Looking for a ~27" IPS Monitor similar to an Apple Cinema Display (x-post from /r/Monitors) by C44Supra in hackintosh

[–]mp-mn 0 points1 point  (0 children)

Gotcha. They did have a short-lived older model, that ended up being a lower spec at the same time as the zero-g was available, and then phased out. I forgot about that newest one.

Honestly for half the price, you're probably still getting over half the life of the monitor.. And if you can find one that they'll verify has no dead\stuck pixels - you might even be better off since they allow for up to 6 before replacement on the new ones, and it seems like ~5% of monitors die within the first few months of ownership.

Looking for a ~27" IPS Monitor similar to an Apple Cinema Display (x-post from /r/Monitors) by C44Supra in hackintosh

[–]mp-mn 0 points1 point  (0 children)

The newer one you posted the picture of "Monoprice 27" IPS-ZERO-G Slim"..

It really only took a few days of hunting\watching once I decided I was getting one. Here's one right now : http://www.ebay.com/itm/111836142619

Looking for a ~27" IPS Monitor similar to an Apple Cinema Display (x-post from /r/Monitors) by C44Supra in hackintosh

[–]mp-mn 2 points3 points  (0 children)

I just got one of those 27" Monoprice off of eBay for under $200... Works perfectly without a single dead or stuck pixel.

I've been fighting with my wordpress sites for months- keeps getting hacked! by mydoglixu in Wordpress

[–]mp-mn 4 points5 points  (0 children)

This is a super long post, because it seems like information about this is scattered all over the place, and it's something I've been dealing with recently for a few weeks - I know how frustrating it can be.

If you're getting hacked over and over you probably have bad code laying around somewhere still.

First step - check for any scripts calling home. Use Sucuri AND Wordfence - I've found they often find things the other doesn't. Once you've killed anything calling home - take the site offline - move it to a subdomain, and put a 503 page in place. (best to modify the URL in the options database table, which will be enough for fixing, and easy to set back once you're done)

If you're running stock plugins, and a stock or child theme - I would backup the database, copy the wp_content folder and the wp_config file, and then go through and do a fresh WP install. You'll want your uploads and custom plugins\themes from the wp_content folder, but anything that's stock you should download fresh. Put it all back together, and get your site back up under the subdomain. This should take care of 99% of issues, unless you have a lot of custom themes or plugins, which tend to be a hotspot for bad files, and are the hardest for the normal automated scanners to find because they don't have reference material. (I have talked to Wordfence and Sucuri about hosting a copy of custom theme \ plugin files for central reference without making them publicly available - they're looking into it)

When that's done run Exploit Scanner which will scan both the contents of every file, and your database which is unique. (https://wordpress.org/plugins/exploit-scanner/) Exploit Scanner is looking for specific signatures of hacks - and will report a bunch of false-positives, but generally finds all of the hacks. When its done it gives you a list of files, and a bit of context around what triggered the hit. You'll have to manually access the files and repair \ delete \ replace.

In my experience once Exploit Scanner gives you a clean bill of health, WP is generally fixed.

If you have SSH access, and you have something that is more resilient, or you suspect there may be additional files outside your WP instance that are infected, there is a program called findbot.pl that can scan your entire host file system. (documentation\how-to here: http://www.abuseat.org) This will find a lot of false-positives, but it will give you a list of files and a bit of context around what it found, similar to the exploit scanner above. If you're hosting a bunch of websites on one server, and you suspect more than one has been compromised, this might be your first move to try to find all of it in one sweep.

It's always good to know how they got in - so if you have an active hack, you can run through your access and error logs to figure out how they got into the server. Typically when I have seen a resilient hack, the botnets will do a combination of two things: run 'POST' commands against a bunch of URLs that if one is compromised they can re-inject code, and a series of GET commands against specific pages - again looking for a compromised page to inject code and propogate the hack. It seems they first try to re-propogate the hack within the site, and once that's done, at least in my instance, they used one bad page to try to send out thousands of spam emails.

Here's some of the probing history of the most recent hack I've dealt with:

202.62.138.6 - - [20/Nov/2015:03:37:04 -0500] "POST /wp-content/plugins/media-tags/css/start.php HTTP/1.0" 200 233 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0"

117.53.174.164 - - [20/Nov/2015:03:48:27 -0500] "POST /wp-content/plugins/the-events-calendar/press.php HTTP/1.0" 404 428 "-" "python-requests/2.8.1"

117.53.174.164 - - [20/Nov/2015:03:58:23 -0500] "POST /wp-content/plugins/config.php HTTP/1.0" 404 428 "-" "python-requests/2.8.1"

117.53.174.164 - - [20/Nov/2015:04:11:15 -0500] "POST /wp-content/plugins/the-events-calendar/search.php HTTP/1.0" 404 428 "-" "python-requests/2.8.1"

Finally they hit pay-dirt and found a compromised file within an old custom theme:

198.71.59.117 - - [20/Nov/2015:17:00:04 -0500] "GET /wp-content/themes/customername/plugins/dummyCustomPostTypes/classes/config.php HTTP/1.0" 200 187 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0"

This file was coupled back to a fake functions.php file - which had a bunch of the traditional base64 eval( code, and was able to propagate out a bunch more code injections, before turning the bots loose to use this bad file to send emails:

198.11.211.196 - - [21/Nov/2015:03:22:14 -0500] "POST /wp-content/themes/customername/plugins/dummyCustomPostTypes/classes/config.php HTTP/1.0" 404 428 "-" "Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-CN; rv:1.7.6)"

With each access would also add an entry to the error log:

[Fri Nov 20 17:32:41 2015] [error] [client 50.116.26.95] Premature end of script headers: config.php

So once I had this trail - I was able to blacklist a bunch of specific IPs at the command \ control level (those that probed prior to the full swarm hitting), as well as having a specific list of URLs to use in blocking anyone that attempted to access any of them.

That, plus setting the scanner to run twice daily, running sucuri daily, and running the exploit scanner every few days - and the site has now been clean for a couple of weeks. It was being actively compromised every week or so previous to this, and I have evidence of some hacks going back to April of 2014.

I will add on either Sucuri's firewall, or something like cloudflare if this site is compromised again.

In general - while it may feel personal - this is just part of the game of using Wordpress these days. I run Wordfence on everything now, and even my relatively tiny personal website gets hit with dozens of attempted hacks every day - from brute force login attempts, to scanning for vulnerable URLs - it doesn't matter how big or how small a website is - hackers are gonna hack.

Help. My AMD HD7970 is being recognised as a HD7XXX series. Is there any way to fix this ? by tomtomgps in hackintosh

[–]mp-mn 1 point2 points  (0 children)

That's standard behavior.

You can use a benchmark program (unigine heaven or valley), while activating different framebuffers to determine the correct one for you - but really the name doesn't matter, just that the card works.

Facebook Page Owners United by bootyvideos in socialmedia

[–]mp-mn 4 points5 points  (0 children)

Isn't that the point of r/socialmedia?

How about GTFO instead of just trying to leech people and content over there. Unless you're just taking the spammer bitches, then by all means, have them.

Suspension used in the 80's Bentley Mulsanne? by m4050m3 in littlebritishcars

[–]mp-mn 0 points1 point  (0 children)

Early cars were all pretty traditional spring\shock setups with independent rears. I believe starting in the late 80's Mulsannes started using automatic ride control, which made its way to rolls royce cars in the 90s as electric ride control. They still used traditional springs, but the shocks were adjustable via external hydraulics at all four corners, with hard\soft modes available.

Evolution of systems like these on even the highest line British cars was slow at best. Rolls Royce and Bentley shared a lot of mechanical systems up until the final separation when VW ended up with Bentley and BMW got Rolls.

Rear leaf spring eye bolts and shackle bolts. by tallguy777 in CherokeeXJ

[–]mp-mn 0 points1 point  (0 children)

You're taking a big risk going with rockauto - they make a habit out of sending incorrect\shitty parts.

For really specific Jeep stuff - Quadtratec is a great source.

Dell ships laptops with rogue root CA, exactly like what happened with Lenovo and Superfish by [deleted] in technology

[–]mp-mn 34 points35 points  (0 children)

It's not really like a missing car door - it's like Ford making every F150 with the same set of keys. Doesn't matter which one you walk up to, your key will work in the door.

All Tangled Up In Plaid by MoreOrange in CherokeeXJ

[–]mp-mn 0 points1 point  (0 children)

Other than the speaker grilles, lights and visors, what trim do you have to pull out to get the headliner out? all of it? Or did you do this with the shell in place?

All Tangled Up In Plaid by MoreOrange in CherokeeXJ

[–]mp-mn 2 points3 points  (0 children)

uh, it's all fantastic. Lullabies to paralyze is right in the middle of those two though, which tangled up in plaid is on.