & MSI godlike x99 bundle £600 posted . (Both in warranty)

Stripping My gaming rig .

More items to list soon .

i7 5960x CPU

Warranty until 7th December 2018

This whats called as a “J” Batch CPU due to the lowered amount of volts needed to get a very good overlclock. With the Motherboard and Ram i used (MSI Godlike X99A & 32GB Avexir 3000mhz ram i was able to achieve very very easily 4.5ghz on a 1.25 memory strap @1.19v and nothing else was messed with on the board as i only needed to adjudt volts…

I7 5960x (retail) & MSI godlike x99 bundle £600 posted . (Both in warranty)

I7 5960x (J batch) MSI Godlike X99 bundle £550 (Both in warranty)

Stripping My gaming rig .

More items to list soon .

i7 5960x CPU

Warranty until 7th December 2018

This whats called as a “J” Batch CPU due to the lowered amount of volts needed to get a very good overlclock. With the Motherboard and Ram i used (MSI Godlike X99A & 32GB Avexir 3000mhz ram i was able to achieve very very easily 4.5ghz on a 1.25 memory strap @1.19v and nothing else was messed with on the board as i only needed to adjudt volts…

I7 5960x (J batch) MSI Godlike X99 bundle £550 (Both in warranty)

Wanted – Ultra Portable 13” laptop

I’ve got a Dell Latitude E7240 that I was about to list if it’s of any interest.

12.5″ screen
Intel i5-4210U 1.7 Ghz Processor
4GB RAM
128GB SSD drive
Windows 10 Pro

There are some scratches on the laptop lid and around the casing, happy to post pictures etc, but price wise it’s likely to be about £250 ono.

It’s a nice light portable laptop, don’t use it much now as I’ve fully moved over to the Mac side…

Wanted – Ultra Portable 13” laptop

I’ve got a Dell Latitude E7240 that I was about to list if it’s of any interest.

12.5″ screen
Intel i5-4210U 1.7 Ghz Processor
4GB RAM
128GB SSD drive
Windows 10 Pro

There are some scratches on the laptop lid and around the casing, happy to post pictures etc, but price wise it’s likely to be about £250 ono.

It’s a nice light portable laptop, don’t use it much now as I’ve fully moved over to the Mac side…

Wanted – Ultra Portable 13” laptop

I’ve got a Dell Latitude E7240 that I was about to list if it’s of any interest.

12.5″ screen
Intel i5-4210U 1.7 Ghz Processor
4GB RAM
128GB SSD drive
Windows 10 Pro

There are some scratches on the laptop lid and around the casing, happy to post pictures etc, but price wise it’s likely to be about £250 ono.

It’s a nice light portable laptop, don’t use it much now as I’ve fully moved over to the Mac side…

Wanted – Ultra Portable 13” laptop

I’ve got a Dell Latitude E7240 that I was about to list if it’s of any interest.

12.5″ screen
Intel i5-4210U 1.7 Ghz Processor
4GB RAM
128GB SSD drive
Windows 10 Pro

There are some scratches on the laptop lid and around the casing, happy to post pictures etc, but price wise it’s likely to be about £250 ono.

It’s a nice light portable laptop, don’t use it much now as I’ve fully moved over to the Mac side…

Wanted – Ultra Portable 13” laptop

I’ve got a Dell Latitude E7240 that I was about to list if it’s of any interest.

12.5″ screen
Intel i5-4210U 1.7 Ghz Processor
4GB RAM
128GB SSD drive
Windows 10 Pro

There are some scratches on the laptop lid and around the casing, happy to post pictures etc, but price wise it’s likely to be about £250 ono.

It’s a nice light portable laptop, don’t use it much now as I’ve fully moved over to the Mac side…

Wanted – Ultra Portable 13” laptop

I’ve got a Dell Latitude E7240 that I was about to list if it’s of any interest.

12.5″ screen
Intel i5-4210U 1.7 Ghz Processor
4GB RAM
128GB SSD drive
Windows 10 Pro

There are some scratches on the laptop lid and around the casing, happy to post pictures etc, but price wise it’s likely to be about £250 ono.

It’s a nice light portable laptop, don’t use it much now as I’ve fully moved over to the Mac side…

Modern Family’s Nolan Gould Joins Xbox Live Sessions to Play Fortnite Battle Royale on December 21

Hope everyone is getting ready for the upcoming holidays and has a great list of Xbox games they hope to receive! Xbox Live Sessions is back this week with Nolan Gould, widely recognized for his role as Luke Dunphy on “Modern Family.” He’ll join the interactive livestream hosted on the Mixer Xbox Channel on Thursday, December 21 at 7 p.m. PT to take on Fortnite Battle Royale.

Nolan loves gaming and he can’t wait to play Fortnite Battle Royale, the free 100-player PvP mode of Fortnite that drops players on a giant map where the last one standing wins. It combines Fortnite’s unique building gameplay and intense PvP combat for a totally unique and fast-paced battle royale experience. Be sure to tune into the livestream for the chance to submit questions to Nolan as well as win special prizes. This episode of Xbox Live Sessions will be hosted by Microsoft Studios Community Manager, Rukari Austin.

Don’t forget to tune in Thursday, December 21 at 7 p.m. PT on Mixer and keep it locked to Xbox Wire for news on future episodes of Xbox Live Sessions. Happy holidays to all!

Harvard IT exec: Take these seven cyberattack prevention steps now

Rick Kamal prefaced a list of cybersecurity tips with some advice from the annals of history. Ancient history.

The CTO at Harvard Business School invoked Galen, the Greek physician of the second century. Galen served as the personal doctor to several Roman emperors, and his discoveries influenced medicine, physiology and anatomy for 1,500 years. His teaching about maintaining good health was simple: A little prevention goes a long way, Kamal explained to an audience of IT executives.

“Yes, you can treat an ailment, but the most powerful thing to do is have good hygiene and do the right things: Exercise, eat well, avoid intoxicants, have friends and family,” Kamal said at the Argyle 2017 Information Technology and Security Forum in Boston on Thursday. “And if you do something like that, your quality of life, instead of starting a steady decline after the age of 40, is pretty good till about your 80s — and then you get a sudden decline, and you’re dead.”

Through a burst of laughter, Kamal kept a straight face. The reality is, he said, most people don’t follow Galen’s common-sense advice on health. Similarly, organizations don’t take measures that are within their control to ensure better cybersecurity: Massive data breaches at Yahoo and credit-reporting agency Equifax and the covered-up hack at Uber a year ago were all preventable, Kamal said. He enumerated a list of cyberattack prevention tips that can help organizations eliminate most threats.

“There are a lot of products, a lot of solutions out there in the security space — I’m not saying don’t look at them,” he said. “Before you go for some nichey, interesting, shiny-penny solution, first address prevention. It will get you 99 out of 100 miles there.”

A little work, a lot of benefit

The first measure companies need to take to protect their data from malicious, prying eyes is “trivial,” Kamal said: Upgrade and patch your OS. So is the second, upgrade and patch your applications.

He recounted the reasons for this year’s Equifax data breach. The point of entry for hackers was Apache Struts, open source software for developing web applications. The Struts team uncovered the vulnerability, released a patch and advised users of the software to apply it. Equifax didn’t — and they aren’t alone in neglecting to follow such simple advice.

“I’m sure many of us may not be doing it on a very deliberate and diligent basis,” Kamal said. By upgrading and patching systems, “you’ve gotten rid of about 60% to 70% of vulnerabilities.”

Next, whitelist applications, Kamal advised — to make known the ones that should run on your servers. Many organizations install virus and malware detection software, and that’s good, Kamal said. But that’s a “blacklist approach”: A compromise is identified, quarantined and then deleted. Whitelisting is different.

“It’s where in the operating system you say, ‘This is my server — I only expect applications X, Y, Z to run and processes A, B and C to run,” Kamal said. “If anything else tries to run, it just can’t.”

Applying this approach, he said, would essentially head off every ransomware and malware attack possible.

Rick Kamal, CTO at Harvard Business School, speaks at the Argyle 2017 Information Technology and Security Forum in Boston on Thursday.
Rick Kamal, CTO at Harvard Business School, speaks at the Argyle 2017 Information Technology and Security Forum in Boston on Thursday.

Keep it complicated

Kamal then flashed what looked like a toddler’s jabber on a screen: “dadada.”

“That’s somebody’s password. Can you guess whose password that is? Any guesses?” Kamal asked. “Actually, it was Mark Zuckerberg.”

The Facebook co-founder and CEO coined the password after he became a father and used it on several social media sites, including Twitter and Pinterest, which were breached last year.

Lots of people less technically inclined than Zuckerberg use weak passwords. In fact, some of the top used passwords of 2016 were “123456,” “qwerty” and “111111,” according to an analysis done by password management company Keeper Security. And as Zuckerberg did, many people use the same passwords to unlock accounts on multiple sites, as an analysis of the 2014 Sony Pictures hack showed.

“Now think about this: Your employees, who are accessing your sensitive systems, are doing the same thing,” Kamal said.

Those practices allow for credential stuffing, a type of cyberattack that starts with a stolen username and password — think the Yahoo data breach of 3 billion email accounts. It unleashes bots on a slew of websites and tries to log in, testing thousands of combinations.

“They only have a 0.1% hit rate,” Kamal said. “But guess what? Point zero percent of a billion is a million.”

The moral of this story? Use strong passwords, Kamal said. And use password vaults, or password managers, software or services that generate, store and access hard-to-crack passwords. And IT leaders will bolster cybersecurity by encouraging the use of multifactor authentication, which requires users to provide several pieces of identifiable information to prove they have authorization for a site or service.

‘Common sense’

Then, encrypt your data, Kamal said — encode text that others may find and use into an unreadable format. A lot of the data made away with in the Equifax breach was either encrypted poorly or not encrypted at all. “And it was sensitive information,” he said.

All it takes is a simple configuration or a little bit of work to encrypt data, Kamal said. But if using encryption keys — bits of code designed to scramble and unscramble information — practice proper key management. “Do not put the keys right next to the data on the same server.”

And also encrypt your keys so if someone finds them, they can’t be put to use.

Finally, secure points of entry. Ports on servers that aren’t being used should be closed to prevent unwelcome visitors. Many don’t do it, Kamal said, citing a recent analysis that found more than 80% of major organizations have open ports, “which is like leaving windows and doors open for folks to come and start poking at you,” Kamal said.

Jeffrey Cunningham, director of enterprise architecture at Thomson Reuters in Boston, said following Kamal’s advice depends partly on the amount of technical debt an organization is dealing with. An example, Cunningham said, are legacy applications at companies that have grown through acquisition, as Thomson Reuters has.

“It’s more, How do you implement it? How much tech debt do you have that prevents you from doing those things?” Cunningham said. The advice itself, he noted, is common sense. “Everyone needs to be self-aware. I mean, you need to be aware of what you’re doing and not get yourself in trouble.”