Month: November 2008

About: Core i7 (Nehalem)

About: Core i7 (Nehalem)

nehalem-die_right_perspective

Intel Core i7, the newest processor family in town, is now available in the US Market. It is based on the Nehalem microarchitecture and built on a 45 nm process.

If you’re aware of the Tick-Tock method of Intel, Core i7 is the tick stage. The ‘tock’ part will come soon with codename Westmere and will be utilizing the 32nm process.

Core i7 has the ff. new features/technologies:

  • Quad-core technology –> native, unlike the Intel Core 2 Quad
  • Hyper-threading –> 2 threads for each core
  • Turbo Boost technology –> translate the power budget from unused/off core to increase frequency of the core in use
  • QuickPath interconnect –> replaces the FSB
  • LGA1366 socket –> replaces the old LGA775
  • 8MB Smart Cache –> L3 cache on-die
  • Integrated memory controller

Other notable features:

  • 731 million transistors
  • 263mm^2 die size
  • 45 nm manufacturing process

The big question (more like a frustration) is WHEN will this be available locally. It’s only been a few years since the popularity of the Intel Core 2 Duo has dominated the local market, while the quad version Intel Core 2 Quad is still in testy waters until recently. But I’m glad it’s already out there.. Soon probably it will reach our shores. DDR3 and motherboard are still not cheap yet anyway.

Read More Read More

WPA Cracked

WPA Cracked

A German graduate student found an exploit using a modified version of the existing attack on Wired Equivalent Privacy (WEP) to provide a slim vector for sending arbitrary data to networks that use the Temporal Key Integrity Protocol (TKIP). This attack is now known as the Tews/Beck Method.

If you’re using WPA-TKIP, there’s a simple solution: use AES.

Am i just lucky i always choose AES over TKIP? Anyway, I can’t remember where i read it first. But you can read more at Ars Technica.

Terms:
TKIP – Temporal Key Integrity Protocol
AES – Advanced Encryption System

DD-WRT now supports WRT54G2

DD-WRT now supports WRT54G2

Yay to all of us who’s been waiting for this forever! DD-WRT, my choice of 3rd party firmware, is now providing firmware for Linksys WRT54G2 (i.e. the newer Linksys router version in the market). This new version has additional checksums that made it harder to *hack.

The basic steps, as posted here courtesy of DD-WRT developer Eko, are as follows:

—— VxWorksPrep-G2V1 & VxWorksKiller-G2V1.bin ———

Get and install Linksys tftp.exe, set your PC to static IP, 192.168.1.10.

1. Reset the router to defaults on the Linksys Admin page, and let it reboot or manually reboot it after its finished.

2. Set your computer to a static IP address of 192.168.1.10 and 255.255.255.0 for a mask and plug ethernet cable into LAN port of the G2v1 unit.

3. Close all browser windows. Start Linksys’s tftp.exe utility, set IP to 192.168.1.1 and browse to the VxWorksPrep-G2V1.bin file, enter passowrd = admin, and click Upgrade. Wait 60 seconds for it to reboot on its own, if it does not, then powercycle the router manually.

4. Don’ open any browser windows. Again start Linksys’s tftp.exe utility, and browse to the VxWorksKiller-G2V1.bin file, enter passowrd = admin, and click Upgrade. Wait 2 min for it to reboot on its own, if it does not, then powercycle the router manually.

5. Tftp the DD-WRT firmware to the router, use “dd-wrt.v24-10709_NEWD_micro.bin” from the folder where you got these instructions; after sucessful tftp, wait 3 min for the router to finish writing new nvram deafults, etc… It should reboot on it’s own at least two times, so give it the 3 min and then goto http://192.168.1.1 (If it not reboots on its own, wait another 1 min, and then power cycle it)

6. When if finishes booting up…do a hard reset on the unit…let it boot again, and configure.

7. Don’t forget to set your computer back to automatically obtaining DHCP and DNS.

———————

On normal occassion, i wouldn’t post steps when you can easily find it in the dd-wrt website. I’m just excited about this one (it also solves some of my problems), and can’t wait to try it on my own. Hmm, now where can i grab that UFO device?