A few months ago a tool was released that can record Live interactions of people maneuvering through your site. This tool tracks and logs data entry and mouse clicks and you can replay their session as many time as you want.
The sole purpose for these guys to create this Clicks Plugin was to allow the webmaster to increase his or her conversion rate if they are trying to sale stuff. On the other hand, one could find this tool useful in seeing how someone was able to deface your website and replace it with “Hacked by Chinese” with just a few minor tweaks.
The computer is an important part of our lives. Sending letters have been entirely changed through emails. Communications have been dominated by instant messaging and texts. Portable storage devices that were only known to IT professionals are now used by the general public. We already have an idea of what computer forensics is but what does happen in a typical investigation?
The computer crime scene
First like any other investigation would start, the location is regarded as a crime scene. The computer analyst will take digital photographs and secure documentary evidence. This includes printouts, notes and disks in the scene. If you have hired a computer forensic expert you should leave everything to them. The computer system should left as it is whether it is turned on or off.
When building out your data center with servers, you really have 3 options. Either buy Tower based servers, rack servers or blade servers.
Deciding on which type of server farm you want all depends on the real estate you have to house them, your long term growth plan and of course your budget.
Tower servers are generally on the lower end price-wise but can grow quickly into a very expensive solution.
As I had mentioned above about real estate, tower servers take up a lot of space because they are individual systems that also require individual monitors, keyboards which would also require a place for these peripherals to set on.
Rack servers are commonly used in medium to larger sized data centers. These servers are normally mounted inside of a rack or medal cage that, for example, would be 42″ tall and 19″ wide.
A few years ago, Deduplication was the industries biggest buzz word. Well that hype actually pan-out and is a vital way to save disk space. In a nutshell, Deduplication is the process of eliminating duplicate copies of data.
Now instead of having an appliance dedup the data, Sun’s Zettabyte File System (ZFS) will do it for you.
Do you have a hacked Mac netbook? Well the new Mac OS X Leopard 10.6.2 will not work on the Intel Atom processor.
According to Stellarola, with the current developer build of 10.6.2, Apple appears to have changed around a lot of CPU related information. He suggests that if you are a Hackintosh user with an Intel Atom based netbook, stick with 10.6.1.
Keep in mind that this is the current developer build. If we are lucky, Apple will fix or adjust any CPU changes and allow Atom Hackintosh users to continue. In my Minds-Eye, this is just another way for Big Apple to rake in more money by having OS X users pay big premiums for their product.
If the final release of 10.6.2 still breaks on the Atom Processor. I am sure the hackintosh community will band together and come up with a workaround, so stay tuned.