Vistawired had an excellent tip yesterday on how you can increase the number of simultaneous downloads using Microsoft’s Internet Explorer 7.

IE7 currently has a limitation on the number of simultaneous downloads at 2. This can be a problem for those who do not use any Download managers or Mozilla Firefox. Firefox does not have this limitations and considered a more secure browser. Now, you too can

In order to remove this limitation, follow the guide below where you need to make some small tweaks in your registry and increase the number of simulaneous downloads in Internet Explorer.

Step # 1: Click on Start. Go to run and type in regedit. If you are using Windows Vista, type regedit in the search bar. Or best tip, type in <windows key> + R to launch the run prompt and then type in regedit

launch the registry editor using the run prompt

For all the geeks out there, do you know someone who tried to teach themselves how to read Barcode? Here is a list of Geek quotes, sayings and phrases. Some of them are from Boardofwisdom who put together a nice compilation themselves.

#1. Roses are #FF0000, Violets are #0000FF. All my base Are belong to you  — someone on SlashDot

#2. There is no place like 127.0.0.1

#3. Girls are like Internet Domain names, the ones I like are already taken

#4. Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better idiots. So far, the Universe is winning

#5. Computers are incredibly fast, accurate, and stupid; humans are incredibly slow, inaccurate and brilliant; together they are powerful beyond imagination. — Albert Einstein

#6. There are 10 types of people in the world: Those who understand binary and those who don’t.

#7. If at first you don’t succeed, call it version 1.0

#8. 1f u c4n r34d th1s u r34lly n33d t0 g37 l41d

Genesis Take Two

1. In the beginning GOD created the Bit and the Byte. And from those he created the Word.

2. And there were two Bytes in the Word; and nothing else existed. And God separated the One from the Zero; and he saw it was good.

3. And God said – Let the Data be; And so it happened. And God said – Let the Data go to their proper places. And he created floppy disks and hard disks and compact disks.

4. And God said – Let the computers be, so there would be a place to put floppy disks and hard disks and compact disks.
Thus God created computers and called them hardware.

5. And there was no Software yet. But God created programs; small and big… And told them – Go and multiply yourselves and fill all the Memory.

6. And God said -I will create the Programmer; And the Programmer will make new programs and govern over the computers and programs and Data.

7. And God created the Programmer; and put him at Data Center; And God showed the Programmer the Catalog Tree and said “You can use all the volumes and subvolumes but DO NOT USE Windows.”

In late 2001, Microsoft released the Xbox, their first gaming console, to compete  against Sony and Nintendo in the living room. As the real money is made with the games and not the consoles, Microsoft had to make sure (as much as they could) that nobody could play pirated games or use the machine for anything other than games. Although the original security design idea was a good one and has been copied a lot since then, Microsoft’s inexperienced team made a variety of design, implementation, and policy mistakes. This talk first (re)constructs the design of the Xbox security system from Microsoft’s point of view, and then deconstructs it from the hacker’s point of view. As a bonus, the talk will feature some insights in the security system of the Xbox successor, the Xbox 360.

Michael Steil is the founder and maintainer of the Xbox-Linux Project. He oversaw most of the Xbox hacks and also contributed to hacking, reverse engineering and porting Linux on the Xbox.  

This is really good. The types of errors or oversights that allowed the hackes to compromise the Secret ROM tend to happen a lot in any complex project, even when the people involved are highly competent and conscientious.

Cliffs Notes version of this video:
Legacy code and hacks for 8080/286 systems posed openings

The southbridge by Intel was where the SecretROM was stored and traffic was able to be sniffed

They made changes from using RC5 to RC4 for encryption, and how they thought RC4 worked didn’t actually work that way.

They switched from AMD to Intel chips at the last minute and Intel chips have that legacy hack that allows code to circle back in RAM (AMD chips don’t allow for this)

Savegames posed a good loophole as that code can’t be hashed or checked, so a buffer overflow was exploited and allowed unsigned code to be run. Microsoft patched this, but hackers then realized that what MS did to fix this exploit actually opened up this loophole wide, as the method used had to do with Xbox Live, (which has to work on every version of Xbox (1.0 through 1.6)) and since every game has to work on every Xbox ever made, they could not patch it.

Microsoft has been hiding easter eggs in their programs for years. This shows the last known easter egg to come out in an office suite in Excel 2000. If you have Excel 97, first: please upgrade to a newer version. Second: before you upgrade, open a new workbook in Excel 97. Open a new workbook Press F5Enter X97:L97 and press Enter Press Tab Press Ctrl Shift and click the Chart Wizard button on the toolbar. You’ll be greeted with a full-screen animated image. Use the mouse to move around.

Trigger the egg. You’ll be looking at a purple 3D landscape. Use the mouse to “fly” over the landscape (the mouse changes direction, left button moves forward and left button moves backwards). Fly around a bit and you’ll see a grey stone pyramid. Fly to the side of the pyramid that’s black and you’ll see the credits scroll by for the developers.

Now, follow the instructions to launch a car racing/shooting game in MS Excel 2000.