Jump to content
Search In
  • More options...
Find results that contain...
Find results in...


  • Content Count

  • Joined

  • Last visited


This user doesn't have any awards

About RafaelSoaresP

  • Title
  • Birthday Dec 03, 1991

Profile Information

  • Location
    SP - Brazil
  • Gender


  • CPU
    I7 4770K 4.5Ghz
  • Motherboard
    Asus B85M-e
  • RAM
    16 GB DDR3 Corsair Vengeance
  • GPU
    XFX AMD R9 290
  • Case
    Thermaltake V3
  • Storage
    2 x 1 TB Seagate HDD (RAID 0) & 2 x 1 240 GB Kingston SSDs
  • PSU
    Corsair GS800 80+ Bronze
  • Display(s)
    32'' Samsung 5500 LED Tv
  • Cooling
    Viper Venon Vodoo (CPU) + Arctic Accelero Xtreme III (GPU)
  • Keyboard
    Razer Blackwidow + Razer Nostromo
  • Mouse
    Razer Deathadder
  • Operating System
    Windows 10

Recent Profile Visitors

774 profile views
  1. Throws a dildo "Nice catch" "No hands" Holy shit. Prime content
  2. It will change on the SSH service provider. I'm not aware of configs specific to minecraft servers, but my advice still applies. Do not open it to the web, do it via VPN or remote access.
  3. Lol, I'd sell you mine for 1000USD with water cooling. Hahaha That price is not worth at all!
  4. You would need to open a port specific to SSH. I would absolutelly recommend AGAINST doing it though, as it's imensely dangerous to open such service to the web directly. Try to setup a VPN to your network and use SSH trough it.
  5. It is in fact a company setup. I'm looking at using encryption based on certificates / keys that are installed to the user based on GPO upon login to our AD. I'm still experimenting with it, but in theory, if someone has the files, but is not logged in our domain, they wouldn't have the key to decrypt it, and the data should be safe if copied to somewhere outside our network. Thanks to everyone for all the input so far.
  6. That's what I thought Any suggestions to avoid data accessibility to possible attrackers besides not getting infected on the first place?
  7. I see three possible vectors: Attacker gets access to the server itself - This might be the easiest way to the attacker recover and release the data, as it's already accessible from the OS; Attacker gets access to a client that is connected trough the network storage - might be just as easy to copy the files that the specific user has permissions to access, as they are accessible trough the OS; Attacker uses some network vulnerability to attack the server - This might be the "least worse" scenario, as the files should be encrypted to non participants of the network share.
  8. Hi guys! I run a couple of Windows servers at work, for network storage. We have daily cloud backups and AV/AR, so data availability /restoration is not an issue, but I'm worried about data leaks in case of ransomware attacks. Does disk encryption (bitlocker, or something similar) help to prevent the data from being read / released by the attacker? Or is it already decrypted when they copy it from my OS to their server?
  9. Why are you guys not using Synergy to have a single keyboard / mouse for both machines? I mean, they were a sponsor a while ago.
  10. Those temps are pretty low tbh. You shouldn't worry with it.
  11. RX 470 looks awesome for my needs, just need to find somewhere it's available now. Thanks!
  12. Does it matter if I go Nvidia or AMD? I'm looking at the XFX Radeon RX 570 4GB. Not the cheapest, but it seems to get the job done. Any other recomendations? I can only seem to find it with VGA + HDMI + DVI. Haven't found any with 4 HDMI.
  13. Hi guys! I'm considering replacing the videowall solution we have at work (it uses some shitty network based proprietary solution) with one GPU (or two) that supports 6 4k60 (30hz is acceptable) displays. I'll be using it to monitor multiple browser based security cam streams (average of 127kbps per camera, but I can't extrapolate GPU resource consumption from this). I've been looking to get two Quadros P620 mainly due to the low price (economy in Brazil is a joke right now), but one of the salesman told me it would not support SLI and wouldn't work for the 6 displays, even thou
  14. 17 PIA users who were using VPN to download torrents got sued in the US. PIA confirms to have a no log policy, but aparently the users registered accounts on the websites using their real email addresses. Don't forget that anonymous traffic is not the same as anonymity . Don't be dumb, and don't register stuff using your actual email. VPNs by themselves won't make you untraceable Sources https://torrentfreak.com/movie-company-sues-pirates-who-used-an-anonymous-vpn-201026/