21. June 2011 12:33
The most important aspects of an effective disaster recovery is planning and training, which both need to be done far ahead of the event. The planning process is more important than the plan itself. Having a strong plan with policies and standard operating procedures will ensure your organization's survival.
Disaster recovery is a term often used in Information Technology (IT) circles to describe the necessity for backup technology systems to safeguard an organization's data.
While this type of safeguard is absolutely a necessity to protect valuable data, and also reduce the amount of time your organization will need to recover from an incident, a true disaster plan goes far beyond... [More]
21. June 2011 12:29
It's like exercising and eating better: You know you should do it, yet there's always something going on that prevents you from making it a priority. Data center automation has been on the minds of IT pros since the computer was invented, but as much as everyone knows it's needed, most of us never get around to implementing it.
What's remarkable is the degree to which we haven't implemented automation over the past two years, particularly given the deafening buzz about cloud this and cloud that. As we scrape off the marketing dross around cloud computing, what we're left with most of the time is outsourcing, and data center automation on top of virtualization.
However, we jus... [More]
20. June 2011 12:52
Grab Firefox 5 final ahead of schedule The official release date of Firefox 5 has been set to June 21, which is three days from today. If you do not want to wait until then to play around with the latest stable release of the popular web browser, you can go ahead and download the browser from the official Mozilla ftp site. Ghacks
IBM didn’t invent the personal computer but they don’t know that While we were away, IBM celebrated its 100th birthday by claiming, among other things, to have invented the personal computer, soiling the legacy of Ed Roberts and pissing-off all real geeks in the process. Here’s a video in which you’ll see IBM... [More]
20. June 2011 12:49
It's been a while since we've heard any major news about India's ambitious $35 tablet, but a new report suggests that it's finally inching toward reality. According to the Times of India, the controversial project is approaching the finish line with 100,000 units expected to ship this summer, starting this month. The government is expected to deliver 10,000 tablets to IIT Rajasthan in late June, while another 90,000 units will be rolled out over the next four months.
The launch price is reportedly set at 2,200 rupees, which is approximately equivalent to $49. Although that's higher than the initial $35 target, the government reportedly plans to cut the price in half with subsidies.... [More]
6. June 2011 16:49
The saying that "nothing is unbreakable" repeated for one more time as forensic experts from ElcomSoft managed to break the hardware encryption Apple introduced with the iOS 4. As a reminder, with Apple's iPhone 3GS the company introduced a hardware encryption chip. Following the release of iOS 4, Apple brought Data Protection feature, a 256-bit hardware encryption for all the devices featuring the chip. This is also one of reasons why millions of users complained their iPhone 3GS slowed down to a crawl following the iOS 4 update. However, that move put a blanket over every iOS 4 powered device and made iDevices as impenetrable to law enforcement agencies and Middle-Eastern governments su... [More]
6. June 2011 16:47
from the crypto-works dept:
Steganography is a form of security through obscurity in which information is hidden within an unusual medium. An artist might paint a coded message into a portrait, for instance, or an author embed words in the text. A traditional paper watermark is a well-known example of steganography in action. At first glance, there would appear to be nothing unusual about the work, but a recipient aware of the presence of the hidden message would be able to extract it easily. In the computer age, steganography has become more of a science than an art. Those intent on hiding information from prying eyes can embed data in the many different file types that are ostensi... [More]
6. June 2011 16:45
from the crypto-works dept:
The Wikileaks project is starting to bear fruit, with documents leaked to the site beginning to get a lot of attention. The latest example is correspondence between the German government and a vendor (via Slashdot) that apparently makes software for intercepting Skype calls. Interestingly, the interception technology appears to be pretty primitive and rather expensive. The software has to be installed on the Skype client, and the vendor suggests that this can be accomplished by attaching a trojan to an e-mail or physically entering the premises to install the software on the target machine. And, evidently, only Windows 2000 and XP are supported; Vista support is ... [More]
6. June 2011 16:43
In the field of computer technology, some topics are so frequently and fiercely disputed that they almost resemble religious feuds -- Mac vs. PC, for instance, or open source vs. proprietary software.
Other topics, though, don't see nearly the same level of high-profile debate. Take the invulnerability of the Advanced Encryption Standard (AES) encryption, for example. Governments and businesses place a great deal of faith in the belief that AES is so secure that its security key can never be broken. However, a team of researchers from Germany, France and Israel has recently demonstrated what may be an inherent flaw in AES -- theoretically, at least.
So how secure is AES really? Is AES now... [More]
6. June 2011 16:42
Faster, more secure logins for multimedia sites might be possible thanks to a new approach to website and database security. Boolean logins would allow thousands if not millions of users to more quickly access the content to which they are entitled, such as music, video and images. The same approach might also reduce the risk of hackers accessing the materials illicitly.
Classic user identification requires the remote user sending a username and a password to the system to which they want to be authenticated. The system looks up the username in its locally stored database and if the password submitted matches the stored password, then access is granted. This method for identificatio... [More]
6. June 2011 16:29
A new approach to hiding data within executable computer program files could make it almost impossible to detect hidden documents, according to a report in the International Journal of Internet Technology and Secured Transactions.
Steganography is a form of security through obscurity in which information is hidden within an unusual medium. An artist might paint a coded message into a portrait, for instance, or an author embed words in the text. A traditional paper watermark is a well-known example of steganography in action. At first glance, there would appear to be nothing unusual about the work, but a recipient aware of the presence of the hidden message would be able to extract it easi... [More]