From The Blog
-
NetSPI’s Offensive Security Offering Leverages Subject Matter Experts to Enhance Pen Testing
Written by Sean KalinichBlack Hat 2023 Las Vegas. The term offensive security has always been an interesting one for me. On the surface is brings to mind reaching…Written on Tuesday, 12 September 2023 17:05 in Security Talk Read 1258 times Read more...
-
Black Kite Looks to Offer a Better View of Risk in a Rapidly Changing Threat Landscape
Written by Sean KalinichBlack Hat 2023 – Las Vegas. Risk is an interesting subject and has many different meanings to many different people. For the most part Risk…Written on Tuesday, 12 September 2023 14:56 in Security Talk Read 768 times Read more...
-
Microsoft Finally Reveals how they Believe a Consumer Signing Key was Stollen
Written by Sean KalinichIn May of 2023 a few sensitive accounts reported to Microsoft that their environments appeared to be compromised. Due to the nature of these accounts,…Written on Thursday, 07 September 2023 14:40 in Security Talk Read 1144 times Read more...
-
Mandiant Releases a Detailed Look at the Campaign Targeting Barracuda Email Security Gateways, I Take a Look at What this all Might Mean
Written by Sean KalinichThe recent attack that leveraged a 0-Day vulnerability to compromise a number of Barracuda Email Security Gateway appliances (physical and virtual, but not cloud) was…Written on Wednesday, 30 August 2023 16:09 in Security Talk Read 938 times Read more...
-
Threat Groups Return to Targeting Developers in Recent Software Supply Chain Attacks
Written by Sean KalinichThere is a topic of conversation that really needs to be talked about in the open. It is the danger of developer systems (personal and…Written on Wednesday, 30 August 2023 13:29 in Security Talk Read 1007 times Read more...
-
Leaked Data from Duolingo incident Shows US is most Impacted
Written by Sean KalinichDuolingo, is a language learning site (not to be confused with an LLM) and has a very large base of users. The site is a…Written on Tuesday, 29 August 2023 19:12 in Security Talk Read 1422 times Read more...
-
We talk about the Ransomware Threat Landscape with SecureWorks at Black Hat 2023
Written by Sean KalinichBlack Hat 2023 – Las Vegas, NV – One of my personal focuses is understanding the “Why” behind changes in the threat landscape. In simple…Written on Tuesday, 29 August 2023 18:26 in Security Talk Read 1016 times Read more...
-
Now Patched Flaw Leverages Abandoned Reply URL found in Entra ID allows for Privilege Escalation
Written by Sean KalinichMicrosoft has not been having the greatest of months. First it was identified that a stollen MSA signing key was used by a Nation State…Written on Monday, 28 August 2023 15:39 in Security Talk Read 1643 times Read more...
-
Qrypt Looking to Attack the Inefficiencies in Quantum Encryption to make Quantum Secure Communication a Reality Today
Written by Sean KalinichBlack Hat 2023, Las Vegas – At Black Hat one of my favorite things to do is see what the latest buzzword(s)/phrases are. One of…Written on Monday, 28 August 2023 12:53 in Security Talk Read 1138 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 115708 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 85992 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 80382 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 79056 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 69252 times Read more...
Displaying items by tag: Case Modding
What is Modding?
Modding. Technically, it means modification plain and simple, and is done to improve performance in some way, aesthetics or both. I could talk about modding in general, as it applies to everything from tools to cars to everyday household items, but anyone reading this article probably goes to the same place in their mind when they read the word “modding”: PCs.
DecryptedTech's One Year Anniversary Modding Competition
About a year ago we re-launched DecryptedTech; prior to that the site was intended to fill in the gaps in other projects that I was working on. However, I soon decided that I wanted to build something new and different from what was already out there. In keeping with this spirit we have decided to hold a modding contest on our Forum. The contest officially opens today and will officially close on April 20th.
The rules are simple;
All work must be your own.
Work logs must be posted or linked on our forum.
You must be able to prove that the work is yours.
You must also be a registered member of our Forum.
DecryptedTech staff and their families are not eligible for this contest.
If you need space to store images for your work logs please contact us and we can set something up for you. At the end of the competition our three “celebrity” judges will pick the winners.
The judges are;
Ramsom Koay - Thermal Take
Chris Morley – CTO MAINGEAR Computers
Trace Hagan – Formerly from The Best Case Scenario
Our prizes are as follows
1st Place
Thermal Take Level 10 GT AND a Gigabyte G1.Guerilla
2nd Place
Gigabyte G1.Assassin (X58) motherboard
3rd Place
Gigabyte X79-UD3
Good luck to everyone, if you have any questions send them to This email address is being protected from spambots. You need JavaScript enabled to view it. Or PM one of the staff on the forum.About a year ago we re-launched DecryptedTech; prior to that the site was intended to fill in the gaps in other projects that I was working on. However, I soon decided that I wanted to build something new and different from what was already out there. In keeping with this spirit we have decided to hold a modding contest on our Forum. The contest officially opens today and will officially close on April 20th.
The rules are simple;
All work must be your own.
Work logs must be posted or linked on our forum.
You must be able to prove that the work is yours.
You must also be a registered member of our Forum.
If you need space to store images for your work logs please contact us and we can set something up for you. At the end of the competition our three “celebrity” judges will pick the winners.
The judges are;
Ramsom Koay - Thermal Take
Chris Morley – CTO MAINGEAR Computers
Trace Hagan – Formerly from The Best Case Scenario
Our prizes are as follows
1st Place
Thermal Take Level 10 GT AND a Gigabyte G1.Guerilla
2nd Place
Gigabyte G1.Assassin (X58) motherboard
3rd Place
Gigabyte X79-UD3
Good luck to everyone, if you have any questions send them to This email address is being protected from spambots. You need JavaScript enabled to view it. Or PM one of the staff on the forum. Head over to the Modding Competition Thread to get started
Computer modding, a discovery of one of the world's greatest subcultures, part 1: "Cultural Diversity"
Editor's Note: This article was written by one of our own forum members PM_DMNKLR and was voted on by the community as the best written of the entries for November 2011. The article is reproduced here in the same format as it was originally published in our Readers' Blog Forum. Each month we will host a contest for our Forum members to write an article or a review with the chance of being published on our site (as well as win some cool stuff). So now DecryptedTech is happy to bring you November's Winning article;
Computer modding, a discovery of one of the world's greatest subcultures, part 1: "Cultural Diversity"
The PC modding scene is quite a vast one in present day. At it's humble beginnings, quite a few moons ago, it was merely the idea of painting a case to a more peculiar color, installing a light inside of the case somewhere, adding stickers or other similar-style decals, etc., but rarely was anything so much more. Today, however, we have an industry that thrives on not only customizing our own computer periphery, but also custom creation of many components and accessories as well. Present-day computer modifications range anywhere from your basic, average LED case fan add-on, to full-blown scratch-built cases, made out of wood, plastic, steel, aluminum, fiberglass, resin, you name it and someone's making it. Even cooling has gone to the extremes in today's society, where in times of yesteryear, whilst it maintained a basis of adding an additional cooling fan or two to a much-needed area in the case or on a specific component, ie: adding an additional 1 or 2 fans to the CPU's heatsink for example, today's pc's, or "rigs" as we commonly refer to them now, have upwards of extreme liquid or even a TEC (Thermo-Electric-Cooler), also called a Peltier cooler, which transfers electricity throughout it's internal contacts, to create one side as extremely hot, by means of temperature transfer, enabling the surface of which makes contact with the CPU to remain extremely cold, thus also enabling the user to not only have a very, very low CPU temperature, but also enabling them to commit to serious overclocks, while still maintaining such deeply low temperatures.