Kamis, 31 Maret 2011

Twitter, regulators finalize security solutions-The Associated Press

Twitter, regulators finalize security settlement (AP)


SEATTLE (AP)--Federal regulators have completed a settlement Monday with Twitter related to data security breaches in 2009, gave hackers access to user accounts.


The Federal Trade Commission said the settlement resolves allegations that Twitter screwed its customers and their privacy risk, to the safety of your personal information, the company's policy as promised.


The settlement bars Twitter from misleading consumers about the security and protection of personal data for 20 years. The startup that allows people to publish short messages, called message, it must also implement a comprehensive information security program, which will be audited every other year to 10 years.


No monetary damages were assessed.


The FTC'S complaint said that hackers are able to gain administrative control over Twitter twice the period from January to May 2009, and that weak passwords, and other staff of the poor security practices on the part of staff are to blame. About 55 accounts have access to hackers.


Twitter said it closed quickly after a breach of security holes have been discovered.

US Facebook data passed through Chinese, South Korean ISPs-ZDNet (blog)

Earlier this week, could your Facebook posts have been rewritten on the Chinese wall, not just on your friends ' walls. 30 Minutes on Tuesday morning, Facebook traffic in the United States or at least connections through AT&T .com's Internet services, not travel via the most direct route. Normally, transfer AT&T data packets to the United States-based Level3 Communications, which again fingers them away to Facebooks servers.


Instead, relations went too far: through servers owned by China Telecom, ChinaNet, mainland China State-owned Internet service provider (ISP) and then to SK broadband, a commercial ISP in South Korea, before finding their way to Facebook. Independent security researcher Barret Lyon so the change and noted:



This morning's route to Facebook from AT&T:
route-server > show IP bgp 69.171.224.13 (Facebook's www IP address)
BGP routing table entry for 69.171.224.0/20, version 32605349
Paths: (18 available, best # 6, table default IP Routing table)
Not advertised to any peer
7018 4,031 9318 32934 32934 32934


AS path (routing path) translates this:

AT&T (AS7018) ChinaNet (Data in China AS4134) SK broadband (Data in South Korea AS9318) Facebook (Data back to the American 32934)

Current route to Facebook via AT&T:
route-server > sho IP bgp 69.171.224.0/20
BGP routing table entry for 69.171.224.0/20, version 32743195
Paths: (18 available, best # 6, table default IP Routing table)
Not advertised to any peer
7018 3356 32934 32934, (received and used)


In other words, if you used Facebook on AT&T at the right time this week, was everything that is sent without encryption exposed for any operation of ChinaNet and SK broadband. Chances have been actually done anything with your data, but it is not a security.


"We shall examine a situation today, which has resulted in a small volume of a single carrier traffic to Facebook will be misdirected," a Facebook spokesperson said in a statement. ' We are working with the air carrier to determine the cause of the error. Our initial inspection of the latency of requests indicates that no traffic passed through China. "


I was waiting this week to see if the company would make an announcement concerning what it found, but no dice. If nothing really pass through the country, mean data went through ChinaNet server located elsewhere.


Odd route could have simply been an error in the Border Gateway Protocol (BGP) routing tables, which tells the Internet backbone routers where to send traffic. This will normally be seen as a hero, but it is not exactly rare anymore. It came to actually two times last year.


In March 2010, was traffic to sites such as YouTube, Twitter and Facebook redirected to servers in China, gives Web surfers around the globe a glimpse of what Chinese Internet users see when they try to access the blocked sites. In November 2010, traffic for 15 percent of the world's destinations, comes from the military and civilian government networks in the UK, United States, Australia and South Korea began re-directing through China Telecom.


It is not clear if all this redirection happens with willingness to help China to collect intelligence. Of course, the Chinese Government denies such allegations. Experts are still trying to figure out how this happens and how to prevent it in the future.


Facebook can be blocked in China, but the Chinese will be able to keep your personal data in order to sell it. Then again, all just a as far as we can never understand. Either way you will probably not your posts are sent elsewhere, but Facebook, otherwise you would use a much more public service as Twitter.


Two months ago, Facebook began to offer SSL encryption and the HTTPS protection for login data. Turn off HTTPS support for your Facebook account, head to the account settings, click Change next to account security, check off the "browse Facebook on a secure connection (https) as far as possible," and then hit save. In this way, at least if the data takes a long way to go, is encrypted.

Kvidre rapporter vanskeligheder for abonnenter at forsøge at bruge netværk via webstedet - Bloomberg

Biz Stone, co-founder of Twitter Inc., photographer: Jacob Kepler/Bloomberg

Twitter Inc., service social network that allows users to share 140 characters messages, said it is seeing an increase in the error rate, which makes it more difficult to gain access to the site.


"We are aware of the problem and take action," said San Francisco-based company today at about 3 p.m. New York time on a blog devoted to the site's status.


Twitter has struggled with service disruptions, such as its traffic surges. The average number of postings are sent daily increased to around 140 million in the past month, from 50 million a year earlier, the company said this week. Twitter had reported "increased error rate" a further four times in February, along with a number of other difficulties.


The company increasingly rely on its Web site to deliver advertising, potentially putting more revenue at stake, when the service goes down. Kvidres rising prospects and potential ad revenue has helped drive up its valuation. It was valued at 3.7 billion dollars in December when it received investment led by venture capital firm Kleiner Perkins Caufield and Byers. That compares with $ 1 billion in September 2009, according to a person familiar with the matter.


Carolyn Penner, a spokeswoman for Twitter, refused to comment beyond what was on the status blog.


Contact the reporter on this story: Brian Womack in San Francisco at bwomack1@bloomberg.net


Contact the person responsible for this story editor: Tom Giles at tgiles5@bloomberg.net.

Japan earthquake clot-Fort Worth Star Telegram

Google asked to list name

Google says the people who make earthquakes in Japan can be sent to the photo list name posted in shelter in human services, following up at the plant.

Company inscribed to charger Picasa photo sharing service and the services of Google in the Finder, that collects information about the people and the status, spokesman Jamie Yood said in an e-mail. Google pistes On 161,000 entrées in Japan, according to Yood.

--Bloomberg News

Workers sent in North Korea please help

South Korea, Samsung Group, the biggest industrial group, South Korea will send a team of 10 rescue workers and 11 medical volunteers to Japan, the group said in a statement today by the group will be also given 1. 2 million dollars and aid packages in cooperation with the Red Cross, '' he said.

--Bloomberg News

More nuclear museum visit

New Mexico-National Museum of nuclear science and history, see more visitors from the earthquake and tsunami in Japan-growing security fears a nuclear facility.

KRQE TV reports that workers in Southeast Albuquerque Museum said more three times one has visited over the weekend than the average since last summer.

-Media partners

Looking for comment?

Rabu, 30 Maret 2011

Local songs: How can we be lovers if we can't Facebook friends? Sun-Sentinel

The request channel timed out while waiting for a reply after 00: 01: 00. Increase the timeout value passed to the call to Request or increase the SendTimeout value value on the Binding. The time allotted to this operation may have been a portion of a longer timeout.

Since so many people rely on the Internet for just about everything, it's not surprising that there are now songs about Facebook, MySpace, Twitter and other sites that eat up our time. This week, we justified our online hours by scouring local-music sites for songs about gazing into a computer monitor and pounding on a keyboard in a never-ending search for love, information and Facebook friends.


Miami hip-hop artist Gomarvelous incorporates MSN, AIM, BlackBerries, Yahoo, Twitter, MySpace, Facebook, blogs, MacBook, and Skype into a song one "Computer Love". It's about falling in love with a woman he met one day on his MacBook. "We likes two MySpace and we likes two Twitter," he sings. "Shorty keeps here blog tight and tells me I'm a winner/… And when she likes Facebooks me in two check it/And take it to the heart when she changing status on here. " The lyrics are based on a true story. "Computer Love ' is a musical description of feelings I experienced while I was dating a wonderful woman on the Internet," Gomarvelous reveals. "Many of my friends thought I was nuts for doing so. However, it really didn't bother me much, nor did it preclude my desire to love here … even though we had never actually met in person. So thanks to Web cams and social networks, we were able to fall in love without feeling weird about it, because the only thing that we didn't have that people who were in love and physically together hatred was just that … being physical while together. " Two hear "Computer Love", "which appears on Gomarvelous's debut album, R and Me Music (Rhythm and Me), visitMySpace.com/gomarvelous.


There's apparently quite an audience for songs about romance via the Internet as Fallbrooke, 's video for "Losin' It" has two date captured more than 154,000 views on YouTube. "I know we've never met except on the Internet," the lyrics state. "I've got the camera by the bed so is yours up yet?/Oh, I know, this is a fast and crazy connection/But you keep monopolizing all my attention." In an interview with music site They Will Rock You, singer-guitarist Eric McNeeley revealed that the song, which was recorded for the band's self-one 2009 album and spawned a video featuring Mandy Jiroux of the YouTube sensation The Miley and Mandy Show, was based on a true story. "The song literally speaks for itself," he customs Theywillrockyou.com. "It's about a girl I met online that I was crazy about, and we spoke through Web cams all the time." Fallbrooke, a Miami band moved to Los Angeles to be closer to its label, RMR Music. Two hear "Losin' It," visitMyspace.com/fallbrooke.


"You Too Can Google" has nothing to do with online relationships. This song TerraNadir, from the green-minded indie-rock duo of Patrician Brunicardi and Stephen Goddard, concerns Googling two learn more about ecology, the green house effect and what vocalist, keyboardist and composer Brunicardi calls "the climate crisis that may dwarf the banking crisis." She warns, "Without the rain forests in Africa, we will have no air to breathe." Two hear this tune, recorded for the Pompano Beach Act's self-one album, visit Myspace.com/terranadir or watch the video on YouTube.


Jennifer "Jenny" Upside-Down Wolfson says she wrote "MySpace Causes AIDS" when MySpace was still bigger than Facebook and Twitter and people were more concerned about online safety. The song begins, "Logged in, uploaded on my html-coded MySpace Web page/… Should I lie about my age?/Found all my old asshole friends/Now I remember why I ditched them/Found a couple of new ones, too/But most of them just want to screw. " Wolfson, who wrote the song after seeing a man with a "MySpace Causes AIDS" t-shirt, says the MySpace reference still hits home for most of this listeners, but jokingly says: "I think I'll add another verse with Twitter, LinkedIn and Facebook. That way, they can just do a group lawsuit against me. " Two hear "MySpace Causes AIDS," business Myspace.com/jenniferlynnwolfson. Wolfson will perform 10 p.m. Monday to Churchill's Pub in Miami and then head over two Jazid, where she'll perform at 12: 30 a.m.


We saved the funniest, and oldest, song for cargo. We're cheating a little because this group is not local. It's from Miami University in Oxford, Ohio. But because of the tenuous Miami connection and because these 15 seemingly earnest guys are too funny not too include here, they make the cut. The Miami u. Cheezies song "Facebook Song" to the tune of the Everly Brothers ' "All I Have To Do Is Dream" even before MySpace began two barrels. If you've seen this video, it's worth viewing again, because seeing a tie-wearing, male choir sing about friend requests, poking and stalking on Facebook is still funny.

Taking control of cars from a distance-MIT Technology Review

hacked the hyphen: Scientists previously have shown that they can take control of the car dashboard, among other systems.
Credit: embedded systems for automotive safety Research Center shows that can wirelessly hack into cars. Monday, 14. March, 2011By Erica Naone

Scientists who spent the last two years he studied the safety car computer systems that can take control of vehicles wirelessly.


The scientists were able to control everything from car brakes to the locks on your computer by using the control panel displays the on-board computer through GM OnStar and Ford Sync, as well as through a Bluetooth connection, intended for the manufacture of hands-free calls. This week, submit their conclusions to the Committee of the national academies for the electronic management of the vehicle and unintended acceleration, which was brought up partly in response to last year, the scandal of alleged problems with the computer systems of braking in Toyota Priuses.


The team, including Tadayoshi Kohno, Professor of computer science at the University of Washington and Stefan Savage, Professor of computer science at the University of California, San Diego, previously showed that could take control of the car's computer systems, provided that they had physical access to the vehicle's OBD port – federally access point located below the dashboard in almost all modern cars.


With the new work, researchers systematically analyse ways of how they got on the car computer systems without the need for physical access. Used sedan zahorena after 2009 equipped with less computer systems than many high-tech cars. Every attack, which succeeded confirmed that could take complete control of all the car's internal computer systems.


Researchers attacked the car's Bluetooth system that allows drivers hands-free cell phone calls. They found a vulnerability in the way of the Bluetooth system was implemented, which them to run code to take control of the car. To do this, the researchers used smart phone already paired with the car or found a way to allow new connections and smart phone.


Today, many cars are fitted with mobile connections, security features, such as automatically calls for help, if the driver in the crash. Scientists have found that they take this system breaking through its verification system. First, did some 130 calls to his car to access, and then send the code using the 14 seconds of sound. The scientists also found other ways to gain access, for example through the player into the car.


"We were surprised when they found out that the attack is so broad," Kohno said, referring to various ways of how scientists were able to gain access to computer systems in the car.


Team to analyze the possible scenarios of attacks as well. For example, show that the thief in the high-tech should look for the models of cars, to determine their location and unlock, all without any violent intrusion. They could carry out harmful surveillance, such as forcing the car to send GPS position at regular intervals. Also they could sabotage the car, disabling its brakes, for example.

Superior apps in Windows phone 7-the United States today

When it comes to supplying coolest smartphones of the planet, Microsoft has also-ran. So last autumn, the giant software fired fresh strategy to close the gap of Apple iPhones, research in motion BlackBerrys and Google Android models. purpose of the Microsoft Windows phone 7 (WP7) smartphone to be the most useful and convenient applications. The company is pursuing this objective with the orderly preparation of meals for the best and most app developers. "The jury is still, as to whether this proves decisively winning strategy, "says software applications analyst Al Hilwa in research company IDC. "But Microsoft began its certainly not the right course." Smartphone apps have become almost as important as the phone. They allow people to shop, Go play games, plan your life and connect to social media. Free applications that trivial tasks number in the hundreds of thousands of iPhones and androidite. More importantly, the market for high-quality paid apps – that help people who use their phones as computing devices, connected to the Internet-more than twice the $ 2.2 billion in 2010, up from 828 million dollars in 2009, according to research firm iSuppli. Apple dominates the market of paid appswith 82.7% global market share. The edge is a distant second, with 7.7% share. Microsoft? t even register. to play catch-up, Microsoft last October dumped its clunky operating system on Windows Mobile and started completely new platform, WP7, who played in one of its key: close links with top software Company has taken the developer.. NET Framework – system for nurturing the development of business applications for Windows server and desktop computers, and then grafted to WP7. In only four months 25 000 developers have registered to create WP7 apps. They have created 8 000 apps and fat are separated, new applications at an average rate of 100 per day, says Larry Lieberman, senior product manager of Microsoft. Early successes include deep integration of social networking sites Facebook and Twitter and movie service Netflix, which means users can have access to these popular services of WP7? s main dashboard without opening a separate app. "Many developers find that takes a (very) may be less time for building equivalent applications for our phone from other phones," says Lieberman. last month, Amazon released the app, which allows the preferred view content in a continuous stream of swiping from left to right on the screen of the phone WP7. To do the same thing on the iPhone or Android, you must open and close the new pages. Sam Altman, co-founder and CEO of based on location, check-in service Loopt, contain for the aid it I have create the app, which allows users to quickly find friendsthat may be nearby. Only the WP7 does the Loopt app start with a minimum of fussing. "They go from time to help us with everything we had," says Altman. "No matter the attention of developers is a good course." Lieberman recognizes that Microsoft is still a long way to go. In the fourth quarter of 2010, under the command of the Android operating system, 32.6% market share, phones shipped globally, followed by Nokia? s Symbian platform, with 30.3% share, according to IDC. Apple and RIM followed with a share of 16% and 14.4%, respectively. Microsoft has a share of 3,8%. but Microsoft recently forged a partnership with Nokia. "This is now a three-horse race," Nokia Chief Executive Stephen Elop declared in the London press conference announcement of the Alliance.Nokia and Microsoft face is a complex challenge, the delivery of a new line of WP7 smartphones which can take attention away from androidite, iPhones and BlackBerrys, says Forrester analyst Charles Golvin. One thing seems certain: top app developers who are involved will be pivotal. "Firms must convince the developers to set the priority of Windows phone 7, they bring innovative products to the market," said Golvin. For more information about reprints and permissions, visit our FAQ. To report corrections and clarifications, contact standards editor Brent Jones. For consideration of publication in the Gazette send comments to letters@usatoday.com. Include name, telephone number, city and State for verification. To see our corrections, go to corrections. usatoday.com. We have updated the guidelines of the conversation. Changes include a brief overview of the process of moderation and an explanation of how to use the button "report abuse". Read more.

Selasa, 29 Maret 2011

Should Social Networking be regulated-daily news pulse

Govern the use of social networking sites and other electronic communications are a part of a set of guidelines to prevent sexual misconduct and abuse by public schools in the Commonwealth. The measure does not create mandatory rules for schools, but rather to outline the role of schools in helping to prevent abuse and encourages them to create and implement their own policies.I witness the damage social networks overuse can cause daily. Young people have been raised in a technological world, and the importance of face-to-face communication is often lost on our youth. When people begin to use Facebook and Twitter instead of normal social interactions, social skills decline with a rapid speed. Nothing can replace the value of computer-less, human to human conversation.


It is this: a lot of people use social networks and the resources offered by them, have shown statistics only for Facebook. But what other social networks you can immediately name? Now add all of them together. Thas millions and millions of unsuspecting users. Oh, my! And that they are vulnerable, as well as Dorothy was when she was attacked by flying monkeys. Online presence is essential for businesses today. Web analysts suggest that one of the best ways to establish a strong footing in the virtual world is through Social Media Marketing. Be it via social networking sites like Facebook, Twitter or LinkedIn or blog posts, social media offers a unique platform to allow interaction between a consumer and a fire in a modern way.


Collegehumor.com has already nailed the film's Chief fault in a memorable parody: substitution of the unnecessary complexity of profundity ". But it bears repeating. There was nothing about the "initial", was particularly creative. Action scenes consisted mainly of tired tropes car chases and action shots of episodes. Now, there is nothing inherently wrong with borrowing plot devices that work. But within the world of "Introductory" created the opinion not intended. First and foremost, why guns? DiCaprio was unable to come up with any hyper-powerful dream weapon? For figments of imagination one man shows the nameless, faceless antagonists strange change skills.

Google patches Pwn2Own WebKit bug in chromium-Computerworld

ComputerWorld-Google has patched WebKit browser chromium deficiency, which is used by a multinational team to hack a smartphone BlackBerry Torch in Pwn2Own.

Although chromium is intact in Pwn2Own, the browser relies on the open source WebKit browser engine and so needed to be patched.


Friday of chrome Google update makes the first developer of browser to Patch vulnerability used in Pwn2Own hacking contest, sponsored by HP TippingPoint and programme for the abundance of bug its initiative for the day to zero (ZDI). Pwn2Own ran Wednesday until Friday and the $ 60,000 in prize money of four individuals or teams.


Last Thursday, Vincenzo Iozzo, Willem Pinckaers and Ralf-Philipp Weinmann, earned $ 15,000 from hacking research in motion BlackBerry Torch with exploit of WebKit vulnerability in the BlackBerry browser. The same day, Dion Blazakis and four-time winner, Charlie Miller use different WebKit deficiency of Apple Safari browser on iPhone 4.


According to Google, Weinmann and Iozzo Pinckaers WebKit bug is "memory corruption in style." Google's assessment of the threat to consumers as "high," the second most poor ranking.


As Google's practice, it blocks access to their error tracking to prevent outsiders to view technical details of just patched vulnerability. Company block public access to disadvantages for weeks or even months, to allow time for users to be updated.


Apple, which will have to Patch the same bug for WebKit that Google considered and that this Blazakis and operated Miller, did not comment on his process for the security update.


Google also gives Weinmann and Iozzo, Pinckaers $ 1,337 from its own programme and bug generosity, adding to its collection of cash for Pwn2Own hack.


Chromium or Mozilla Firefox have been contested in last week's Pwn2Own: researchers, who have previously registered to the browsers do not appear or be withdrawn because they failed to come up with reliable exploits in time for the contest.


Employees of Mozilla and Google touted skills for survival of browsers.


"Whew, Firefox survives # pwn2own 2011 this is Laurel, we are on, but I'm still happy about it," says Brendan Eich, Mozilla's CTO, in tweets last week. "Congrats on chromium survival, too."


"And the two surviving browsers: open source, generosity programs have built-in teams of security, better faster repairs. Match? "tweeted Chris Evans, engineer of the team for the protection of chromium.


Smartphones, Google Android and Microsoft Windows phone 7 operating systems also escaped Pwn2Own Cat.


Last week contest was third consecutive Pwn2Own that Chrome is not used by the researchers. It is the first time for Firefox, since browsers are identified as objectives in 2009.

Google to launch ' Anti-Facebook '-Fox News

By Clayton MorrisPublished 15. March, 2011 | Foxnews.com

You can be my friend on Facebook, dear reader, but if Google launches its new social network, I probably will not accept friend requests from people I don't know closely. It is because, like most Google users do not want my Google account to be more socially. I am completely satisfied, you will be social on Twitter and Facebook but when it comes to Google, I have my personal information.

Rumors swirled this weekend, as Google would once again throw the hat in the social ring with the launch of ' circles ' a new social network to the South by Southwest Conference in Austin, Texas.  Google denied that it would launch this week and refuted the allegations, as such a project is in the works.

Although circles is not a real thing and only a labs project, is Google's possible re-entry into the social circle is inevitable. Make no mistake, Google wants to be more socially and I have some theories on why they never really succeeded.

Google have tried again and again to play in the social networking space. Orkut and Google Buzz is just a few examples of good intentions gone wrong. I believe that this is happening because very few people want Google to be social. When you trust Google with private information such as your daily requirements on Google Health, you do not feel motivated to start for the friend request your high school classmates.

In fact, I write this column in Google Docs. I have a lot of work in my Google Docs folders. I am fine sharing certain documents give people example permission on other documents, but I would be uncomfortable participating in social networks with people who would be one click away from such private information.

Google's rumored network, circles, presumed to have more focus on the protection of personal information and inner circle. You will be able to share certain information in a very targeted ways. I can relate to the need to. When I post the photos of my son, they are shared online for my family and friends, but friends of friends often can see and comment on them on Facebook and that's okay but sometimes I just want my nearest family see my son face deck of peas. And when I upgrade my Fox Tech take snippets on Twitter, my family and friends must endure my self promotion. Google may have found a way to solve this problem. They may have found a way to add targeted sharing of all Google services and not just a new stand-alone social network.

I would love to see a new social networks that do not feel like a popularity contest. When a new social network begins to gain traction, it seems to follow the same path as its predecessor. You see a few Weblebrities achieve large number of supporters and then you feel you must get, find a lot of "friends" and start sharing as a madman. What if the next up and coming social networks weren't quite so social, in the absence of a better word? What if message inherent social network felt more like real life, more authentic? What if it was directed against the circles in my life were actually meaningful? May not be quite so valuable to marketers because traffic to any given link or page would be lower, but it would be more valuable to me. So Google, if you want to give social another go I am willing to try again.

DOD steps to prevent the further Cablegate-InformationWeek

The Department of Defense (DOD) is taking decisive steps to ensure the separation of the networks, so as to escape the scandal doesn't happen again, last year Cablegate new DOD CIO Teri Takai said last week.

The Committee of the Senate homeland security and governmental affairs, Takai, who recently took the position after serving as CIO in California--said that the dod is currently in the middle of the introduction of new security technologies DOD SIPRNet's classified networks, in order to prevent future breaches of the insider.

"The unauthorized disclosure of information the US WikiLeaks adversely affect our global engagement and national security and endangering the lives of individuals, who seek to cooperate with the United States," she said. "It is vital for the DoD and the whole of the US Government, that we have our sensitive and classified information safe while at the same time to ensure that the right people have timely access they need to help keep our country and its citizens safe."

A rough year last year, the DOD actually continued his fight with Wikileaks, which posts classified documents from many organisations, including the Federal Government.


At the end of July 2010, Wikileaks released thousands of DOD classified documents relating to the war in Afghanistan, then followed by the publishing, 400 000 classified Iraq protocols in October.

But it was the release of thousands of classified cables, the US Embassy at the end of November, which prompted the international incident that became known as Cablegate, which caused many of the serious question of safety at the DOD. Army private Bradley Manning was arrested last June and suspected a leak after the removal of the SIPRNet.

After carrying out studies on how it can improve network security, DOD began to perform host-based security system for all of its workstations and to prevent the removal of large amounts of data from removable device into rewriting the SIPRNet úložišteVýboru Takai said. Her testimony is available online.

Takai he described how the system works. She said she was "very positive technical control" over the machine and provides reports on the configuration of the workstation, which can be centrally monitored.

Although the system allows you to delete data from some of the machines, HBSS report in real time of each operation, said Takai. Report any unauthorized attempt to move the data and rewrite it.

DoD also has a backup plan to ensure that other Cablegate happen, while waiting for the full introduction of the new system, she added.

"If it is not yet fully developed HBSS other means are used to disable writing ability, such as the removal of the software for the CD, remove the units from the machines, or blocks access to external devices in the configuration files of the working station" Takai said in her testimony.

DOD also initiated the issuance of credentials based on public key infrastructure PKI identity smart cards to people who have access to the SIPRNet users, with a plan to issue 500 000 cards and workstations equipped with card reader and software to the end of the year 2012, she said. This will replace the system with a password of the user to use now for access to the SIPRNet, which does not provide the appropriate access rights.

The new system "will provide a very strong identification of the person, access to the network and request for data," said Takai. "It will discourage bad behavior and require absolute identification of who is accessing data and control access."

The testimony of one of the first public appearance in marked from its place of Takai 5. November. President Obama nominated Takai in March 2010 DOD CIO position. However, in September in the middle of an ongoing reorganization within the IT operations and organizational structure, her nomination was withdrawn.

Then in a somewhat surprising step 25. October, Takai said her staff that she was leaving the California situation and with the DoD CIO position after all.

Open Government road maps ready sites started and 300,000 sets of data released – but is much more to do. Here is our 10-point plan for what to do next. And even more in the new edition fully digital InformationWeek Government. Download now. (Free registration required.)

Google to test mobile CNC-based scholarship? -InternetNews.com

Google products in mobile services pay a the end of summer in New York and San Francisco that permet shoppers use smartphones to buy transactions, according to a Bloomberg report.

The Internet will find installation personnalisé registres money system in place in VeriFone will accept paiements de smartphones and technology press-field-communication (CNC), according to mobile pay Bloomberg report.

Google declined to comment on the story.

Now, the marque Google Nexus smartphone made by Samsung ... understand the CNC technology, so it appears it could be a move by Google to reach of mobile operation system and Android. S Nexus go Android 2. 3 billion, Of.

CNC technology is the way technology is utilisateurs to pay for products and services by waving like appareil may make an register in your two equipped Terminal, for instance, that ignorant money and credit cards.

The move by Google to enter the mobile sector pay at a time when these services call mobile are waiting for education to take off, particularly those using CNC.

Bank of America, for instance, just to invite some customers to participate in a trial to test mobile on smartphones in one thousand years paiements Atlanta, New York, and San Francisco, according to MyBankTracker.com.

One thousand years into the wallet mobile suit test iPhone on your guard, CNC America Bank into one of the system in New York City. The IPhone was attached to a can that even be especially conçu press-field communications microSD a heart. Instead of swiping a traditional payment form MetroCard system métro, testeurs waving them iPhones in tourniquets who accept Visa payWave card MasterCard Paypass you to pay for one.

Paiements mobile have is not easily won March adoption, but anticipated that it will begin to change in 2011 income mobile utilisateurs seems race important 116 million dollars to About 375 million in 2015 and, according to a report made by research, entreprise in-Start.

'' The s not in Consumer Affairs request for mobile payments, '' Amy Cravens, in-market analysts Start, said in a statement. "Consumers recognize the pain and the current point system paid and indicated support for a more alternative, easier. If mobile operators are able to push back and introduce défis infrastructure service market in March, transactionnels batch of mobile paiements, the market will be nearly placé by on the next several years. "

Senin, 28 Maret 2011

New York Times silence not Story Tweeting feed-PC Magazine

Earlier this week the New York Times asked Twitter to suspend the @ FreeNYTimes account, the handle that was created with the purpose to post links to articles in all times, thus making them free when the paper subscription service kicks off Monday. However, not the times succeeded in silencing @ FreeNYTimes.


According to a report from Forbes ' Jeff Bercovici was the question does not make @ FreeNYT. Rather the times felt that @ FreeNYTimes violates its trade mark with its use of the paper signature "T" logo, the times leader of digital operations Martin Nisenholtz told Forbes. The logo has since been removed from the page, @ FreeNYTimes, and the Times has withdrawn his request with Twitter.


Bad times also Twitter to close another article-tweeting feed, @ FreeNYT. The account is still active. In that case, the publication also argued that the account was in breach of the New York Times trademark.


Subscription service New York Times, which is commonly producer prices as a "paywall", goes into force on Monday afternoon. However, it is not likely that readers will be clamoring to sign, given the service has been received very negative. It is a connection fee plan; readers can chose a plan that costs between $ 15 and $ 35, depending on their level of service.


However, it is not the costs of the service which readers have taken issue with it is, rather, that there are a number of ways to skirt around the payment platform, rendering ineffective. Articles posted to Facebook and Twitter is free, and readers can access up to 20 articles per month at no cost. In addition to it, is a Canadian coder created @ NYTClean, a bookmark tool, defeats paywall with four lines of code. Also, as it is noticed in a broad sense, a user could simply clear the cache on his or her browser to reset the 20-article common agricultural policy


Times trademark argument with @ FreeNYTimes account sends mixed messages, says Berrcovici. @ FreeNYTimes use the times own API and the paper developer guidelines actually require "page or screen that displays the time the API content or data" use a times logo.

Google added charging stations for Cartes-mobile magazine

John fabricants have started to change in gas guzzlers for electric-motor, one of the largest kinds--both new technology just to keep him.


Has pointed years 106 last transportation fuel solar-powered living on Earth, mouchetée and a network of estayon fuel-easy, and it may take a while before charging stations keep in terms of disponibilité.


But until they do so, Google will make them party to make stations easier to find. The company added the Department of energy National Laboratory two Renouvelables in energy of About 7,000 alternative alimentation stations for Google Maps, make it easy to find a place to ask up to be before you leave on a tour on your smartphone while you're out.


De la idon't 600 electric vehicle supply equipment where, too, failing would you looking for more than a sense rapide.


To ensure that the two remaining up to date, the national laboratory energy Renouvelables launched a forum for people related to the electric car Of the supply of equipment and distributeurs fabricants, to inform the advanced car data center mailing where you change in those restaurants.


To give him a shot, look up "EVE charging station press (town or city) on Google maps.


[GizMag]

Report: Iran's paramilitary launches cyber attack-The Associated Press

Report: Iran's paramilitary launches cyber attack (AP)--3 hours ago

Tehran, Iran (AP)--Iranian hackers working for the powerful revolutionary guards paramilitary group, the Basij militia launched attacks on the website of "enemies", the State-owned newspaper reported Monday in a rare acknowledgement from Iran, that is engaged in cyber war.


Report following the announcement in January that Iran had formed its first cyber police unit in an effort to obtain the benefit of the authorities in the digital world.


The Internet was also the main outlet for the Iranian opposition, whereas that in 2009 the disputed presidential election. In addition, Iran seeks to boost its Web defense after a computer worm Stuxnet its way into the computers with a controversial nuclear program in the country.


General Ali Fazli, representing the Commander of the Basij militia, cited a State Iran paper as saying Iran's cyber army is made up of university teachers, students and the spiritual. He said that their attacks were retaliation for similar attacks on Iran, according to the semi-official Mehr News Agency. There were no further details about possible targets or the time of the attacks.


"There are cyber attacks on us, so is our cyber army Basij militia, which includes the University teachers and students, as well as spiritual, attack on the enemy, '' said Fazli. "Without resorting to power the Basij militia, we were able to track and confront our enemies."


Meanwhile, Iran's Revolutionary Guard – military industrial powerhouse--believed linked to the secretive "Cyber army", which was formed to fight the opposition websites and blogs, after President Mahmoud Ahmadinejad has questioned re-election in 2009.


In February, the Chief of the guard, General Mohammad Ali Jafari, signaled that the force supports cyber army, describing the pledge "defence, political and cultural needs of all countries." Jafari said at the time that the guards successfully cyber warfare.


Iran is trying to learn the digital world as a decisive step to prepare for what it calls a "soft war", which includes the fight against cyber attacks, such as a computer worm Stuxnet, that Iran said was aimed at sabotaging its enrichment program.


Iranian officials claimed no obstacles in nuclear operations from Stuxnet but the November report of the UN nuclear agency, told a worm infiltration in Natanz nuclear facility to temporarily turn off Iran's enrichment program in communication possible.


The origin of the Stuxnet unclear. But it is a highly sophisticated malware is intended to be an attack on the industrial systems and would be aimed at a centrifuge used in the enrichment of uranium. Washington and the other with Iran eventually bring nuclear material for warheads, Iran insists that only seeks to enrich uranium for research and energy.


The country has been the growth of Western cultural influences while attempting the Hill in cyberspace against web savvy opposition groups. Opposition groups by using proxy servers and other tactics to stay in front of the offices.

Copyright © 2011, the Associated Press. All rights reserved.

Minggu, 27 Maret 2011

Bing expands social search features-PCWorld

Microsoft has enhanced search features, Bings social display real-time Twitter messages on Bings the news section and the simplification of Sharing of Bing entertainment on Facebook.

The new capabilities build on existing links Bing has both Twitter and Facebook, highlighting the increased importance of supplementary opinion search engines with social network sites. Some queries are input from the people's social circle very valuable and relevant.

Bing social had already a section for people interested in search only through public posts and status updates from Twitter and Facebook. Now, Twitter content is displayed in the Bing news search results.

"Search for a news item and immediately see what people are tweeting on the topic," wrote Betsy Aoki, Bing Senior program manager, in a blog post.

In the meantime, Bing now displays a Facebook box where logged users can type in a status update and post it to their Facebook profile without leaving the interface Bing.

The feature is now specifically available for "Overview" pages in Bing entertainment, a part of the Web site that offers information digests on movies, actors, singers and other categories, entertainment.

' Whether it is a movie, a video game, or even an artist, now you can share your thoughts with just a single click, ' wrote Aoki.

Google are also working hard to factor in social signals in some of his queries and recently gave its social search service is a paraphrase, promoting its results from a special section at the bottom of the page to the list on the main findings based on their query by relevance and sharpness other features.

While access to Twitter content and feeds seems consistent among search engines, Bing enjoy preferred status with Facebook, thanks to a partnership between the two companies. Which has resulted in Google lacks access to essential Facebook features, Bing has, like the ability to include links to Web sites in the results to a Facebook friends "preferred."

Keystroke dynamics, secure access to your computer-DigitalIDNews (blog)

Maybe you’re a hunt and peck typer. Or perhaps you zip around the keyboard but linger over certain keys. And it’s possible that you type much faster after you’ve had your morning coffee than you do when 5 o’clock rolls around.


A person’s typing patterns can be as unique as a fingerprint or signature. That’s the idea behind keystroke dynamics, and some technology firms have built their business around using this biometric as a form of authentication.


Keystroke dynamics or keystroke biometrics is a behavioral biometric rather than a physiological biometric. That means it measures some action such as typing, gait, signature or voice rather than a physical characteristic such as fingerprint, face or iris.


Behavioral biometrics are based on a individual‘s specific behavioral trait. Examples include speech patterns, signatures, gait and keystrokes.


Physiological biometrics are based on an individual’s physical characteristics. Examples include fingerprints, hand geometry, iris, and DNA.


Although it’s been slower to catch on, some say keystroke dynamics can be as good a form of authentication as any other biometric. “The technology works pretty effectively,” says Avivah Litan, security research analyst for IT research and advisory firm Gartner Inc. “There have been some well regarded, prestigious New York banks and credit unions that have used it for private banking … it’s much stronger than a password and it’s every bit as good as a hard token going through the Web browser.”


So what’s the hang-up?


“It’s unconventional. People generally don’t like to adopt unconventional measures. So as soon as you get more big banks and service providers using it, they’ll all start jumping on the bandwagon,” Litan says.


The concept of keystroke dynamics goes back to the use of Morse code during World War II. The military used the code to tap out important messages but it was crucial to determine whether the sender was an ally or an enemy. The Army Signal Corp discovered that the rate and rhythm of the tapping differed between individuals. They developed a concept called “the fist of the sender” to use these variables to ensure received messages were valid.


Today, keystroke dynamics can provide strong authentication to Web-based applications, e-mail and networks.


Systems that rely on keystroke dynamics measure the movements and patterns a person makes when typing, such as the duration of each keystroke, how long each key is held down and the overall typing speed.


In particular, these systems look at the dwell time–how long a key is pressed–and the flight time, or how much time it takes to get from one key to the next. Other factors might include typing habits, such as whether the person holds down the shift key or uses ‘Caps Lock’ to type a word in capital letters.


Miami-based AuthenWare Corp. offers software to verify that the person typing a user ID and password is the actual owner of those credentials. Its AuthenWare Technology system uses keystroke dynamics to evaluate the way that person types the credentials.


AuthenWare also considers other behavioral and environmental characteristics, such as whether a person uses a mouse to move from one task to another, as well as the person’s IP address, time zone, operating system and browser and typing speed at different times of the day. “Maybe you had a lot of coffee or are tired, and you may be typing faster or slower, but it is still you typing,” says Tom Helou, president and chief operating officer of AuthenWare.


All of these elements help AuthenWare build an accurate personal pattern for each user to minimize identity theft, Web fraud and system vulnerability. “Even when you’re switching from one computer to another, we have the ability to determine whether you’re the right person to be accessing those credentials,” says Helou. “The application turns the person into the security device.”


The system compiles all of a person’s typing characteristics using an algorithm to create a numeric template that, in essence, encapsulates the variables. This template is compared to the enrolled template created during previous typing sessions. If the pattern is mathematically similar to the one already stored, then the user is granted access.


If a hacker were to type the person’s username and password at a different typing speed the system would reject him. “We make stolen information useless,” Helou says.


‘A layered approach’


Like other biometrics, keystroke dynamics is not a perfect solution. Most security experts agree that using layered techniques is best. Keystroke dynamics can be one part of a suite of authentication modes. “You can’t rely on it on its own, but you can’t rely on anything on its own,” Litan says. “You have to have a layered approach.”


That’s the idea behind KeystrokeID, one of a series of strong authentication and encryption products offered by ID Control based in The Hague in The Netherlands. KeystrokeID is designed to work in tandem with the company’s other strong authentication tokens, such as one-time passwords.


“We don’t believe in using only one single method of strong authentication,” says Hans Kortekaas, CEO of ID Control. “We offer a mix, which means there’s always an ideal solution.”


Key to any biometric solution is the false acceptance rate and the false rejection rate. False acceptance is the rate at which someone who isn’t you gets in with your credentials. False rejection is when you’re the correct person, but the system doesn’t let you in.


At the highest security level setting, AuthenWare’s false acceptance rate is .19%, but the false rejection rate tops out at 3.2%. To ease the challenges caused by false rejections, AuthenWare lets the user define the security level that he or she wants. For instance, a person working in research and development might be willing to risk more false rejections for the sake of higher security. Alternately, a person on a home computer might not need as much security and could lower the false rejection rate for the sake of convenience.


With KeystrokeID, there’s a false acceptance rate of about 1 in 10,000 people, whereas the false rejection rate is about 3 out of 100. “Even though that is the case, you have to remember that you can always put a threshold on your security measure,” Kortekaas says.


If a person is falsely rejected and the system knows his mobile number, ID Control can send a one-time password to use for that day or that session, explains Kortekaas. “From that point of view,” he adds, “you always have control.”


Keystroke challenges


Keystroke biometrics is still less popular than other forms of biometric authentication because not enough people are familiar with it yet. “No one wants to be first out of the box,” Litan says.


One challenge is that the same person’s typing speed can vary greatly on different computers. KeystrokeID addresses this issue by allowing the user to notify the system of which computers he uses on a regular basis, and then select which computer is being used at each time of the day.


There’s also the issue of what happens when a person breaks a hand or finger. Typing patterns tracked in the AuthenWare system can adapt to nuances in user typing behavior such as those caused by injury, illness, medication or even the consumption of too much caffeine.


For KeystrokeID, the solution goes back to layers of authentication. “Again, what do you do when someone loses their ATM card?” Kortekaas says. “If you lose one arm, you still have the other arm to receive a one-time password on your mobile phone.”


With any form of authentication, there are risks. With an ATM card, for instance, the user has to remember his or her PIN number. “People forget that there’s always a chance someone guesses right and can use your card to withdraw your money,” Kortekaas says.


User benefits


Many forms of authentication that rely on biometrics, such as eye scans and fingerprints, can be expensive, intrusive and inflexible to the customer, says Wayne Snell, vice president of marketing for AuthenWare. “And once you configure it for a certain security level, you can’t go undo it.”


With keystroke dynamics, there’s no new software or hardware for the end user to install, so it’s less expensive, Helou says. “It’s software that only gets invoked when someone types in a username and password, so it’s much less intrusive to the user,” he says.


The average corporate employee might have 27 different user IDs and passwords that need to be changed regularly, often without repeating any of the previous characters, Helou says. A system that relies on keystroke information could eliminate the need for multiple user IDs and passwords.


“It’s very difficult for us humans to remember those unnatural credentials,” Helou says. “So you store that information in a file on the back of the keyboard or on a shelf (and) whoever can get to that file can get this information.”


A growing number of companies believe that changing usernames and passwords too often is a poor security practice, Helou says. “We believe the same thing,” he says. “So for companies to secure their users, they are adding more and more security layers. Then the challenge becomes (balancing) security and user friendliness.”


Potential uses


Keystroke dynamics works especially well for workplaces, where most employees use the same keyboard day after day. The same applies for online courses, in which a student might follow the same course for nine weeks–allowing time for the system to measure his typing patterns–and then take a test that requires strong authentication in the final week.


ID Control’s clients include a mix of legal, health and financial companies. AuthenWare primarily serves government agencies, retailers and banks that use the technology mostly for securing online transactions.


The key for keystroke is its flexibility to add an additional layer of security to any transaction requiring data entry. This makes the ultimate market for the biometric authentication technique virtually limitless. 

Sabtu, 26 Maret 2011

Inserted on Facebook? South Carolina considers banning Social Media behind bars-Fox News

Prisoners are allowed to use Facebook or Twitter or have a MySpace page? One South Carolina State legislator says absolutely not, and he is trying to make it punishable by law, if they are caught by using social media sites.


"This Bill would be the first Bill of such throughout the country would be a crime to any inmate in prison in order to enter the social media as a means of communication. If a person gets caught, would he or she has a lot of time to add to what they have been given. It also leads to a fine, "said State Rép Wendell Gilliard, a Democrat from Charleston, which proposes legislation.


Inmates have access to the most popular social sites by using smartphones smuggled inside the prison walls, which are already illegal in South Carolina. But prisoners not just user update their Facebook status or share interesting videos. Some victims and victims ' families have complained that inmates use popular social networking sites to persecute, harass and threaten them.


"STALKER, batterers, rockers live to intimidate, harass and terrorizing their victim, it is what they are doing," says Veronica Swain Kunz, CEO with South Carolina victim assistance network. "Someone on Facebook can reach out and send a message to all, that they will, and it could be a real thing for terrorizing them."


Bill to stop social networks for prisoners would add 30 days a prisoner sentence and require them to pay a $ 500 fine, if they are caught posting on social networking sites.


"It would send a message to our youth, crime does not pay," said Gilliard. "We must come back to reform people, we have not done. We have given them a clothes where they feel comfortable. "


And out of the reach of this proposed law would stop by prison walls. Family or friends of the prisoners could face mrsdemeanor fees if they are caught setting up social network pages or post messages for prisoners on the Internet. Rep. Gilliard hope just proposing the Bill sends a message throughout the country.


"It's just not that South Carolina and Northern California, other States have this problem also. Hopefully this will bring it in the front row, "he said.


But the proposed bill has already met resistance. ACLU calls it a violation of the first amendment right to free speech in the Constitution. Ashleigh Merchant, a criminal defense attorney in Atlanta, agree in saying that any steps to restrict freedom of expression in any form to anyone is wrong.


"Many times, it is a single outlet for an inmate. If a son or daughter is in prison, want their family must have an outlet, the kind of family members keep up to date on what is happening with the pasted life-there is still a member of this family, "she said.


Merchant agrees, inmates do not use mobile phones in prison and says prison officials must use more energy to enforce inmate mobile phone bans and persecution laws that are already on the books. She says proposed social networks ban is superfluous and unnecessary.


"It is already illegal to have mobile phones in prison – so if they enforce the law and in fact they worked a little harder to keep cell phones out of prison, I think that would serve the same goal," merchant said. "There has been some talk about threats through social media and threats are already illegal, so they have an avenue to enforce. They need another law to enforce. "


Rep. Gilliard said the Republican leadership in the South Carolina State House supports his bill, and he hopes that it will come up for a vote as early as next week.

Most mobile phone Apps violate Open Source rules-PCWorld

Seven of the 10 Android and iOS apps that open source "fails to meet basic open source license requirements," according to a new analysis.


Open Logic, allowing open source software support, scan and governance tools, said that the analyzed 635 mobile applications for Android, iPhone and iPad, including 66 open source software under the Apache, GPL or LGPL license. The vendor found that 71% of the 66 apps violated important commitments by the open source licenses required.


Although the revision only 66 open source apps, there are many more such programs running on Android, iPhone and iPad, or at least in the works. Black Duck Software recently examined 3800 free and open source mobile projects started in 2010, and found that 55% on Android and 39% to Apple's iOS.


Small print: introduction to the Open source software licensing


Meet open source requirements seems to be a sore spot for mobile developers, as the Open Logic survey is any indication.


"Many mobile and tablet developers may not have a complete picture of the open source they use and the requirements of the open source licenses," Kim Weins, Senior Vice President of products and marketing at Open Logic, said in the announcement of the survey. "This has real-world consequences. For example, has the Free Software Foundation stated that the GPL and iTunes licenses are not compatible, and Apple has already several apps from the store who were determined to be under the GPL. Google has also takedown requests received for Android market apps that violated the GPL. App developers should pay attention to the open source license compliance to ensure that their apps are not affected by legal actions. "


The Android operating system itself is open source, using the Apache licence, as well as the GPL for Linux components. But Google has been sued by Oracle, which claims Java Android infringes on patents and copyrights. Apple's iOS is proprietary.


Open the scan Logic of Android and iOS apps found that most of the open source ones violate GPL requirements such as the provision of source code or an offer to the source code or the requirement for a copy of the license; most mobile apps using the Apache licence violated requirements to get a copy of the licenses or the notices and their powers.


Scrap were on Android and iOS similar. The Android apps compliance rate was 27% and iOS was on 32%.


Open Logic also said that two Android applications contained LGPL version 2.1, a license that "might have potential conflicts with Apache 2.0, the big license of the Android operating system."


Further, Open Logic said it was "found several apps with extensive end-user license agreements that all software included claimed was under their copyright and ownership of them-when in fact a part of the code in the app open source."


Open Logic has not identified a specific apps, but said her selection focused "top paid and free apps for Android, iPhone and the iPad on a variety of categories," including "apps out of the top 20 companies in the Fortune 500." Categories included "banking applications, sport and game applications, applications of the world's most recognized brands and media organizations and popular applications of smaller companies."


Jon Brodkin follow on Twitter: www.twitter.com/jbrodkin

Threats to travel data-the New York Times

"It's a big, big problem for firms and workers and more and more every day," said Bruce McIndoe, President of iJET intelligent risk systems to travel risk management company. "It's a ripe environment for hackers and criminals."


The report issued last week, Symantec Corporation, a provider of software and the Ponemon Institute, security, privacy and information management, research, found that the data breach is declining, and he showed no signs of increasingly more expensive.


"As business travellers, we are on the way, we forget that we are psychologically to the public," said Ben Knieff, Chief of the product on the market for fraud in NICE Actimize, a company that focuses on financial crimes in the financial services sector. Mr. Knieff recalled, as he was boarding and heard Executive speaking aloud to a mobile phone, book a hotel, he let his credit card information, including the security code.


Laptops and mobile devices has many errors, starting with the loss and alienation. McAfee, the company security officer, also noted in a report last month, 46 percent increase in the amount of malware created for mobile devices from 2009 to 2010. If you want to limit the exposure of particularly sensitive information, some companies switch to mobile devices, when employees travel, said Mr. McIndoe. "An older version may be more vulnerable," he said, when the criminals had time to learn it. And criminal access to mobile networks may be easier in some foreign countries, the security measures and corruption.


Michael Malin, Executive Vice President of Mandiant, companies in information security, suggested hide mobile devices when they are unattended. "We've all seen the maids to leave the hotel room door open, and with service trucks," he said. Someone could easily enter into the room and infect a computer or to extract sensitive data, "he said.


"We see the use of social networks to gather publicly available information on the objectives," he added. Upload photos and travel plans can threaten personal safety and sensitive trade negotiations, the experts said.


Publicly shared computers in hotels and Internet cafés "are probably the most risky," said Mr. Knieff. "Someone to walk and sit down," he said.


Even print tickets can be dangerous. "Don't let them publicly or trash cans. Whenever you leave the information about yourself in a public place, creates opportunities, "said Mr. Knieff.


Debit card skimming is also growing rapidly data, in particular in Europe and parts of Asia, said Mr Knieff. Recommended that passengers report their plans to the Bank. When you use the a.t.m., passengers should look for signs of manipulation and machines only in banks, preferably in protected areas.


"I often travel to Southeast Asia, and you'll hear about how it is a hotbed for credit card fraud," said Bryndon Bay, President of Mel Bay publications, music publishing, in the Pacific, MO., relies on its iPad and iPhone on the road. Both are locked and protected with secure passwords. "Never go to places where I have to enter the following numbers, credit card information or any personal information," he said, "and I always clear from the history, after the completion of don't believe because who can continue after me."


"I just feel to use common sense and it works for me," said Mr. Bay.


Robert Hamilton, senior product marketing manager for Symantec, we recommend that you avoid public Wi-Fi. "Some of the potential flashpoints as legitimate, but set up by criminals," often the terminals of the airport. If you are using a wireless connection, suggested that they enter through a smartphone, which is much harder than the hack. And in hotels, get the key before using a wireless connection, said that it is not "sponsored by the person in the room next door."


Betsy Page Sigman, Professor of operations and information management at the McDonough School of Business at Georgetown University, said the passengers will participate in the Convention should also be aware of the risks. "Do you want to be overly cautious, particularly in the case that you're around many of the competitors," she said.


Bob Austin, President of KoreLogic, advice, information security, he said: "If a single piece of advice for the business traveler, this is the encryption of the entire disk," he said. Use with robust phrase, similar to a password, "everything on the hard disk is protected against disclosure." Many organizations also require their staff by using virtual private networks, which will reduce the risk of accessing public wireless networks. V.P.N. sends data through an encrypted tunnel.


Tracy Armer, systems for Madison Park Group, stationery, and gift company in Seattle, said the Director of the sales employees use the encryption of the entire disk and V.P.N., when travelling, but it is not recommended with laptops is critical. "You could be on a business trip, innocently searching for a place on the Internet, to eat but the financial folder exists, open on the desktop," he said. "Someone could potentially browse the contents of the portable computer."


Suggested reading on paper, which sells the company while traveling.


Unfortunately, he added, "despite the strong security measures, nothing is ever 100 percent safe."

Wolverton: Motorola Atrix, Smartphone, which must be more than this-Mercury News

Mercury News Columnist

The new Motorola Atrix is a smartphone that aspires to be much more than that.


The Atrix can be thought of as one of the first examples of a post-PC computer, offering many of the same advantages of a PC in a much smaller, more portable and more adaptable form.


When the Atrix is plugged into an optional dock that resembles a notebook computer, it can be used much like a laptop. Another dock can be connected to a computer monitor and keyboard to allow the Atrix to act like a desktop PC or can be connected to an HD television, allowing the device to act as a kind of digital set-top box. The accessories allow users to write e-mail, surf Web pages or even watch movies as they would on a standard computer.


To be sure, the Atrix is more than just a wannabe PC. It's also a fully capable smartphone based on Google's Android operating system. It's superfast at playing games and running typical phone apps, thanks to its dual-core processor, one of the first in a device this small. It has a high-resolution 4-inch screen, and includes a new, refined version of Motoblur, Motorola's software that links together contact information and status updates drawn from users' social networking and other online accounts.


But it's the Atrix's ability to mimic and potentially replace other tech gadgets that makes it so intriguing.


I'm writing this review at my desk. For part of the time, I've used the monitor and keyboard I use with my

office-issued Windows PC. But I've also been using something that looks and feels very much like a notebook computer. In both cases, the actual "computer" I've been using has been the Atrix.

The notebook accessory for the Atrix, dubbed the laptop dock, has a full keyboard, a trackpad, an 11.5-inch LCD screen and its own battery that Motorola says will last for up to eight hours of use even while recharging the battery that's in the phone itself. The Atrix plugs into the accessory through a dock that's hidden behind the accessory's screen.


When you plug in the phone, the screen on the laptop dock lights up and you get an interface called "webtop" that offers a computer desktop and taskbar. From the webtop taskbar, you can launch the Firefox Web browser or, through a virtual image of the Atrix's screen, any application you have installed on the device.


The other accessory -- the HD Multimedia dock -- is more versatile. If you attach it to a computer monitor via a digital video cable, you can use the Atrix as a kind of desktop computer. The dock has two USB ports into which you can plug a wired keyboard or mouse or an external hard or flash drive. You can also connect the Atrix to a wireless keyboard or mouse using Bluetooth.


Alternatively, you can plug the HD dock into your TV using an HDMI cable and use the Atrix as a media player. A built-in application called entertainment center allows users to quickly access and view on their television the pictures, songs and movies stored on the device. The HD dock includes a remote control that allows users to do all this from the comfort of their couch.


Unfortunately, the Atrix's versatility comes at a high price and doesn't work very well in practice.


The laptop dock alone is $300 -- not including the price of the phone or your wireless service plan -- which is about what you'd pay for a low-end notebook computer with an actual brain in it. The HD dock, with a bundled keyboard, mouse and remote control, goes for $190, or about twice what you'd pay for a Roku media player or Apple TV, both of which are able to do much more as digital living room devices.


Those prices might be worth paying if you could get years of use out of the docks and plug into them not only the Atrix but other smartphones. But right now, the docks are compatible only with the Atrix. Motorola won't say whether it plans to make devices in the future that will work with them. Even if the company does, it's a good bet that the docks will work only with Motorola gadgets, which means you'll have limited choices for compatible devices in the future.


That limitation aside, the laptop dock in particular was disappointing. Although it's wider and deeper than a typical netbook, its keys felt similarly cramped, leading to many typing errors. Meanwhile, I had to be wary of resting my palms on its touchpad -- an easy thing to do -- for fear of moving the cursor to a different part of a document and inserting or deleting words in the wrong place.


The webtop software was also underwhelming. It fails to translate the phone's native apps into a PC-like experience. To run a phone app, you have to call up the virtual phone and launch it there. The experience makes you feel as if you are viewing those apps through a literal window.


The only native webtop application is Firefox, and Motorola has no plans to open up the interface for other programs. You can run cloud-based programs through the Web browser or a built-in Citrix client, but you may not want to. Because as speedy as the Atrix's processor is for running phone apps, it labored noticeably while running webtop.


Even when just composing this review in Google docs, I noticed a considerable lag. While trying to highlight a word or line to delete or change, I'd often wait several beats before the Atrix would respond. Often times, I ended up highlighting or deleting far more than I wanted without knowing it. I ran into similar sluggishness while just surfing Web pages in Firefox.


I actually like the Atrix a lot as a smartphone. But as the first of what will likely be many attempts at an all-in-one gadget, it comes up short.

Contact Troy Wolverton at 408-920-5021 or twolverton@mercurynews.com Follow him at www.mercurynews.com/troy-wolverton or Twitter.com/troywolv.

troy's RATING7.5(Out of 10)What: Motorola Atrix 4G smartphone
Likes: Speedy processor, high-resolution screen, versatility
Dislikes: Accessories are expensive; laptop accessory has cramped keyboard and flaky touchpad; device slows noticeably when docked.
Specs: Dual-core 1-gigahertz processor, 4-inch screen, 16-gigabytes storage, front-facing VGA camera and 5-megapixel rear-facing camera
Price: $200 with two-year contract with AT&T. Laptop dock is additional $300. HD Multimedia dock is an extra $190.
Web: http://www.motorola.com/, http://www.wireless.att.com/

Jumat, 25 Maret 2011

NASA-top to host open-source-GCN.com

Forum will challenges in Office, open-source community

NASA will be hosting an open-source software Summit in the Ames Research Center in Moffett field, California, at the end of the month to the leaders in the open-source community together to focus on the challenges facing the community and to processes, policy and culture necessary open-source development.

The top, which take place March 29-30, will have a variety of speakers from the open-source community, including Director of Mozilla Labs (the company behind the Firefox browser) Pascal Finetti; Dr. Robert Sutor, vice president of open systems and Linux at IBM; and Brian Steven, a chief technology officer and vice president of engineering at Red Hat, among others.

"Open source brings numerous benefits NASA software projects, including increased quality, reduced costs, faster development cycles and fewer barriers to public-private cooperation Agency for the commercialization of technology," said Chris Kemp, chief technology officer for it at NASA, in a press release.

According to the release include targets for the top; establishing a method to support cooperation with the public about the development life cycle; Exploring NASA's ability to release and develop software under a variety of open-source license; to determine whether and to what extent NASA to the open-source software governance bodies can participate; and collect best practices from the private sector and other federal agencies.

The Summit will be facilitated by Wayne Moses Burke and Lucas Cioffi of the Open Forum Foundation. Forum participants will break down in focus groups and policy solutions to challenges such as the open-source license, governance, risk assessment and the International Traffic in Arms Regulations to discuss.

About the author

Than Rowinski is a staff reporter for communication technologies.

Kamis, 24 Maret 2011

Microsoft Chief shuns the englobe/vidéo Google open codec-Register

Microsoft Chief associé and projects was that Google WebM to announce software allows Internet Explorer 9 and other applications to be possible, let us use WebM vidéo Web site media and format that open Google profit out under a license-wikipédia redevances last year.

But he is on the utilisateur to install software: Internet Explorer 9 is equipped with the pre-redevance-grevé h. 264 codec, and will continue to include only h. 264. Microsoft Chief remain open source WebM catégorique, this legal protection has called for does and the EU.

On Tuesday, the Register reports that Google was a WebM plug-in for Internet Explorer 9, after this télécharger remarquer page does software, Google now changed the page to indicate that this is not a plug-in really navigateur, and in a blog post, Google WebM project, jam, explained that the software you please not WebM and Windows, the Microsoft Chief Media Foundation ('M) SUPPORT.

This means that it can make WebM in many application Windows, including Windows Media Player as well as Internet Explorer 9. Google and Microsoft Chief called the package composants Microsoft Chief Media Foundation ('M) to WebM, and according to Google, Microsoft Chief helped build the software.

Based on the WebM VP8 video codec camera Google acquis and acheté technology On2 last year in a deal worth $ no. 6 million, and it was meant to use HTML5 label vidéo. Google envisage format as a standard that redevances-wikipédia remplace h. 264, la redevance grevé codec built in both Microsoft Internet Explorer, and Safari jackets Apple to use HTML5 video.

Last year, after Google's WebM, Microsoft Chief says that although Internet Explorer 9 would not have WebM, utilisateurs will have the option Of installation of the codec daughters. And on Wednesday, Microsoft Chief Manager of Internet Explorer Dean Hachamovitch in the WebM project and announced that the release of the composants WebM to be possible.

'' Today IE9 can play HTML5 video in industry standard format h. 264 WebM format and more, '' he said in a blog post. '' With free WebM project of WebM for IE9 Composants (Aperçu), client Windows go in IE9 can play WebM video page Internet. IE9 is the only browser links today are committed to the one I directly. "

But as he said, you'll have to install WebM alone. Microsoft Chief sauvegarde WebM but it won't do these things in navigateur. Redmond, you see, there is aversion to open source software.

'' As an industry, "Hachamovitch respect said, '' we still face many legal, questions about obligation, risks and support for WebM, q: the liability and risk to consumers, and develop until the legal system has propriété intellectuelle les résoudre? When and how does Google even before opening community Norms for engage Web site? It is this plan to restore consistency On périphériques PC, Internet and services? "

Google said the Period believe that after a thorough review of the situation, and that WebM is legal on the Earth. But he did not give his patent record caractéristiques go see indemnisation for WebM utilisateurs. With this, the MPEG-LA, the organization that licences, h. 264, is in the process to have put a lot of license to WebM, Google's claims that the interesting format redevances free.

Microsoft Chief not only exposition in this battle with Apple, and party h. 264 patent pool.

On a level of Redmond to find a compromise with the Mountain View, sauvegarder les composants WebM to be possible. But by the end of the post, the Microsoft Chief Hachamovitch took a statement after the biggest rival company, '' the people who build and use the Internet deserve practice and cohérente support vidéo rather than ideology, '' he said, to the readers of a blog post to Google and Lien "ideology."

The post is where Google the world he was pull H. 264 of Chrome. This has yet to come-Chrome 10 still includes codec--but Google said the pull of h. 264 soon.

'' To companies as Google licenses the brother cannot material, but for the next great démarrage vidéo and all the people in the news these fees étouffer renovansyon, '', the post bad Google '' But this is not only license fee. a more important consideration is March renovansyon and order growth. Community process is perfect, but it's generally the case that by cœur development community website platform composants with experience utilisateur, security and performance in mind.

'' When technology décisions are swollen by one Bill to collect patent Royalties, priority and he saw them less clear and the process tends to take a lot more. It's not good for health video Web site terms. We believe that the Web site will suffer if there is a alternative to develop community open truly quickly in, important investments to ensure that it is one. "

Microsoft Chief soies House. The company believes that its approach is the more "open" of both. '' Working in [Science 's] question is part of the Web site déplacement, "Hachamovitch said at the end of post." the open Web is a product open dialogue and consensus. This post is part of the dialogue to advance the website forward. "

But Microsoft Chief at least that to believe that the approach is more door on two years ago. Its stance has less to do with lae and more to do with the lawyer. ®

Nokia e-mail for users of tests for monitoring for India-Wall Street Journal

New Delhi – creator of Finnish mobile phone, Nokia Corp. said Monday it has set up servers in India for its email services to consumers and is testing solutions that will allow the country's security agencies shall ensure that those services.


"We have completed our commitment," d Shivakumar, Vice President and Managing Director, Nokia India, told Reporters. He says that is likely to be completed in the next three months.


Mr. Shivakumar made clear that the company is in negotiations with the Government to allow the country's security agencies monitor email services to the user, as well as non-corporate e-mail services.


The Government of India was concerned about corporate e-mail services such as those that run on the Canada-based research in motion LTD. 's BlackBerry smartphones. India fears that strong encrypted e-mails through smartphones to sent them convenient for terrorists to use undetected.


RIM already has provided access to its services to the messenger-the other service, which has been under the lens of security agencies--but is maintained, it may not provide a solution for corporate emails, since there is no available technology that will allow the monitoring of the service.


Burn PSO Jai Krishna in krishna.jai@dowjones.com

Rabu, 23 Maret 2011

Can Android be the BlackBerry government job? -GCN.com

Google drive leads smartphone market, but weaknesses in the way of Government adoptionThe last numbers in the Smartphone wars are in, and they have implications for how civil servants are going to interact with each other for his – along with the Governors of the Agency, and even of society – in the near future.In a statement issued on 8 March solid comScore research said the combined market share of the Android smart phones powered by Google's mobile operating system, has surpassed a market share of research in motion's BlackBerry with the clear border.Between October 2010 and February 2011, comScore says BlackBerry lost 5 percentage points in the overall smartphone market, from 35.8% to 30.4%. Meanwhile, Android has won almost eight percentage points-from 23.5 per cent to 31.2 per cent.If you are a Federal employee and wonder why you should care about a few decimal points of market share, this is because the shift marks the emergence of a technology that is likely to be a standard for social and professional communication in the Government for years.This is a pattern that plays many times before.4 steps to ensure your AndroidWho works on Android security protect?Malicious software, which are found in the Google Android security appHow will you spend $ 2,000?Users go wild on a given product, and it entered the commercial establishment, until by the Chief Executive Director of the Office. When civil servants begin to use it for quasiprofessional purposes, use Agency penalties, which are limited, acceptable use policies are saved in the end, and the technology becomes firmly in the labour force.This happens with the BlackBerry, this happens with Facebook, happened to Twitter – all of which became frequently used public sector technology.The Android horizonEven so, however, that Android is increased, it has a long time before he consolidates this position. So far there is no federal agency has to support popular phone. But this is changed, program managers and analysts on the market. It may not happen immediately, but Android finally will permeate the Government community, they say.Current barriers for Android are traditional for emerging technologies: the lack of strong protection and enterprise device management. Although RIM drive as well as Android does not. This is a coincidence, therefore, that one of the first major smartphone malware hit the feats Android ecosystem first.In March at the earliest batch of 58 applications are open to malicious software, called DroidDream, designed to meet the smart phone and create a mobile botnet. Download exploit DroidDream-known as "rageagainstthecage"-you will get access to the Android kernel and took control of phone permissions. Then it will download the application of Task Manager, which will make both programs cannot be removed.

Bouris provides security products to local data center-Australian Techworld

The Executive Chairman of the TZ Limited, Mark Bouris, notifying protection infrastructure TZ access control systems (back) for local entrepreneurs serial based on the marketSydney and the star of The Apprentice, Mark Bouris, Australia has launched a set of IP-based access control systems, data center local customers in partnership with cabling contractor Anixter. TZ Limited is the parent company of the protection of infrastructure, TZ, which develops software for the security of access within the data center and equipment in the network. The Executive is the President of the TZ Bouris.The technology was originally developed in Australia, but now based in Chicago, PR in the us.Speaking at the launch Bouris said: "the physical security is as important as the security of the data." "In recent weeks filming from TZ throughout Canada, Europe and Australia," he said. "The products have been available for some time in the US, but it is important to track. "TZ has two main products, and TZ TZ Praetorian Centurion, which allow administrators to control access to systems in the Cabinet or Cabinet level.Centurion also does environmental monitoring and to integrate into existing network management systems.Is IP-based access to servers is controlled with a Web interface from any computer and a demonstration of unlocking the Cabinet has been carried out with the iPad. At cabinet system uses electromechanical lock than can be manually overridden with the key. Both systems have the audit trail capabilities and send notifications when an event is triggered.Tim Martin, Executive Director for Anixter South Pacific, said the institutions was an explosion in data center activities, and according to his research, 11 percent of IT managers remain on physical security.TZ infrastructure protection CEO John Wilson said that the concept of micro-protection is the combination of physical security and monitoring events. "We use intelligent devices that can operate and audit, "said Wilson. "Intelligent device TZ has a Web-based microchip, mechanical locking, an integrated sensor and is compatible with 80 percent of the existing Cabinet."TZ products are intended to ensure the carriers and boxes, no physical access to the data center, alone, but Wilson said that the software can be integrated with other types of access control tools, including those that use RFID and biometrics.Wilson said, is the encrypted data, browsing the Internet and the software uses RADIUS authentication.By Rodney Gedda on Twitter: @ rodneygedda for TechWorld Australia on Twitter: @ Techworld_AU

NASA to Host Open Source Summit March In California-Imperial Valley News

Washington, DC-NASA will host a Summit on open source Software Development on 29-30 March on the Agency's Ames Research Center in Moffett field, California. The event runs from 9 a.m. to 5 p.m. PDT on both days.

NASA's first Open Source Summit will bring together engineers, policy makers and members of the open source community. Participants will discuss the challenges within the existing policy framework of open source and propose changes to facilitate of NASA's development, introduction and use of software.

"Open source brings numerous benefits NASA software projects, including improved quality, reduced development costs, faster development cycles and fewer barriers to public-private cooperation Agency for the commercialization of technology," said NASA's Chief Technology Officer for information technology Chris c. Kemp. "The full benefits of open source can only be achieved if NASA is able to processes, policies and culture needed to encourage and support open source development."

Objectives for the Summit, establishing a method to support cooperation with the public during the development life cycle; Exploring NASA's ability to release and develop software under open source licenses varied; to determine whether and to what extent NASA to the open source software governance bodies can participate; and collect best practices from the private sector and other federal agencies.

Guest speakers will provide insight into the best practices and valuable lessons learned in the construction and the use of open source communities share. Confirmed speakers include Kemp; Pascal Finetti, Director of Mozilla Labs; Robert Sutor, vice president of Open systems at IBM; Chris Wanstrath, CEO and co-founder of Github; and Brian Stevens, CTO and vice president of Worldwide Engineering at Red Hat.

The Summit will include sessions on licensing, government restrictions, such as the International Traffic in Arms Regulations, governance, and risk assessments.

Seats at the event is limited. However, virtual participation is open to the public through online media, including live video streaming, electronic discussion and joint to take note. For more information or to register for the Summit, visit:

http://www.NASA.gov/open/source/

Nintendo download Update: Crusoe, Liight, mix Superstar-monsters and Critics.com

Nintendo adds new titles to the Nintendo DSi Shop and Wii Shop Channel on Monday. Users with broadband Internet access can redeem Wii points or Nintendo DSi points to download the games. Wii points can buy Wii Shop Channel. Nintendo DSi points can buy Nintendo DSi Shop.

Nintendo adds new titles to the Nintendo DSi Shop and Wii Shop Channel on Monday.


The Nintendo points card can be purchased at retail locations. All items in one of the Nintendo points card has been redeemed the Nintendo DSi Shop or Wii Shop Channel. They are not transferable and cannot be shared between the two systems.


Nintendo DSiWare:


Zombies
Publisher: PopCap Games
(1) in accordance with thePlayers:
ESRB rating: E 10 + (everyone 10 and older)-animated blood, Cartoon violence
Price: 800 Nintendo DSi points
Description: Mob attack of Mania is a fun loving home, and the only defense is your arsenal of plants home guarding.


Laby Rabi
Publisher: Agetec Inc.
(1) in accordance with thePlayers:
ESRB rating: (E), (all)
Price: 500 Nintendo DSi points
Description: Alice is a Spunky young girl who adores her fluffy pet rabbit named Rabi. One day Alice and eventually found the Rabi search him right before he jumped to a small hole in the tree. Without thinking twice when he jumped, Alice. This is where the magic Adventure begins. Alice and face the exciting animal and Rabi of sentient beings, which may lead to the exit, or to prevent them Escaping. Together, they explore and discover things, unlike anything they ever seen before. They must operate as a group, find the key and to escape the great labyrinth of each region. Alice and Rabi has its own unique skills and you switch between the end of each region, in order to finally escape the labyrinth and the more dynamic.


1. Mahjong 5
Publisher: cerasus media.
(1) in accordance with thePlayers:
ESRB rating: (E), (all)
Price: 200 Nintendo DSi points
Description: Play with all the bells and whistles without standard mahjong. You can choose from over 300 layouts, or to try different variations of the game. In the "Countdown," is only 20 minutes to remove the tiles. With the "Other," the train of memory capacity for each section is only briefly visible. Don't dally "Shuffle" mode, the Board will, in fact, if the match is not made in good time. "The Match", you simply have to search for particular tiles. Side-by-side images are surprisingly sharp, so that they can easily be identified. Select the favorite model of the tile-enjoy great audio track and high-quality animation, which creates an authentic gaming experience. Your skills in a range of difficult layout. If you are stuck, tips to help you.


WiiWare:


Liight
Publisher: The Studio Walljump
(1) in accordance with thePlayers:
ESRB rating: (E), (all)
Price: , 500 Wii points
Description: Liight is a puzzle solving game in which you can use different colored lights and the shadows to make music and solve puzzles. Liight each combination is a unique puzzle game mixing and organized special on board the objectives. If the color of the light is fully covered by the corresponding to the item, the item with the glow and play music. Puzzle game is resolved when all objectives are a type of headlamp fitted with filament and playing music together. Each piece of the puzzle is different every time you play. Direct mode is a fast-paced arcade Liight-puzzle game that you'll learn how to use the good result in the continued battle mode at the same time, the solve order basic concepts. Liight is also creates its own puzzles to do in the way you want, and the Share mode to Send the WiiConnect24 service to Wii friends.


Mix Superstar (demo version)
Publisher: Digital Leisure Inc.
(1) in accordance with thePlayers:
ESRB rating: (E), (all)
Price: 0 Wii points; available in the full version of 500 Wii points
Description: Create, mix and burn your own royalty-free music right in the Wii console. More than 1,000 Dance, Hip Hop and Techno loops included a number of instruments such as Drum, bass, synthesizer, guitar, and even the size of the audio tracks. Mix Superstar allows you to export your music creations and download them to your computer, so you can take them on the road. WiiConnect24 service also allows you to send songs to Wii friends who own the game, and even collaborate on mixes. Also included is full support for the Logitech USB microphone, and the Wii speak accessory (sold separately), so you can fix your own vocals.



More than a shop expands its Software product selection include Open Source ...-TheStreet.com (blog)

More than a store offers a full line of commercially available consumer products such as Microsoft Office, PhotoShop and DreamWeaver. Representatives of companies just announced that they will now also carry full line of free open source products from 15 March 2011.

Representatives of more than a store felt they had to start offering free open source software alternatives to the commercially available software products. Are part of their corporate mission is to provide customers with solutions rather than just a list of products.

Recently, one of their customers was confronted with a situation where its Windows Vista operating system so corrupt that he no longer could reboot his computer had become. He had important information on his computer that he needed to be able to access. Its windows operating system reinstall was not an option if he had lost his installation disk with the receipt. The customer had originally bought its operating system from another software company. More than a store, so representatives could not simply just send him a different installation disk.

Because he had access to another computer and an internet connection, were representatives of more than a store still able to provide assistance. Representatives took him to a Web site to download a free copy of the operating system led Ubunta.

Ubunta is an open source computer operating system that can be installed on each computer.It can also be run from a CD, leaving the current Windows operating system in tack. Open source software is software that is not patented, and are free for anyone to use. The goal in making it is free to encourage individuals within the community to further develop and refine the product.

When most people think of a word processing program, is the first name that often comes Microsoft Office. If asked for good software package for editing photos, most people call PhotoShop. These are great software programs that are well written and easy to use, however, they are a bit pricey.

Selasa, 22 Maret 2011

Smartphone users tend to take account of the missing lock up-Seattle Times

Probably you have the door is locked when you leave Home, do not leave the keys in the ignition when you're in the 7-11 milk and have at least some form of security software on your computer.


But how about your Smartphone?


For many people phone these days is a mobile office, crammed with valuable contacts, digital portfolio, from which you buy songs on iTunes or shoes on Amazon, and the portal to your online bank account.


Instead of locking phones as bank Treasury most Smartphone owners treat their devices with great concern, as monopoly money.


According to a study by security vendor Symantec 54% of smartphone users do not have a password to lock the phone when they them or them to wake up after sleep mode.


"I think there is a defined gap awareness right now," says Mark Kanok, group product manager for Mobile Division of Symantec Norton.


"Only for a few years, your phone is a phone. Then came the iPhone and people downloaded applications. People began to ask questions, ' how is this will affect my privacy, what happens if I lose it, "things like this."


In the upper part of the dangers posed by your phone is lost or stolen, there is also a growing number of malicious apps intended to steal data from it or rack up huge text accounts.


Last week, Google downloaded several dozens of free apps from its Android market, which was filled with damaging code.


Symantec, assessed that the apps are downloaded anywhere from 50 000 to 200 000 times within four days before they have been downloaded.


John Thode, Vice President and General Manager of the mobility group in del said many smartphone users do not realize the value of the device until it is gone.


"The reality is that when you lose your phone or your phone breaks, there is instant panic that comes around," he said. "Holy smokes, where are my contacts? How to get back all his life? "


advertising


Concern is raised when an employer begins to give smartphones to their workers or allow those workers who connect their personal devices with the corporate network, says Maria Chan, Vice President of the passage of an enterprise mobile solutions division. The Chan group started, security systems and procedures for mobile devices in corporate networks.


She says, can reduce compromise phone with access to the corporate network.


"I think that most of it and CIO everything really are concerned about the management of device management, what is the load on the device," she says.


Chan pointed to evaluation by the research company Gartn?r, that around 300 million smartphones will be connected to the corporate networks by 2015, with about half of these devices are personal tools for employees.


Similar consultations


A large part of the security advice for individual smartphone users and corporate heads of overlap.


Install only trusted applications to your phone.


Use Web-based programs that allow you to remotely track or delete all data on your Smartphone, if it fails.


Not be carried out financial transactions in a public or unfamiliar Wi-Fi networks where your data may pass through hacker router.


Employers may also take additional steps, Chan said, such as the hire of employees installing apps only preapproved list.


Another possibility is keeping valuable corporate data only available online, instead of letting the individual users who download it to their phones.


Tools


Phone makers and software developers are pushing some of these tools of smartphone users.


Apple, for example, offers free software to the iPhone and iPad that allows users to remotely, set the password lock, if the device is lost or stolen, grieved geographical or even to delete all data from the machine as a last resort.


Norton Mobile security for Android devices to include malware scanner designed to catch crooked applications before they bite.


Even with the protection of technological mind of the consumer can go a long way.


With simple games and screensaver applications, for example, must not be a request for permission to access your text messages. If they do not, you're more likely good canceling installation.


Strong protection software and individual concerns will become even more important over the next few years as handset manufacturers and carriers adopt technology that will turn your phone into a wireless digital portfolio.


The so-called near field communication or NFC, systems must life more convenient, allowing you to store your credit and debit cards and, finally, your driver's license digital phone.


You will simply wave your phone over the scanner in the cash register to pay and is on the road.


Purpose of thieves


But as our phones become more valuable to us, they will also become a target for thieves.


"After the NFC starts happening, you will see hackers enter this area in a much more significant way," said Thode in the del.


Apple is rumored to be including NFC chip in next-generation iPhone expected this summer, and Samsung has already released NFC-equipped link S.


Kanok Norton, said the growing need for better protection of the Smartphone seems to be sinking.


"I think the case is slightly lagging behind where we are on the PC front," he said. "But I think the sensitivity is picked up during the last year."