کاربردی ترین کلید های ترکیبی در محیط دستوری سیسکو
Ctrl + a به اول خط دستور می رود
Ctrl + e به آخر خط دستور می رود
Ctrl + D کاری شبیه delete را انجام می دهد
Ctrl + Z و Ctrl + C برگشت به حالت user mode
Ctrl + P نشان دادن دستور قبلی که می توان با کلید های جهتی این کار را انجام داد
Shift + V ایپ کردن علامت سوال "؟"
Ctrl + R اینتر کردن بدون اینکه دستوری اجرا شود و همان دستور با ادامه در خط زیر باشد
Ctrl + W پاک کردن یک command یا دستور مثلا در این sh ip interface این را اجرا کنیم دستور interface از آخر خط پاک می شود
Ctrl + U پاک کردن یک دستوری که نوشتیم (مثلا sh ip interface را نوشتیم با اجرای این کلا پاک می شود )
According to MSI and Biostar representatives on the Computex 2015 show floor, speaking to PC Gamer, motherboards that feature Intel's new Z170 chipset will become available this August
The Z170 is the flagship chipset in Intel's upcoming 100-series line, all of which have been designed to support Intel's new 'Skylake' processors. Like with many of Intel's past CPU launches, Skylake requires a new CPU socket as well as a new chipset, with Intel moving to LGA 1151 in this release
Skylake also brings support for DDR4 RAM, bringing the new memory technology to Intel's standard consumer platform after it first debuted in the company's enthusiast Haswell-E and server platforms last year. A Z170 chipset paired with a Skylake CPU will also support more PCIe lanes than the previous generation, thanks to increased bandwidth from the CPU to the chipset
Now that motherboard manufacturers have revealed that 100-series motherboards will hit the market in August, we're beginning to get a clear picture of when Intel will launch Skylake. Supporting motherboards typically hit the market shortly before a processor launch, making a late-August or early-September Skylake launch likely, especially as system builders will begin selling Skylake-powered PCs in September
The launch of Skylake will come just a few months after the delayed launch of performance Broadwell parts, which Intel says will hit the market in around a month following their announcement at Computex just a few days ago. With Skylake's launch just around the corner, it's not surprising to see Intel only launch two socketed Broadwell CPUs, neither of which are particularly exceptional
The specifications for USB 3.1 were finalized nearly a year and a half ago. Commonly referred to as SuperSpeed Plus, it promises even faster transfer rates than USB 3.0 solutions and with hardware now trickling down to end-users, we’re finally getting to see what it can do in the real world.
On paper, USB 3.1 offers double the signaling speed at 10Gbps. It also modifies the line encoding scheme from 8b/10b to 128n/132b. What this means is that only four bits out of every 132 are set aside for encoding overhead versus two out of every 10. All things considered, USB 3.1 has a maximum theoretical effective transfer rate of between 500MB/sec to 1.21GB/sec.
Using a prototype USB 3.1 enclosure loaded with two Samsung 840 EVO SSDs in RAID 0 and an Asus Z97-A/USB 3.1 (Asus also supplied the enclosure and drives), The Tech Report set out to see just what sort of numbers they could squeeze out of the setup.
Using CrystalDiskMark to measure sequential read and write speed as well as 4K random reads / writes, the publication recorded sequential read speeds of 781.2MB/sec and writes of 797.8MB/sec. In the same test, USB 3.0 scored just 446.5MB/sec and 448.6MB/sec, respectively.
4K random reads checked in at 35.8MB/sec with writes scoring 79.6MB/sec, compared to USB 3.0 read / write speeds of 26.2MB/sec and 27.3MB/sec.
As you can see, there’s plenty of speed to be had with USB 3.1. Motherboards supporting the spec, like the one used in TTR’s testing, are already available for purchase. Finding an enclosure to support SuperSpeed Plus, however, may take a bit as I was unable to locate any for sale as of writing. I suspect it won’t be long before they start cropping up at your favorite online retailer.
Mozilla has finally released a 64-bit version of their Firefox web browser for Windows, joining other major browsers including Google Chrome, Internet Explorer and Opera in offering 64-bit variants.
However, at this stage the 64-bit version of Firefox is a Developer Edition build, which is one of Mozilla's beta builds of Firefox. While the Developer Edition channel is far more stable than the Nightly channel, it's not the same as the main builds of Firefox that users will typically download. As such, 64-bit Firefox could be considered as being in the beta phase at this stage.
If all goes to plan, Mozilla will release a stable version of 64-bit Firefox for Windows with Firefox 38, scheduled for release in May. At that point it will sit alongside the already-released 64-bit variants for OS X and Linux.
Firefox 38 Developer Edition, complete with 64-bit addressing, brings support for web applications larger than 4 GB, which is great for developers wanting to build large browser-based games. Thanks to new hardware registers and a larger address space, Mozilla claims the 64-bit version is also faster and more secure than before.
The latest Developer Edition also includes some WebRTC changes and fixes, as well as a few other improvements for developers. Anyone interested in upgrading to the 64-bit version of Firefox can do so via Mozilla's Developer Edition page.
Security researchers at Kaspersky Lab have unearthed a suite of surveillance platforms that can hide within the firmware of hard drives from more than a dozen manufacturers. The attackers, which Kaspersky is calling the Equation Group due to their complex skill set, are the most advanced that the researchers have encountered to date.
The programs, some of which date back to 2001, appear to have been developed in succession with each new program being more sophisticated than the last according to Wired.
Personal computers in more than 30 different countries have been discovered to carry the infection, Kaspersky said.
One of the worms uncovered has direct connections with Stuxnet and may have even been used as a test to help figure out the best route for the malware to reach systems involved in Iran’s nuclear program. Researchers didn’t name who they believe might be behind the attacks although there’s a good bit of circumstantial evidence that points to the NSA.
One component of the suite, GrayFish, is able to reflash the firmware on hard drives. Because it resides in the firmware, reformatting the drive doesn’t get rid of the infection. Key to being able to rewrite the firmware is having access to source code. If the NSA is indeed behind the attacks, getting source code wouldn’t present too much of an issue.
In addition to physically intercepting shipments (in this case, hard drives) and loading them with malware before repackaging and sending to targets, the NSA could have simply asked manufacturers for their source code (directly or indirectly) or posed as software developers.
Things took a turn from bad to worse from Lenovo this week. After the embarrassment that was Superfish last week, the Chinese computer maker’s website recently fell victim to hackers.
For a brief period on Tuesday afternoon, those visiting lenovo.com in search of a new computer or drivers were instead met with a bizarre series of photos of teens set to the pop song Breaking Free from High School Musical. As of writing, the site is offline due to "system maintenance."
The source code of the hacked page references it as the new and improved rebranded Lenovo website featuring Ryan King and Rory Andrew Godfrey. These two individuals have previously been ousted as members of Lizard Squad.
Clicking on the slideshow would take visitors to Lizard Squad’s Twitter account.
By all accounts, this appeared to be a DNS hijacking that granted attackers the ability to redirect traffic from lenovo.com to a server under their control. A visit to the squad’s Twitter account, however, suggests they may have somehow gained access to some of the company’s e-mail accounts / e-mails.
In one screenshot of an e-mail, we learn that removal of the Superfish software on one customer’s computer resulted in a bricked device.
Speaking of, it’s likely that this hacking incident is in direct relation to Superfish – a piece of adware that Lenovo had been secretly adding to machines. After getting caught red-handed last week, the company released a removal tool and vowed to never use it again.