Posts Tagged ‘someone’

DCIM is 2013’s ‘It girl,’ and other singular record predictions

Monday, January 7th, 2013

Does anyone here know what day it is? These Tuesday holidays certain make for treacherous workweeks.
What we do know for certain is that final week, Searchlight presented a year-end
list of lists
covering a best (and some of “the rest”) of 2012 and a prophecy or dual for
the year ahead. Fresh off that happy holiday high, we’re vehement to contend we motionless not to
toss out a clear round with a Christmas tree. That means a few some-more record predictions
from around a Web about information core infrastructure government (DCIM), amicable media, “big data”
and more, and a click that (nearly) stole Christmas. Grab a final few sugarine cookies, forget about a past
and take a gander during what’s next.

Karen GoulartKaren Goulart

Let us know what we consider about a story; email Karen Goulart, Features Writer.

Article source:

Remembering Your First Computer Is For Old People

Sunday, October 7th, 2012


Because we usually gifted a one-year anniversary of Steve Jobs’ passing, we began to consider about how record has impacted my life, and how opposite it is for today’s children. we suspicion about my initial computer, what computing was like behind afterwards and what it’s like now. And it strike me: stories where people recount tales of their initial computer will turn something usually the old people speak about.

Don’t laugh, I’ve been rowdiness myself for some time that I’m not one of those “old people.” After all, it’s not like we remember punch cards.

I remember a initial mechanism we bought with my possess money. It wasn’t a cold Apple II or a colorful iMac. It was a cheap, beige Gateway PC. (Forgive me, we was bad and it was on sale.) It ran Windows 98. And it crashed constantly. In fact, it blue-screened so many that we finished adult spending hours on tech support calls, removing walked by restorations, booting into a BIOS, and eventually training a small about how PCs worked. It altered my life. we satisfied that computers were interesting, and we wanted to know some-more about them. we went behind to school, and after finished adult operative in I.T. for a few years. Somehow, that trail brought me here, blogging about tech companies and startups.

But now a destiny is quick approaching. “First computer?, pfft,” a kids will smirk. we might as good be vocalization of my initial microwave, my initial TV, my initial vacuum. It will be mind-boggling to them that record wasn’t just there, like a toaster oven or atmosphere conditioning. They won’t consider about a iPad as this thing that came into their life, impacting it, changing what’s possible.

It will be like revelation kids that, yes, we grew adult though a mobile phone. ”That’s so weird,” they’ll say. Kids, we had to remember people’s phone numbers, we tell you. we got mislaid a lot! Like, great and alone in-the-middle-of-nowhere lost. we had to rest on a affability of strangers when we got a prosaic or ran out of gas. When we went outward to play, my relatives had no suspicion where in a area we was! we wrote letters from summer camp, and wrote to coop pals. we always had stamps. “What’s a coop pal? Oh my god, you’re sooo old,” a kids will laugh.

Similarly, indeed remembering and recounting tales of your first computer will shortly be this odd, aged chairman thing to do, too. Kids’ initial computers will be their parents’ hand-me down iPads. There are children being innate into a universe now who have always had an iPad. Like, from babyhood. we know that we know this already, though unequivocally consider about that for a minute. To these kids, a iPad wasn’t any newer a thing to them than anything else in a world. It was there, usually like atmosphere and sunshine, plants and animals, houses and cars, skyscrapers and freeways, boys and girls, dolls and bicycles…TVs and iPads. It’s usually another thing.

It’s not quite special, or notable.

It’s not amazingly thin.

It’s not super irritating since it doesn’t have a keyboard or mouse. It’s not uncanny that we daub and hold it, or lean it when personification a game. That’s normal. That’s what we do with computers. (“Computers,” of course, being how aged people impute to these things.)

Whatever, it’s usually an iPad. So what?

I was a initial chairman in my family to get a iPad. we brought it over to my sister-in-law’s on Easter. The family upheld in around via a day. It was memorable, since it was this shiny, new unstable mechanism with a touchscreen. That alone done it incredible. It had apps! Games! Gestures! I described it afterwards as “the initial genuine family computer,” since it was something everybody could use. we had creatively suspicion a usually people who would caring about a iPad were my younger nephews. we was wrong. Everyone used it. The kids played games, though so did a grown-ups. Grandma looked during baby pictures. Someone else played cards. Someone watched Netflix. Someone surfed a web. we didn’t get to see it many that day.

But even then, a many implausible thing about a iPad is that it was somehow both new and normal. It was natural. There wasn’t a lot of training involved, we usually picked it adult and used it. Here’s how we described it:

No longer is computing an removed knowledge with one chairman staring during a screen, fingers clacking divided on a keyboard while a rest of a family does something else. The iPad was common between brothers, giggled over by children, and officious snuggled adult with…It was no some-more isolating an knowledge than someone reading a paper in a subsequent chair over. It was simply usually another bland object. And that might be a biggest offered indicate yet: a iPad hides divided a technology, and creates calm king.

My daughter, 3 in December, has had an iPad her whole life. There’s something conspicuous to me about examination her launch Netflix, crop a queue, start an part of “Dora a Explorer,” quick brazen if need be, and strike “play.” It’s not conspicuous to her that she does this, any some-more so than stacking Legos, or putting on shoes. It’s usually another life ability to master.

But we can’t assistance though marvel. And in marveling, I’m display my age.

It’s an iPad, mom. So what?


Image credits: BuzzFeed; I’m contemptible Josie. 

Article source:

Computer fraud targets South Dakota consumers

Wednesday, September 12th, 2012

A mechanism fraud has flush in South Dakota.  Numerous South Dakota mechanism correct businesses have perceived personal computers with confidence issues.

When a correct shops asked a consumer how these problems occurred, any particular indicated they perceived a phone call from someone posing as a obvious mechanism company

Article source:

Forget Passwords: How Playing Games Can Make Computers More Secure

Wednesday, September 5th, 2012

To exam a new resource confidence concept, researchers devised a resource diversion requiring players to daub buttons on a keyboard as vast black dots forward down their shade cranky a plane line–very identical in judgment to a video diversion Guitar Hero.

Stanford University, Northwestern University and SRI International

An essay by Scientific American.

It seems like something out of a Robert Ludlum view novel. Someone tries to require we into divulgence your resource confidence passwords. You competence be tempted to give in, though it is unfit for we to exhibit your authentication credentials. You do not indeed know them given they are safely buried low within your subconscious.

Sounds a bit impassioned usually to make certain no one can record on to your laptop or smartphone, though a group of researchers from Stanford and Northwestern universities as good as SRI International is nonetheless experimenting during a computer-, cognitive- and neuroscience intersection to fight temperament burglary and seaside adult cyber security—by holding advantage of a tellurian brain’s inherited abilities to learn and commend patterns.

The researchers are investigate ways to stealthily emanate and store tip information within a brain’s corticostriatal memory system, that is obliged for reminding us how to do things. When a chairman needs to entrance a computer, network or some other secure system, they would use special authentication program designed to provoke out that tip data.

To exam this concept, a researchers devised a resource diversion requiring players to daub buttons on a keyboard as vast black dots forward down their shade cranky a plane line—very identical in judgment to a video diversion Guitar Hero. During an initial training event durability from 30 mins to an hour, a dots tumble during opposite speeds and in several locations, combining patterns that repeat until participants turn skilful during conflict a suitable buttons during a right time. In effect, users’ corticostriatal memory becomes skilful during repeating a sold settlement over time, such as dialing a phone series or typing a word on a keyboard though looking during one’s fingers.

Brain training
The researchers impute to this as “serial interception routine learning” training, during that a chairman unwittingly learns a specific routine of keystrokes that can after be used to endorse that person’s identity. To record on to, for example, a Web site, a user would play a diversion a same any time that settlement of dots appears, proof his temperament and permitting him access.

“While a planted tip can be used for authentication, a member can't be coerced into divulgence it given he or she has no unwavering believe of it,” according to a researchers in a investigate they presented Aug 8 during a USENIX Security Symposium in Bellevue, Wash. (pdf) As now conceived, a substantial training proceed being complicated competence strengthen opposite someone possibly forcing or tricking we to exhibit a password, says lead author Hristo Bojinov, a Stanford University Ph.D. resource scholarship candidate. Such duress could take a form of earthy or written threats perfectionist your cue or other confidence credentials, or it could be a clearly legitimate phone call or e-mail designed to awaken out this information.

The researchers contend they have tested their proceed on 370 players so distant and continue to supplement new participants to their study. The exam now requires during slightest 30 mins of training to get arguable results. “It is doubtful that training time can be shrunk many given this form of mind memory takes time to get trained,” Bojinov says. “It might be probable to revoke a authentication time [that follows training], though it is nonetheless to be seen how much.”

Gaming a system
Whether this proceed is unsentimental depends on a complement being defended. It is unlikely, for example, that Yahoo or Google would exercise this proceed to confidence for their giveaway e-mail services. Would someone wish to play a diversion for several mins any time they wish to record onto their e-mail? A supervision trickery housing chief weapons, however, could improved clear a time joining compulsory to record in regulating a routine training method, quite if users record in once any day and such an proceed promises to urge security, says Nicolas Christin, associate executive of Carnegie Mellon University’s Information Networking Institute.

This substantial training proceed would not indispensably be effective opposite network hacks. Just as hackers can mangle into databases where passwords are stored, they could further take information about a user’s authentication settlement combined during a training process. “Somewhere, a authentication routine has to be stored so it can be verified, and that might be exposed to conflict as well,” Christin says.

Bojinov responds that a technique he and his colleagues are building privately targets a problem of coercion. “Most expected this resource will be used in and with others,” he says, adding that he and his colleagues are now formulation to pattern a identical diversion for mobile device confidence that would emanate patterns regulating a broader series of actions, such as rotating or relocating their gadgets in further to dire buttons on a keypad.

Password persistence
Despite years of predictions that passwords would eventually be phased out in preference of some-more secure approaches to authentication, they insist given “they are, to date, one of a better—or reduction bad—compromises between confidence and usability,” Christin says. “They are inexpensive to implement, work flattering many in any situation, and everybody knows and understands them.”

Yet as a series of passwords multiplies, a confidence technique turn reduction effective given they aria a user’s ability to remember them all, quite if handling a engorgement of passwords requires a user to ask cue resets to reinstate those that have been forgotten. Hackers have come to rest on password-reset facilities to steal people’s e-mail and other online services, locking those users out of their possess accounts in a process.

More from Scientific American.

Although a proceed due by Bojinov and his colleagues requires a lot some-more work to be practical, it represents a acquire change in how researchers proceed security. The routine that Bojinov and his colleagues poise turns a problem of serviceable confidence record on a head, Christin says. “We might see some-more and some-more investigate in a space of bargain how certain tellurian aptitudes can be used to urge security,” he adds.

The many critical thing to take from a investigate of Bojinov and his colleagues is not that this sold resource is a right one for embedding secrets or not, “but rather that a researchers are exploring neuro- and cognitive scholarship as a means of engineering resource confidence interfaces,” agrees Stefan Savage, a highbrow of resource scholarship and engineering during a University of California, San Diego.

“They have found a approach to force a square of information into your mind though your believe and afterwards take it out,” Savage says. “They have incited we into a DRAM, usually we have no believe of what is stored there. This is Jason Bourne stuff.”

Article source:

ABC36 Special: Security Breach Part 2

Monday, November 21st, 2011

When we expostulate down a standard area travel in Lexington, countless internet networks can be found. These days some-more and some-more homeowners are job technicians to implement wireless internet.

“They’ll fundamentally secure it with a general user name and cue and afterwards let we configure it later,” pronounced Trent Struttmann during Cyber Agents, Inc.

Struttmann says many people don’t remember to configure their internet setup or maybe aren’t certain how to do it correctly. Struttmann says when in doubt ask a veteran for help.

“Go to your internal mechanism store and call them and ask them if they can set adult your wireless router,” pronounced Struttmann.

If we don’t find assistance from a professional, Struttmann says withdrawal a internet source open leaves we exposed to hackers who can do critical damage. The misfortune box scenario-it lands we in justice confronting a assign we know zero about.

“(Someone) could be indicted of downloading something though it wasn’t indeed them it could have been someone else who logged onto a wireless network,” pronounced Struttmann.

Someone else who logged onto your internet and presumably sealed onto bootleg sites with child pornography, bootleg strain share sites or film downloads.

“It can be usually one, we can download one strain we can download one film and get a same courtesy as if we download 500 it usually depends on what we download,” pronounced Struttmann.

Struttmann says that a clever password, regulating a secure internet tie that is sealed to a open and creation certain your phone is also sealed when it comes to wireless internet: is a best approach from apropos a hacking victim.

 Subscribe RSS

  Bookmarks  Email This
  Hits : 6

Your Comment

 Comment* 0 CharactersVerify Code*  Notify me when new criticism post on this article. I have review and determine to Term and Agreement

Article source:

FAQ: What we should know about a Illinois water-district SCADA breach

Monday, November 21st, 2011

Network World – Here are some pivotal questions and answers about a Nov. 8 break-in of a control network during an Illinois H2O application that resulted in enemy blazing out a pump.

Some of these answers are formed on information from Joseph Weiss, handling partner during Applied Control Systems LLC and author of a book “Protecting Industrial Control Systems from Electronic Threat,” who says he got a information from a request he’s seen from a Illinois Terrorism Fusion Center, though he wouldn’t contend how he got it.

BACKGROUND: Apparent cyberattack destroys siphon during Ill. H2O utility

What happened?

Someone hacked into a Curran-Gardner Water District network in Illinois and incited a supervisory control and information merger (SCADA) network on and off. That network controls a machines that run a H2O system.

Turning a complement on and off in spin incited pumps on and off. The consistent interlude and starting of one siphon eventually burnt it out.

How did a crack happen?

Hackers stole user names and passwords from a association that reserve SCADA program to a H2O district, including a user names and passwords of a customers. Workers during a duct remarkable glitches in a H2O districts remote entrance complement for dual to 3 months that could be associated to a attack.

Who did it?

That’s not certain. Traffic has been traced to an IP residence during a Russian ISP, though that doesn’t meant that’s where a conflict originated. It could have hopped from server to server before finally being forwarded from a Russian server.

Why would someone wish to bake out a siphon during a tiny H2O application where a repairs didn’t even miscarry H2O service?

One speculation is that a enemy were practicing in credentials for a some-more poignant conflict possibly during a application or elsewhere. A counterargument is that people formulation a destiny operation would wish to keep their reconnoitering secret. Another speculation is that in experimenting with what they could do to a SCADA system, they inadvertently burnt out a pump. It’s misleading what accurately a enemy did during a time they had entrance to a network. Another speculation is that it was pledge hackers messing around with no genuine devise and they happened to hurt a pump.

Won’t logs exhibit what they were adult to?

Probably not. Logs in SCADA networks keep lane of what physically happens to devices, though customarily not what goes on within a SCADA complement itself. There might be some forensics within a underlying handling systems — generally Unix and Windows — that will strew some light.

What do a authorities say?

The Department of Homeland Security says it and a FBI are entertainment contribution about a case. DHS says there’s no denote of risk to open reserve or vicious infrastructure.

Read some-more about far-reaching area network in Network World’s Wide Area Network section.

Article source:

Here’s Yet Another Headache for Cloud-Computing Providers: Liability

Monday, May 16th, 2011

Sony (SNE) announced that it would start to revive a PlayStation Network, following cyberattacks that compromised a personal information of 100 million user accounts. Now it turns out Sony has Amazon (AMZN) to appreciate for a attacks, during slightest indirectly. Someone set adult a fake-name comment with a company’s EC2 cloud service and used Amazon’s vast computing power to wreak havoc.

It’s easy to concentration on a impacts on Amazon’s business and on Sony. But let’s speak intensity guilt instead. When people and companies get hurt, they wish someone else to pay, and cloud vendors are frequently a ones wearing a targets. That could meant some vital business problems for cloud vendors — even those who don’t cruise themselves cloud vendors during a moment.

The cloud as liability

Not that lawsuits have started drifting utterly yet. But cloud vendors seem to be going out of their approach to attract them. Last month, for instance, Amazon’s cloud use had a vast use outage that temporarily crippled such high-profile Web 2.0 businesses as Foursquare, Reddit, and Quora. And this isn’t a one-time event. The same thing happened in 2007, when another Amazon EC2 outage henceforth mislaid some patron data.

Move over Amazon. Sony is clearly a cloud provider of party services and it didn’t have adequate network security, even after it knew of problems. Microsoft (MSFT) knew of problems with a paid Web-based email service and nonetheless waited to surprise business of problems. What happens if a PayPal (EBAY) or other online remuneration use incorrectly freezes someone’s comment or Skype disrupts an scarcely vast series of write conversations?

Exactly what is a clarification of a cloud vendor, anyway? More companies in many industries increasingly wish to store information for customers, offer services over a Internet, and differently commence work that fast looks like cloud services. Banks keep lists of vendors and scheduled payments for customers. Logistics companies offer sequence handling, scheduling, and conveyance for their business business by what we could call cloud services.

Eventually, a good many companies that don’t cruise of themselves as cloud computing providers turn accurately that — since they horde computing services that their business come to count on.

Forget a legalese

As cloud services develop into critical business tools, they’ll start to move on guilt concerns when things go awry. Companies mostly rest on stipulations on warranties to strengthen them when their possess gaffes stoke patron authorised wrath. Since during slightest Oct 2008, Amazon has had an EC2 SLA that promises “at slightest 99.95%” up-time for an whole use year.

That’s a flattering clever promise. If Amazon has a problem, a Amazon Web Services patron agreement contains some supplies directed during tying a company’s liability. But as DLA Piper partner Mark Radcliffe mentioned in a BNET talk in 2009, even after decades of existence, that kind of program chartering is distant from being staid law.

A justice competence confirm that a stipulations standard to finished program wouldn’t request when a program businessman hosted all a operations, since users would have no unsentimental approach of alone defence their data. In such a case, we could disagree that a miss of a arguable fill-in system, with copies of information sitting somewhere other than on a complement that has a problem, was negligent.

The cloud as weapon

Now cruise a flip side of intensity liability: When people use a cloud use to do something illegal. Someone used Amazon’s EC2 to launch a cyberattack on Sony. Could Sony sue? Well, it didn’t pointer a paper in allege that would let Amazon off a hook. Who would a Sony sue? Answer: The deepest pockets accessible — differently famous as Amazon.

Of course, Amazon has retribution diction in a AWS patron agreement. Fat lot of good that does. The strange cyberattacker (or attackers) used feign marker and is prolonged gone. Even if someone does brand a culprits, it seems flattering doubtful that he or she would have a resources to cover Amazon’s intensity losses.

In short, Amazon — or whoever a cloud businessman in doubt — is on a hook. Forget “safe harbor” supplies that strengthen companies from removing sued over a function of their customers. Such supplies cover online calm posted by users — not cases in that users abused a computing use to launch an bootleg cyberattack.

Although many executives are looking critically during cloud services and a technical issues (especially accessibility and security), a business issues are huge and need some-more than a arrogance that all will eventually work out. Because when they don’t, a guilt is already sitting there, waiting.


Image: Flickr user Tarter Time Photography, CC 2.0.

Article source:

Dropbox Accused of Lying About Security

Monday, May 16th, 2011

Also, before someone comes in blaming a whole cloud thing again, it’s not a error of “cloud”. It’s a error of a fibbing company.

Article source: