#security Posty Społeczności UniMarter.com

Przeglądaj najnowsze posty oznaczone tagiem #security społeczności serwisu UniMarter.com
@unimarter UniMarter Blog@unimarter
ponad 2 tygodnie temu
***The
***The "Grey" Area Between Doctors & Fitness***

teksty doctor studies the human body from a medical point of view, but this does not automatically qualify him as an expert in exercise physiology, human biomechanics, sports nutrition and supplementation or any of the multitudes of complex training exercises. Unless he specialises, the standard medical curriculum simply does not cover these specialist areas.In fact, over the last few decades? doctors have made unbelievable mistakes regarding training and fitness. For instance, doctors were once officially quoted as saying that anabolic (muscle enhancing) steroids had?wait for it??no muscle building effects on the body whatsoever!? Further ? more, doctors per se, are not the ones leading the field or making all the constant new discoveries in the health and fitness world. Sports nutritionists, exercise physiologists and sportsmen in general tend to be responsible for all these considerable advances. On the other hand, fitness experts are most certainly not doctors and should never pretend to be! Nonetheless, there is no doubt whatsoever that the two fields of expertise overlap quite extensively.The human body does not change its properties simply because a doctor or trainer is studying it; after all, laws regarding muscle contraction or protein / carbohydrate synthesis are constant. The common ground therefore is the human body itself and all its immense complexities. However, where medicine and fitness start to separate is the precise way in which this extensive knowledge or the human body (anatomy, physiology, nutrition etc.) is applied or utilised.Let?s take the ?heart? as just one example, because it falls well within this grey area owing to its critical role in the body. Doctors deal with millions of heart problems every day: blood flow, valve inefficiency, disease, enlarged, to fast, to slow, neurological / hormonal / enzyme problems etc.; but fitness of course also involves the heart. In fact its general condition and ability to function properly under stress is absolutely crucial for sportsman. The heart itself is a muscle and needs to be trained just like any other muscle (although the cell types are different). teksty well-conditioned heart has numerous benefits for the body, some of which include:teksty] Better blood flow.teksty] More oxygen supplied to the working muscles, brain and internal organs.C] Better expulsion of toxic wastes.D] Lower pulse.teksty] Less workload under stressful conditions ( both physical & mental).Therefore, although doctors and fitness experts study the heart in their own particular specialists field, they can both learn and benefit from one another?s expertise. This interchangeability or 2-way referral system is based on common ground that exists between 2 distinct specialised fields of expertise. This common factor is the human body and everything pertaining to it. And it is exactly what constitutes this ?grey area! ?Hugh Levett-yeats
http: / / www.infitnessandwealth.comHugh Levett-yeats is the author of How to become a personal Fitness trainer and Achieve financial Independence. Hugh has been actively involved in the health and fitness business for over 30 years and is a world renowned fitness trainer.

#fitness #health #wealth #training #financial #independence #security #body #longevity #money #healthy #wealthy
MARKET
Niania elektroniczna BEURER BY33 AGD małe > DLA DZIECKA > Nianie elektroniczne
DZIECI I NIEMOWLĘTA//UNIMARTER

Niania elektroniczna BEURER BY33

Dzieci i niemowlęta > Bezpieczeństwo niemowląt > Nianie elektroniczne
Oczyszczacz BEURER LR 300 AGD małe > DO DOMU > Oczyszczacze powietrza
DOM I OGRÓD//UNIMARTER

Oczyszczacz BEURER LR 300

Dom i ogród > Sprzęt AGD > Ogrzewanie, wentylacja i klimatyzacja > Oczyszczacze powietrza
Urządzenie do aromaterapii BEURER LA 20 AGD małe > DO DOMU > Nawilżacze powietrza
DOM I OGRÓD//UNIMARTER

Urządzenie do aromaterapii BEURER LA 20

Dom i ogród > Sprzęt AGD > Urządzenia do kontroli klimatu > Nawilżacze
Aparat do masażu Beurer MG 70 Masażer AGD małe > ZDROWIE I URODA > Masażery i maty masujące
ZDROWIE I URODA//UNIMARTER

Aparat do masażu Beurer MG 70 Masażer

Zdrowie i uroda > Higiena osobista > Masaż i relaks > Masażery
Pulsometr BEURER PM 15 AGD małe > ZDROWIE I URODA > Ciśnieniomierze
ZDROWIE I URODA//UNIMARTER

Pulsometr BEURER PM 15

Zdrowie i uroda > Opieka zdrowotna > Monitory funkcji życiowych > Ciśnieniomierze
BEURER Jonowy włosów 2200 W HC 80 Małe AGD > Pielęgnacja osobista > Suszarki do włosów
//UNIMARTER

BEURER Jonowy włosów 2200 W HC 80

MARKET PRODUKTOWY...
@unimarter UniMarter Blog@unimarter
ponad 2 tygodnie temu
***Are You Dying To Get Out Of The Hospital*** Going to the unimarter UniMarter
***Are You Dying To Get Out Of The Hospital***

Going to the hospital can be a traumatic experience emotionally, financially, spiritually. How would you react if were told that you or a loved one had to go into the hospital? Now think, what you would do if you discovered that you had to go to a hospital in a large city miles away from home. Suddenly your life would be turned upside down. Who is going to take care of your family, business, home, pets? How are you going to pay for your trip, and where will you stay? See what I mean? Going to the hospital opens all kinds of doors with unanswered questions. From infections, to just getting to the hospital and back home are hurdles that need to be jumped and cleared if you want a successful hospital visit. One of the greatest weapons that you can arm yourself with to answer your questions and concerns is knowledge. Knowledge that will empower you to work with your health care provider to assure a positive hospital stay. Knowledge that will get you in and out of the hospital so that you can go on with your life. The following are tips that could make your hospital visit less stressful and safer for you and your family.Choose the hospital that you are going to based on medical references, state inspections and statistics. The Internet can provide a wealth of information that may help in your decision process. If you are going for Heart related issues, then see how many heart related procedures are performed daily at that particular facility.Discover how to protect yourself from hospital spread infections. You may not be aware of this danger, yet two million Americans will be affected this year alone. The sad fact is that 90,000 will die. Die from an infection that should have been prevented. Simple steps can save your life.Take the first step on the road to having some say so in your health care. Realise that dangers do exist and learn how to recognise them and how they can be avoided. Act now before you have to go to the hospital.For more information on how to prepare for and survive hospital visits go to http: / / www.goingtothehospital.comThanks, Wayne ClarkMy name is Wayne Clark and the information I provide is based on experience. Multiple hospital stays along with specific training has given me insight that I hope to share with you. Tips that can make your hospital visit safer and more successful. You will have enough stress as it is, so I hope to provide some relief that will reduce your concerns. Awareness is the key, Action is the force that will protect you and your family. Discover how to recognise danger signs, who to talk to for financial support, hospital security and other areas of concern that you may have not considered. At http: / / www.goingtothehospital.com many of your questions will be answered.

#hospital #infection #security #emergency #chronic #disease #life #death #staff #staph #nurse #doctor #surgery #iv
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***Protect Your Windows Network: From Perimeter to Data Book Revi unimarter UniMarter
***Protect Your Windows Network: From Perimeter to Data Book Review***

Protect Your Windows Network: From Perimeter to Data
by Jesper M. Johansson and Steve Riley
Addison-Wesley Microsoft Technology Series (2005)As the title should tell you, this is an unabashedly Windows-oriented book. It's no surprise, considering the authors are both employees of Microsoft. Jesper Johansson is the Senior Program Manager for Security Policy, and Steve Riley is the Senior Program Manager in the Security Business and Technology unit. Both authors are extremely knowledgeable, and participate in speaking engagements around the world on a regular basis.Microsoft-centric view aside, I deal primarily with Windows-based networks, so I found this book to be extremely informative in my security continuing education. The authors attempt to cover a great deal of ground, so by necessity, some areas are covered in more depth than others. The areas covered are divided into 6 parts: "Introduction and Fundamentals," "Policies, Procedures, and User Awareness," "Physical and Perimeter Security: The First Line of Defense," Protecting Your Network Inside the Perimeter," "Protecting Hosts," and "Protecting Applications."The book is filled with practical, common sense analysis of security, both with respect to genuinely securing systems, and avoiding practices of "Security Theater." Each chapter ends with a section entitled "What You Should Do Today," reinforcing the action items suggested throughout the chapter. The book also includes a CD containing a few helpful tools. These include a password generator, a HOSTS file that blocks known spyware sites, and a script to revoke SQL Server PUBLIC permissions.The writing style is at times humorous, and very down-to-earth. This book is valuable both as a casual read, and a comprehensive reference for securing networks. I highly recommend it to anyone in the Information Security field, as well as anyone looking for a place to start educating themselves about network security.John Biasi is an IT professional, and the creator of the Security Theater of the Absurd website ==>http: / / www.security-theater.blogspot.com

#informationsecurity #networksecurity #microsoft #securitytheater
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***Top Ten Online Shopping Security Tips*** Every year billi unimarter UniMarter
***Top Ten Online Shopping Security Tips***

Every year billions of dollars are spent by consumers on line; and as the trend is growing rapidly, shopping security is still the number one factor in which a person may choose not to buy from a website.This is particularly true if you are new to the internet or starting to buy on-line for the first time.Shopping security has always been a touchy subject and is so important that most reliable companies go to a great deal of trouble to protect their customers rights, privacy and security.So can people feel safe when shopping on-line?The answer to this is yes, if shoppers follow simple guidelines. If you are new to the Internet or a regular shopper online, the following guidelines should apply.1. Make sure you know the exchange rate; if you are not sure of the current rates, find out before you buy an item.2. Find out the cost of delivery before placing your order and how long the delivery will take. Most shopping sites use couriers to deliver the goods and when delivering overseas can become quite expensive.3. If you are bidding on E-bay check out the buyers and sellers feedback. This should become standard before you ever place a bid.4. Always read the FAQ section if you are new to the site.5. If someone demands cash for a payment, ?say no?. Use your credit card to make your payment; this will protect you against fraud. Credit card companies refund accounts where fraudulent activity transpires.6. Check the buyers contact page. Make sure their postal address is posted on it. If not, don?t deal with them.7. Don?t be afraid to ask the seller lots of questions, genuine sellers should be very helpful, some online shopping sites have forms where you can see customer feed back.8. Check, and read in full the terms and conditions, and the privacy policy of the site.9. If you are unsure about a site, try doing a search with Google or any of the other search engines. You may find comments posted about the shopping site from other customers.10. If you are still not sure after reading the above it may be time to go shopping elsewhere.These simple guidelines should also apply when bidding online.If you do make the occasional bid in one of the many online auction sites, the same safety guidelines should become standard. Part of the appeal of buying or bidding online is that you tap into the global markets at a click of your finger. Buying through auction sites on the web can be very exciting and for most people enjoyable, but remember they can also be very addictive.Most of the well-known auction sites are based in the United States; so overseas bidders should follow proper, but simple guidelines when placing their bids.We should not shy away from the worthwhile experience of online shopping. Shopping on-line can bring you great savings, and will also take away the burden of going shopping.TJ Tierney is an award winning Irish Landscape photographer and a freelance writer.
He frequently writes for the Art site Goldprints.com and the Gift ideas site shop-4us.comTo view or buy some of his images visit his on-line gallery of - Pictures of Ireland and flower pictures

#shopping #security #online #buying .shoppingtips #shop #
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***Shopping Online for Gifts: Electronics, Watches, Perfumes, Opt unimarter UniMarter
***Shopping Online for Gifts: Electronics, Watches, Perfumes, Optics, Photo and Video Components***

If you are looking for some great gifts for Father?s Day or even a birthday that is coming up, there are great things that you can consider buying. Gifts can be very difficult to buy, but if you think simple or shop the Internet you?ll find that Father?s Day or any birthday suddenly gets a lot simpler. When gifts are at your fingertips and can be purchased with the click of a mouse, it is a lock easier to get the job done! Electronics, perfumes, watches, and optics are all great gifts that will not only make a great gift but will also be extremely useful to the recipient.

Electronics are a great way to go for a holiday such as Father?s Day because what father doesn?t love things such as TVs, watches, headphones, and other fun electronics? If you know what your father has wanted or has been putting off buying for himself, this is the holiday to indulge him and buy one of those TVs that he has been looking at, or even buy something as simply as some new headphones, some type of security device, or even a watch. Electronics are a great idea for most men, whether the gift is for Father?s Day or a birthday.

Perfumes and watches are great gifts for mom or for women in your life as they can be just feminine enough but not too much so. If you know the favorite scent of a woman, perfume is almost always a welcome gift because many women put off buying new perfume because they consider it an indulgence. Even if there are not perfumes that the women in your life currently wear but you?ve heard them mention a scent that smells good to them, go for it and purchase perfume. Watches are good as well, because who doesn?t need a watch? Watches come in a wide variety and can be very feminine and not at all, so it doesn?t matter who the gift is for you can find a great watch that fits their personality.

If you are buying for a couple you can always consider gifts such as video and photo components, especially if they have kids or they are getting married. New couples and couples with kids always have a need to take pictures, so the video and photo angle is a good one. Also, you can buy cameras and such for relatively affordable prices, making them a great gift that is also very usable by the recipient. Electronics also make great gifts for couples, as long as you know what they want or have been looking for.

Buying gifts on the Internet, no matter whom they are for, can be fun and easy. If you aren?t sure what you want to buy, all you have to do is browse around for a few moments and you?ll typically see something that you know is just right for the people in your life. Shopping for electronics, watches, perfumes, optics, video, photo, and security items online may also help you save money on the gift. Shopping from the comfort of your home will also save you some stress because you don?t have to deal with pushy sales people, you don?t have to deal with the crowds, you can simply buy what you want to buy and be done with it.

Shopping for mothers, fathers, brothers, sisters, friends, or lovers can be a lot of fun and quite easy when you buy online. Everything from electronics to perfumes and watches can be purchased online, saving you time and money.

Chris Robertson is an author of Majon International, one of the worlds MOST popular internet marketing companies on the web.
Learn more about Choosing Gifts for Any Occasion or Majon's Gifts and Collectibles directory

#electronics #optics #headphones #security #photo #video #tvs #gifts #perfumes #watches
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***Mobile Devices Security*** As this security solution is n unimarter UniMarter
***Mobile Devices Security***

As this security solution is not such a great idea, other companies have researched, and finally found a new way to prevent cell phones and PDAs theft. This method permits to remotely disable up to four different tasks of a stolen cell phone or PDA, rendering it inoperable. But at the same time data contained in the device are locked. The beauty of this option is that the unit is not damaged in any way - full functionality and data can be easily restored if the device is recovered. Thus, the device is useless to the thief, but it can be reactivated and restored if it is recovered and returned to its rightful owner.Another new security breach has been encountered this year when reports were received about a backdoor Trojan horse program that can take control over a mobile device. This is the first known backdoor Trojan horse for PDAs. The subject program, identified as Backdoor.Brador.A, attacks PDAs running the Windows operating system. And like all backdoors, it cannot spread by itself. The Trojan arrives as an e-mail attachment or can be downloaded from the Internet. Also, it has a complete set of destructive functions characteristic for backdoors. After it is installed, this small program is activated when the PDA is restarted and begins to look for a remote administrator to take control of the device. Security specialists claim the virus was written by a Russian virus coder since it was attached to an e-mail with a Russian sender address and contained Russian text. Fortunately, the Trojan?s threat control and removal was rated as "easy".The important thing about this virus is not the number of devices affected, because this number is very small, but the fact that this is the first one that appeared on the "market" is considered to be very important. We have to admit that it is hardly surprising that viruses have found their way to mobile devices. This is the natural trend. Where technology goes, viruses will follow. As the new technology shifts into the mobile market, these threats will move in that direction also. The specialists from the Kaspersky Labs claim they were expecting a virus attack on a PDA, due to the latest attacks against other mobile devices. Now, the PDA users look at a real danger and it is a well known fact that interested intruders will grab the chance to attack PDAs and mobile phones in the near future. Virus threats development for mobile devices is passing through the same stages as the one for desktops.Almost at the same time with the appearance of the first Trojan for PDAs, the first virus to affect cell phones has also arrived. This worm is called ?Cabir?, and it has been spotted by some security specialists who issued an alert concerning the danger. Cabir spreads using a file named ?Caribe.sis? and travels across devices working with the Symbian operating system which is used in PDAs and many cell phones. Cabir places itself usually on a mobile device when a user agrees to a transmission showing the text message "Caribe". After that the worm begins a nonstop search particularly for Bluetooth-connected wireless devices to send itself to. Also, the battery?s life of the infected device is harshly reduced during this process. The inventors of Cabir did not design the worm to spread massively. It was intended to be a test demonstrating that these mobile devices can be easily infected by viruses because of their rapid maturation. The worm rated with a low risk because it has to be intentionally activated by a mobile phone user, and also allowing the Caribe package requires pressing a button prior the files can be loaded into the receiving phone.It was predictable that viruses and worms for cell phones and PDAs would appear. This is the end result of the impressive advances made in mobile communication technology in the past years. Over time, cell phones and PDAs turn out to be more PC-like, making them vulnerable to viruses. And because they are more PC-like, smart cell phones and PDAs are mostly used by companies for mission-critical applications and data storage. Also they are used for receiving emails and text messages just like desktop computers. That makes their users just as exposed to viruses and worms. These security concerns can be dealt with software-encryption solutions that need to be attached to the new devices. The encryption technology expands to mobile devices the identical type of security that many companies have organized into their desktop computers. It encrypts data and prevents illegal access to the data stored within the device, which is either lost or stolen.Mike Ber is the owner of the Canadian Domain Name Portal called http: / / www.Every.ca. He is also a contributing author to Canadian Computer Magazine and http: / / www.Developer.ca website.

#mobile #cellphone #mobilephone #security
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***Security of GSM System*** IntroductionEvery day millions unimarter UniMarter
***Security of GSM System***

IntroductionEvery day millions of people use cellular phones over radio links. With the increasing features, the mobile phone is gradually becoming a handheld computer. In the early 1980?s, when most of the mobile telephone system was analog, the inefficiency in managing the growing demands in a cost-effective manner led to the opening of the door for digital technology (Huynh & Nguyen, 2003). According to Margrave (n.d), ?With the older analog-based cellular telephone systems such as the Advanced Mobile Phone System (AMPS) and the Total Access Communication System (TACS)?, cellular fraud is extensive. It?s very simple for a radio hobbyist to tune in and hear cellular telephone conversations since without encryption, the voice and user data of the subscriber is sent to the network (Peng, 2000). Margrave (n.d) states that apart from this, cellular fraud can be committed by using complex equipment to receive the Electronic Serial Number so as to clone another mobile phone and place calls with that. To counteract the aforementioned cellular fraud and to make mobile phone traffic secure to a certain extent, GSM (Global System for Mobile communication or Group Special Mobile) is one of the many solutions now out there. According to GSM-tutorials, formed in 1982, GSM is a worldwide accepted standard for digital cellular communication. GSM operates in the 900MHz, 1800MHz, or 1900Mhz frequency bands by ?digitizing and compressing data and then sending it down a channel with two other streams of user data, each in its own time slot.? GSM provides a secure and confidential method of communication.Security provided by GSMThe limitation of security in cellular communication is a result of the fact that all cellular communication is sent over the air, which then gives rise to threats from eavesdroppers with suitable receivers. Keeping this in account, security controls were integrated into GSM to make the system as secure as public switched telephone networks. The security functions are:1. Anonymity: It implies that it is not simple and easy to track the user of the system. According to Srinivas (2001), when a new GSM subscriber switches on his / her phone for the first time, its International Mobile Subscriber Identity (IMSI), i.e. real identity is used and a Temporary Mobile Subscriber Identity (TMSI) is issued to the subscriber, which from that time forward is always used. Use of this TMSI, prevents the recognition of a GSM user by the potential eavesdropper.2. Authentication: It checks the identity of the holder of the smart card and then decides whether the mobile station is allowed on a particular network. The authentication by the network is done by a response and challenge method. A random 128-bit number (RAND) is generated by the network and sent to the mobile. The mobile uses this RAND as an input and through A3 algorithm using a secret key Ki (128 bits) assigned to that mobile, encrypts the RAND and sends the signed response (SRES-32 bits) back. Network performs the same SRES process and compares its value with the response it has received from the mobile so as to check whether the mobile really has the secret key (Margrave, n.d). Authentication becomes successful when the two values of SRES matches which enables the subscriber to join the network. Since every time a new random number is generated, eavesdroppers don?t get any relevant information by listening to the channel. (Srinivas, 2001)3. User Data and Signalling Protection: Srinivas (2001) states that to protect both user data and signalling, GSM uses a cipher key. After the authentication of the user, the A8 ciphering key generating algorithm (stored in the SIM card) is used. Taking the RAND and Ki as inputs, it results in the ciphering key Kc which is sent through. To encipher or decipher the data, this Kc (54 bits) is used with the A5 ciphering algorithm. This algorithm is contained within the hardware of the mobile phone so as to encrypt and decrypt the data while roaming.
Algorithms used to make mobile traffic secureAuthentication Algorithm A3: One way function, A3 is an operator-dependent stream cipher. To compute the output SRES by using A3 is easy but it is very difficult to discover the input (RAND and Ki) from the output. To cover the issue of international roaming, it was mandatory that each operator may choose to use A3 independently. The basis of GSM?s security is to keep Ki secret (Srinivas, 2001)Ciphering Algorithm A5: In recent times, many series of A5 exists but the most common ones are A5 / 0(unencrypted), A5 / 1 and A5 / 2. Because of the export regulations of encryption technologies there is the existence of a series of A5 algorithms (Brookson, 1994).A8 (Ciphering Key Generating Algorithm): Like A3, it is also operator-dependent. Most providers combine A3 and A8 algorithms into a single hash function known as COMP128. The COMP128 creates KC and SRES, in a single instance (Huynh & Nguyen, 2003).GSM security flawsSecurity by obscurity. According to (Li, Chen & Ma) some people asserts that since the GSM algorithms are not publicized so it is not a secure system. ?Most security analysts believe any system that is not subject to the scrutiny of the world?s best minds can?t be as secure.? For instance, A5 was never made public, only its description is divulged as part of the GSM specification.Another limitation of GSM is that although all communication between the Mobile station and the Base transceiver station are encrypted, in the fixed network all the communication and signalling is not protected as it is transmitted in plain text most of the time (Li, Chen & Ma).One more problem is that it is hard to upgrade the cryptographic mechanisms timely.Flaws are present within the GSM algorithms. According to Quirke (2004) ? A5 / 2 is a deliberately weakened version of A5 / 1, since A5 / 2 can be cracked on the order of about 216?.Security breachesTime to time, people have tried to decode GSM algorithms. For instance, according to Issac press release (1998) in April 1998, the SDA (Smartcard Developer Association) along with two U.C Berkeley researchers alleged that they have cracked the COMP128 algorithm, which is stored on the SIM. They claimed that within several hours they were able to deduce the Ki by sending immense numbers of challenges to the authorization module. They also said that out of 64 bits, Kc uses only 54 bits with zeros padding out the other 10, which makes the cipher key purposefully weaker. They felt government interference might be the reason behind this, as this would allow them to monitor conversations. However, they were unable to confirm their assertion since it is illegal to use equipment to carry out such an attack in the US. In reply to this assertion, the GSM alliance stated that since the GSM network allows only one call from any phone number at any one time it is of no relevant use even if a SIM could be cloned. GSM has the ability to detect and shut down duplicate SIM codes found on multiple phones (Business press release, 1998).According to Srinivas (2001), one of the other claims was made by the ISAAC security research group. They asserted that a fake base station could be built for around $10,000, which would allow a ?man-in-the-middle? attack. As a result of this, the real base station can get deluged which would compel a mobile station to connect to the fake station. Consequently, the base station could eavesdrop on the conversation by informing the phone to use A5 / 0, which is without encryption.One of the other possible scenarios is of insider attack. In the GSM system, communication is encrypted only between the Mobile station and the Base Transceiver station but within the provider?s network, all signals are transmitted in plain text, which could give a chance for a hacker to step inside (Li, Chen & Ma).Measures taken to tackle these flawsAccording to Quirke (2004), since the emergence of these, attacks, GSM have been revising its standard to add newer technologies to patch up the possible security holes, e.g. GSM1800, HSCSD, GPRS and EDGE. In the last year, two significant patches have been implemented. Firstly, patches for COMP 128-2 and COMP128-3 hash function have been developed to address the security hole with COMP 128 function. COMP128-3 fixes the issue where the remaining 10 bits of the Session Key (Kc) were replaced by zeroes. Secondly, it has been decided that a new A5 / 3 algorithm, which is created as part of the 3rd Generation Partnership Project (3GPP) will replace the old and weak A5 / 2. But this replacement would result in releasing new versions of the software and hardware in order to implement this new algorithm and it requires the co-operation of the hardware and software manufacturers.GSM is coming out of their ?security by obscurity? ideology, which is actually a flaw by making their 3GPP algorithms available to security researchers and scientists (Srinivas, 2001).ConclusionTo provide security for mobile phone traffic is one the goals described in GSM 02.09 specification, GSM has failed in achieving it in past (Quirke, 2004). Until a certain point GSM did provide strong subscriber authentication and over-the-air transmission encryption but different parts of an operator?s network became vulnerable to attacks (Li, Chen, Ma). The reason behind this was the secrecy of designing algorithms and use of weakened algorithms like A5 / 2 and COMP 128. One of other vulnerability is that of inside attack. In order to achieve its stated goals, GSM is revising its standards and it is bringing in new technologies so as to counteract these security holes. While no human-made technology is perfect, GSM is the most secure, globally accepted, wireless, public standard to date and it can be made more secure by taking appropriate security measures in certain areas.BibliographyBusiness Wire Press release (1998). GSM Alliance Clarifies False & Misleading Reports of Digital Phone Cloning. Retrieved October 26th, 2004 Web site: http: / / jya.com / gsm042098.txtBrookson (1994). Gsmdoc Retrieved October 24th, 2004 from gsm Web site:
http: / / www.brookson.com / gsm / gsmdoc.pdfChengyuan Peng (2000). GSM and GPRS security. Retrieved October 24th, 2004 from Telecommunications Software and Multimedia Laboratory Helsinki University of Technology Web site: http: / / www.tml.hut.fi / Opinnot / Tik-110.501 / 2000 / papers / peng.pdf
Epoker Retrieved October 27th, 2004 from Department of Mathematics
Boise State University, Mathematics 124,Fall 2004 Web site:http: / / math.boisestate.edu / ~marion / teaching / m124f04 / epoker.htm
Huynh & Nguyen (2003). Overview of GSM and GSM security. Retrieved October 25th, 2004 from Oregon State university, project Web site: http: / / islab.oregonstate.edu / koc / ece478 / project / 2003RP / huynh_nguyen_gsm.docLi, Chen & Ma (n.d). Security in gsm. Retrieved October 24th, 2004 from gsm-security
Web site: http: / / www.gsm-security.net / papers / securityingsm.pdfQuirke (2004). Security in the GSM system. Retrieved October 25th, 2004 from Security
Website:http: / / www.ausmobile.com / downloads / technical / Security in the GSM system 01052004.pdfMargrave (n.d). GSM system and Encryption. Retrieved October 25th, 2004 from gsm-secur Web site: http: / / www.hackcanada.com / blackcrawl / cell / gsm / gsm-secur / gsm-secur.htmlPress release (1998). Smartcard Developer Association Clones Digital GSM
1998). Retrieved October 26th, 2004 from is sac Web site: http: / / www.isaac.cs.berkeley.edu / isaac / gsm.htmlSrinivas (2001). The GSM Standard (An overview of its security) Retrieved October 25th, 2004 from papers Web site:http: / / www.sans.org / rr / papers / index.php?id=317Stallings (2003). Cryptography and Network Security: Principles and practices. USA: Prentice Hall.By Priyanka Agarwal
http: / / M6.net
The author is a novice who is trying to create her niche on network of networks.

#GSM #mobiletraffic #communication #encryption #decryption #wireless #security
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***Security Checklist For Voip Service Providers*** It is of unimarter UniMarter
***Security Checklist For Voip Service Providers***

It is often said that understanding the problem is 90% of the solution, and VoIP security is no exception. It is fear of the unknown which is likely to elicit a knee-jerk reaction of panic, so the first step is to understand the threats and then classify them. We also have to ask the question: what does security mean to me and what does it mean to my customers?Security to the customer means protecting their device and identity and the continuity of their service. Security to the service provider means protecting their network their revenue and their customers. In this feature we will look at service disruption and service theft.DisruptionA service can be disrupted by breaking the user's device, flooding the IP network with traffic or breaking the service provider's infrastructure. Disruption is usually achieved through either Logic Attacks or Flood Attacks or Application Layer Attacks.? Logic attacks exploit vulnerabilities in protocols or their implementations, e.g. Ping of death, Teardrop, Land etc.? Flood attacks disable targets through traffic volume; a flood attack can originate from a single platform or from multiple platforms.? Application Layer Attacks include: SIP-SPAM, and identity forging.We can also divide the attacks into IP layer and SIP layer thus:IP Logic Attack / IP Flood Attack
SIP Logic Attack / SIP Flood Attack
Application Layer attackIP Logic AttacksIP Logic attacks on SIP devices are no different to any other IP device; these include well known exploits such as: Ping of death, Teardrop, Land, Chargen and Out of sequence packets. All of these can disable a device which has not been fully tested to protect itself against these exploits.IP Flood AttacksIP Flood attacks include: SYN flood attack (TCP SYN Floods are one of the oldest DoS attacks in existence), Smurf Attack, Fraggle attack and the list goes on... These attacks are designed either to overcome the device by tying up resources or to simply overwhelm the network through shear weight of traffic.SIP Logic AttacksSIP logic attacks exploit weaknesses in SIP signalling implementations. Incomplete or incorrect fields, invalid message types can disable not only client devices but also core network devices. This type of attack can be countered by thorough testing of any devices against suites such at the IETF SIP Torture test developed through the SIPiT Events or the PROTOS Test-Suite, developed by the University of Oulu.A more sophisticated attack can be to inject messages into a call to terminate it prematurely. This type of attack can be largely avoided by the use of strong authentication techniques, thus, the injected packet would not be authenticated and therefore would be rejected.SIP Flood AttacksSIP flood attacks exploit weaknesses higher up the communications stack that require more processing resources. As a consequence, it takes a much smaller flood to cause disruption. For example, one or more devices may send multiple registrations or call requests to a server.Countering this type of disruption requires network based devices like Session Border Controllers (SBCs) to police the signalling stream and rate limit registrations and calls to Softswitches to predetermined limits. Acting as a proxy in the signalling stream the SBC can also filter inappropriate protocols, IP DoS attacks and invalid SIP messages. This helps compartmentalise the network and restricts any disruption to just one network segment.Protect the User DeviceThese devices will typically be incapable of rate limiting and may be overrun by flood attacks. This means they are subject to both logic and flood attacks. Again the user device will benefit from the protection afforded by network based SBCs blocking DoS attacks and invalid SIP messages.Service TheftA simple example of service theft is to signal that a voice call it being made but exchange video data. This hits the service provider on two fronts: a) loss of revenue by billing for only a voice call and b) potential degradation in service quality for other users resulting in dissatisfaction.The structure of a VoIP call with separate media and signalling streams has lead to some innovative ploys. For example, a rogue PC client which transports media in the RTCP quality monitoring stream, this is not policed in most networks. Another ploy is to transport media in the call signalling then failing the call before billing commences. Not only does this mean a free call but repeated call set can cause huge signalling rates which are a DoS attack in themselves.The solution is to police all components of the call. SBCs police the signalling and the media to ensure that the call is executed as requested and that RTCP traffic is within expected bounds.ConclusionSecurity is a vast subject and needs to be ubiquitous in its implementation. Take care of the fundamentals first:Test, authenticate, protect, block, limit and police.? Test network elements against standard IP and SIP test suites to ensure they can survive IP and SIP logic attacks? Implement strong authentication, identifying your users protects their identity, protect their service and combats disruption.? Protect the Network by compartmentalizing it to restrict the range of any disruption.? Block malicious or inappropriate traffic ? do not propagate the problem.? Limit the rate of traffic to core elements to ensure the survivability of the service.? Police all aspects of the traffic flowing across the network to prevent fraudulent or inappropriate use.A secure and dependable service brings with it benefits to users and provider alike. It will build user confidence which in turn creates dependable revenue for the service provider and by addressing the basics from day one, need not be complex or expensive.For more information on a range of VoIP topics: multimedia networks, security and IMS there is a number of free White Papers available from Newport Networks.Dave Gladwin works for Newport Networks and has worked in the telecoms sector for 25 years and VoIP for the last 10 years.

#sessionbordercontroller #voip #security
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***What Is VoIP Security?*** Security is an obvious concern unimarter UniMarter
***What Is VoIP Security?***

Security is an obvious concern when it comes to any sort of technology, but even more so with any technology that is run through the Internet. Because VoIP runs through the Internet any information can be intercepted by anyone at any time. Because many things go through phone line, private information can wind up in the hands of the wrong person. Obviously, nothing is a one hundred percent guarantee because as fast as technology is made to keep information from getting in the wrong hands, the wrong hands are working to figure out how to break through those systems. Luckily, VoIP security is becoming more and more well rounded all the time and soon it?ll be so well done that even the best of the best won?t be back to get their hands on personal information.One of the ways that most VoIP providers secure their customers personal information is through the tunneling and encryption process. These techniques keep hackers and those will ill intent from capturing information packets as they pass through the internet. Most VoIP providers use Layer 2 tunneling and an encryption method called Secure Sockets Layer or SSL to keep anyone from getting into the information they shouldn?t have. The security of VoIP will undoubtedly change and become more sophisticated as technology allows and consumers demand more security and more privacy. For some time to come VoIP security will remain a huge concern, just because it?s widely known that all information that passes over the internet could potentially fall into the hands of someone with ill intent.Don?t let VoIP security issues keep you from getting VoIP services. The benefits of VoIP far outweigh the security risks. The bottom line is that you are more at risk every time you get online sending emails and paying bills than you will be every time you use your VoIP services. So, the features and convenience are well worth the small security risk associated with the internet access associated with it!Laura Rupert is a freelance writer who contributes to The Tech FAQ

#voip #security #voipsecurity
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***What is VOIP Also Known As Voice Over Internet Protocol*** unimarter UniMarter
***What is VOIP Also Known As Voice Over Internet Protocol***

I hear allot about VOIP what is it?VOIP stands for voice over internet protocol. Basically it means making phones calls over your local area network (LAN) or even across the Internet.VOIP is normally cheaper than your PSTN that?s public switched telephone network i.e. your local carrier.VOIP is a good choice for businesses as well to save money on long distance calls if they have many satellite offices. VOIP service providers usually have lower fees because they are not a government regulated currently as the phone systems which at one time were a monopoly. VOIP can even be free if you connect directly to another VOIP client.VOIP routers can send your incoming phone calls to you anywhere thus cutting down on the number of lines and you can be reached anywhere you have a Internet connection.This and the combination of technologies like WiFi are going to make for one huge network. That voice, data and video will be sent everywhere and from anywhere. With this VOIP technology you have allot more features as well such as Caller ID, Call Forwarding and answering services all from your computer or PDA.There are some issues to still be worked on.Here are some:The amount of band with required.Security issues- what type of encryption should be used and how much is going to slow down the call and network?This is a exciting and new technology which I will be writing more about.Benjamin Hargis
Phuture Networks
http: / / www.phuturenetworks.com
http: / / www.computersecurityadvice.com

#VOIP #SIP #Voice #security #technology
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***Security, Stability, and Interoperability Issues on VoIP Imple unimarter UniMarter
***Security, Stability, and Interoperability Issues on VoIP Implementation***

Now we have accepted that VoIP is no longer just a phone service, it has become feature rich as it merges with computer configurations. The VoIP's existence has changed considerably over the last few years, coupled with the availability of broadband connection to the Internet, plus leaps in multimedia technology in which virtual operations with remote sites becomes more enhanced, makes VoIP service a viable alternative to traditional communication offerings.Cost savings is not the only driving force for VoIP implementations, enterprises have to consider some business aspects that VoIP can bring about. VoIP creates potentials for applications that could not have been done before. Collaboration, integration, and interactivity between employees and applications are one of the several business benefits that enterprises can derive from VoIP adoption. Nevertheless, amid euphoria of VoIP technology, there are three important aspects to look at before a company goes VoIP. In the following paragraphs I will summarize the aspect of security, stability, and interoperability that play a key role in the successful implementation of VoIP.1. SecurityVoIP implementations may expose new security risks and challenges that somehow become greater concern than quality and cost-efficiency among vendors and users. VoIP networks are vulnerable to all the same security risks as traditional IP data networks, including:
Denial of Service (DoS), viruses, worms, Toll fraud and unauthorized access, Spoofing, and port scanning.
It is recommended that organizations should adopt a layered, defense-in-depth security strategy to address the issue with the increasing proliferation of new Internet-borne attacks and malicious activities in recent years. In this architecture, the network is segmented into secure zones protected by layers of firewall, intrusion prevention, and other security services. This strategy allows the organizations to logically split and secure voice and data networks in front of individual voice and data components and between interactive points in the network.2. StabilityOne of the main issues of VoIP is the amount of bandwidth required for each call. There must be adequate bandwidth reserved and the quality of the link must be well maintained throughout each call to ensure the users are not affected. As the very nature of VoIP call is real-time, any disruption during the call would be easily noticeable and unacceptable. The two issues that enterprises usually have to deal with here are bandwidth and quality of service (QoS).VoIP calls need a data transmission speed of 64kb / s to produce the quality of voice comparable to that of a normal telephone call. That 64kb / s channel needs to remain open and unaffected for the duration of the call. Theoretically, VoIP installations would not allow such a huge bandwidth to be allocated for VoIP alone. Therefore, there needs to be a compression taking place to compact the voice data into a considerable size before it gets transmitted over a packet switching network. G.723 codec that is incorporated in VoIP standard protocol H.232 can take a 64kb / s stream of data and squash it down to a mere 5.5kb / s or so. Generally, for VoIP to work reliably over WAN links, there has to be low jitter, low packet loss, a considerably high-speed connection between the endpoints, and less than 200ms delay.3. InteroperabilityCompatibility between VoIP equipment from different vendors is a very important aspect to boost the use of VoIP products. Without standardized quality of service mechanisms businesses would need to buy all the equipment and the QoS server from the same manufacturer. The VoIP world seems to be divided between many vendors with reluctance to establish interoperability and some who are trying to be end-to-end supplier but at the same time worried about interoperability. The protocols used in VoIP communication are still considered fairly complex in comparison to most of the other protocols involved in Internet applications. SIP (Session Initiation Protocol - a signaling protocol for Internet conferencing, telephony, events notification, and instant messaging), that is regarded as simple and elegant the other protocols, is still not efficient.On the bright side, however, SIP is approaching status as an IETF (Internet Engineering Task Force) standard, after several years of work. With the recent version, it has achieved a greater amount of stability and changes are becoming smaller and smaller. Phone switch companies such as Nortel have recently begun supporting SIP, and now the manufacturers of handsets and related devices will soon ramp up their support. Motorola, Avaya, and Proxim have made collaboration on the creation and deployment of IP telephony solutions that will deliver new extents of communication mobility and network connectivity.Finally, with these three VoIP aspects covered, businesses will be able to maximize their investment by applying it as the backbone of internal communication such as phone conversation, videoconferencing, instant messaging, faxing, etc. Another area that will widely make use of VoIP is call centers, in which Web contacts, virtual operations with outsourcers overseas, and remote sites, such as home agents, all could improve the customer experience. New VoIP applications that we have not thought about may also come into existence as the services generates more business and profits for companies.Al Falaq Arsendatama is web entrepreneur specializing in technology and finance. Please visit Direct TV vs Dish Network Comparison for free guide on selecting a satellite TV network.

#voip #voiceoverip #security #stability #interoperability
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***Cisco CCNP / BSCI Exam Tutorial: Using Distribute Lists*** unimarter UniMarter
***Cisco CCNP / BSCI Exam Tutorial: Using Distribute Lists***

To be successful on the BSCI exam and in earning your CCNP, you've got to master route redistribution. This isn't as easy as it sounds, because configuring route redistribution is only half the battle. Whether it's on an exam or in a real-world production network, you've got to identify possible points of trouble before you configure route redistribution - and you need to be able to control redistribution as well. You may have an OSPF domain with 100 routes, but only need to redistribute 10 of them into a neighboring RIPv2 domain. You've got to know how to do that, and one method is the use of a distribute-list.A distribute-list is an access-list that is used to determine what routes can and cannot be redistributed. Distribute-lists let you specify what routes will be filtered from the process. You can use standard or extended ACLs, and you can filter routes that are coming into a routing process or being injected into another process.In the following example, R1 is redistributing RIP routes into OSPF, but only wants to advertise network 150.1.1.0 / 24 to other OSPF routers. An ACL will be written to match that particular network, and then the distribute-list will be written under the routing process. I'm going to show you the IOS Help output for the distribute-list command, and please note that routing updates can be controlled at the interface level or protocol level.R1(config)#access-list 24 permit 150.1.1.0 0.0.0.255R1(config)#router ospf 1R1(config-router)#redistribute rip subnetsR1(config-router)#distribute-list 24 ?in Filter incoming routing updatesout Filter outgoing routing updatesR1(config-router)#distribute-list 11 out ?Async Async interfaceBRI ISDN Basic Rate InterfaceBVI Bridge-Group Virtual InterfaceCTunnel CTunnel interfaceDialer Dialer interfaceEthernet IEEE 802.3Lex Lex interfaceLoopback Loopback interfaceMultilink Multilink-group interfaceNull Null interfaceSerial SerialTunnel Tunnel interfaceVif PGM Multicast Host interfaceVirtual-Template Virtual Template interfaceVirtual-TokenRing Virtual TokenRingbgp Border Gateway Protocol (BGP)connected Connectedegp Exterior Gateway Protocol (EGP)eigrp Enhanced Interior Gateway Routing Protocol (EIGRP)igrp Interior Gateway Routing Protocol (IGRP)ospf Open Shortest Path First (OSPF)rip Routing Information Protocol (RIP)static Static routesR1(config-router)#distribute-list 11 out ripUsing distribute-lists does guard against routing loops, but they have other purposes. You may have a network segment that should be kept secret from the rest of your company; a distribute-list can filter that segment's network number from the redistribution process. In this way, distribute-lists serve as a basic form of network security. (Very basic. I wouldn't sell that firewall on ebay if I were you.)Keeping such networks out of routing updates and routing tables throughout the network has the side effect of reducing routing update overhead as well.Chris Bryant, CCIE #12933 , is the owner of The Bryant Advantage, home of free CCNP and CCNA tutorials, The Ultimate CCNA Study Package, and Ultimate CCNP Study Packages.You can also join his RSS feed and visit his blog, which is updated several times daily with new Cisco certification articles, free tutorials, and daily CCNA / CCNP exam questions! Details are on the website.For a FREE copy of his latest e-books, "How To Pass The CCNA" and "How To Pass The CCNP", just visit the website! You can also get FREE CCNA and CCNP exam questions every day! Pass the CCNP exam with The Bryant Advantage!

#cisco #ccnp #bsci #exam #tutorial #free #distribute #list #route #redistribution #security #12933
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***Important - Severe Windows Security Flaw: What You Can Do Righ unimarter UniMarter
***Important - Severe Windows Security Flaw: What You Can Do Right Now To Secure Your Data***

On 28 of December a severe Windows security flaw, WMF Flaw, was detected, in all Windows versions from Win98 to WinXP, no fixing patch exists yet. Using it, anyone can do any malicious action with your computer, steal or even erase your data.This article will help you understand what it is and how YOU can fix it until Microsoft releases a patch.By Washington Post: "Computers can be infected simply by visiting one of the Web sites or viewing an infected image in an e-mail through the preview pane [...] even if users did not click on anything or open any files.""Microsoft said in a statement yesterday that it is investigating the vulnerability and plans to issue a software patch to fix the problem. The company could not say how soon that patch would be available." http: / / www.washingtonpost.com / wp-dyn / content / article / 2005 / 12 / 29 / AR2005122901456.htmlHow severe it is: "This vulnerability can be used to install any type of malicious code, not just Trojans and spyware, but also worms, bots or viruses that can cause irreparable damage to computers," said Luis Corrons of Panda Software.In a security advisory posted on its Web site, Microsoft confirmed the vulnerability and the associated release of exploit code that could compromise PCs, and listed the operating systems at risk. Windows 2000 SP4, Windows XP, Windows Server 2000, Windows 98, and Windows Millennium can be attacked using the newly-discovered vulnerability...http: / / www.microsoft.com / technet / security / advisory / 912840.mspxBlogAutoPublisher support expert comments on the situation, advising a cure:"The vulnerability is in the Microsoft Windows Graphics Rendering Engine, that is why the exploit affects Windows versions from Win98 to WinXP.Unlike other security vulnerabilities, this one allows a _data file_ to execute arbitrary code upon it being viewed. In other words, a (picture) data file can contain executable code to "help" Windows display it, and Windows will execute it unquestionably.Your computer can be infected whenever Windows uses its default image viewer to display certain image types. This means there is a long list of applications that are vulnerable that rely upon the image viewer code. Windows uses this code when previewing images, for example.*What YOU can do right NOW*, to secure your computer until a patch from Microsoft is released:Go to Start > Run, paste there the following line: regsvr32 / u shimgvw.dll and press OK.If everything goes right, you'll see the following message: "DllUnregisterServer in shimgvw.dll succeeded."It will disable the problematic dll, forcing all other programs to use their own engines, if exist. Keep in mind that this will disable thumbnail previews in Windows Explorer. One may experience problems with opening any image file after unregistering this dll.(To reactivate this feature: Start > Run > regsvr32 shimgvw.dll)We will send another update, when the patch from Microsoft is released, with instructions how to apply the patch and re-activate the feature."And another important thing: since this is such a serious flaw, you may start getting phishing emails pretending to originate at Microsoft, urging you to do something with your computer, apply some "patches". Don't do it.Find the true information at microsoft.com or wait for the links at microsoft.com we'll publish later.Copyright 2006 Olga Farber BeckerOlga's areas of research are internet marketing, blogs, RSS feeds. Find out 55 ways to use the Marketer's Blogging Software Olga recently released: http: / / blogautopublisher.com

#windows #security #secureyourdata #howtosecureyourcomputer
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***Very Important: Update on Severe Windows Security Flaw - What unimarter UniMarter
***Very Important: Update on Severe Windows Security Flaw - What To Do Right Now To Secure Your Data***

Earlier we warned you about a serious security flaw, so-called "WMF flow." Several days later nearly one hundred different instances of exploitation of this newly discovered vulnerability had been found."Desktop users that suffered the effects of the IMF exploit describe it as a devastating experience to find their desktop computers completely taken over by an attacker.?When it hit, the screen suddenly said, ?Congratulations, you?re infected!?? said Brad Dinerman, vice president of information technology at MIS Alliance, a professional services outsourcing firm in Newton, Mass. It was clear that the computer running XP was no longer in his control.?It had root access, it wouldn?t let me log off or do anything,? Dinerman said. He said he ended up having to re-build the machine from scratch. He noted that his machine had been up-to-date in terms of software patches, anti-virus and anti-spyware software. ""...exploit has so many variants that anti-virus firms are having a difficult time keeping up with the exploit?s changes in attack code."http: / / www.networkingsmallbusiness.com / news / 2006 / 010306-sans-microsoft-patch.html"It enables clueless newcomers to easily craft highly variable and hard-to-detect variations of image files. Images that take over computers when viewed. And do this on all common Windows platforms. Meaning that there are hundreds of millions of vulnerable computers in the net right now."http: / / www.f-secure.com / weblog / archives / archive-012006.htmlCurrent news on the situation, by BlogAutoPublisher support expert:1. An official WMF Vulnerability update from Microsoft is now available. See more info and patches for various flavors of Windows at:http: / / www.microsoft.com / technet / security / Bulletin / MS06-001.mspxOr just go to http: / / update.microsoft.com / to pick up the right update automatically.The patch requires that the PC be rebooted.2. Microsoft is not fixing Windows 98 / ME.Microsoft has now "reclassified" the WMF vulnerability in Windows 95, 98, and ME as non-critical (instead of just fixing it!). This means that it will probably NOT be updated and patched to eliminate the WMF handling vulnerability that those older versions of Windows apparently still have. "Per the support life cycle of these versions, only vulnerabilities of critical severity would receive security updates," the company said.We urge you to upgrade, if possible, to WinXP which is much more secure and stable Windows version.3. After applying the Microsoft's patch, go to Start > Run, paste there the following line:regsvr32 shimgvw.dlland press OK. You should see the following message: "DllRegisterServer in shimgvw.dll succeeded."All your Windows "picture viewing" capabilities are back to normal now.Wishing you productive and secure 2006, BlogAutoPublisher Team.Copyright 2006 Olga Farber BeckerOlga specializes in internet marketing, blogs, RSS feeds. Find out 55 ways to use the Marketer's Blogging Software Olga and her partner recently released: http: / / blogautopublisher.com.

#windows #security #secureyourdata #howtosecureyourcomputer
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***Opening the Door on Hardware Purchasing*** Nowadays we so unimarter UniMarter
***Opening the Door on Hardware Purchasing***

Nowadays we sometimes hear people saying that they need to change door hardware. What does that really mean and why should you do this? Door hardware refers to any part (hardware) that can be added, change, modified in order to obtain some benefits. Any door (when purchased) comes with a special set of door hardware. It should be used to mount the door and is not necessarily esthetic. Because of this more and more people are turning towards different parts to modify or add to their door.Most people will decorate and use door hardware for the main door of the house. Why do that? There are two big answers to the question. The first one refers to security. You might want to add door hardware in order to make your lock better and your door harder to break. The second one is purely aimed towards design. Some small door hardware parts can do wonders and can create a special appearance. It is not uncommon to add to the door. What is different is taking from it. Some people like the door to look as old as possible. This means that either the individual does not care or he / she just likes simple doors, without add-ons.If you want to modify a door using door hardware there are some steps that need to be taken. First of all you will have to see what type of door you have. This is because not all models are the same. For instance, sliding door hardware is 100% different than pocket door hardware. Start measuring the door! You will need to write down how tall the door is and what type it is (normal, sliding etc.), the measurement of the knob and how wide it is. Armed with these details you will be able to purchase the perfect door hardware.Some accessories might, at any time, turn into really good offers. What needs to be understood from the previous statement is that sales are always available. Be on the look out and spot your favorite door hardware. When it goes on sale you can purchase it and you will have saved money. Door hardware is very common and the ease of installation makes it possible for some people to do the jobs of professionals. On the other hand, if you do not know what you are doing, you might just end up breaking the door instead of making it more appealing or simply better.Door hardware is very common. It is currently sold on thousands of web sites and specialized stores across the USA and Europe. Purchasing something to make your house entrance look better is always a good investment (unless the price was not right or quality has flaws). Stay informed and be on the look out for the best and most beautiful parts out there. Do not say ?Great, they have it, I?ll take it tomorrow?. Tomorrow you might need to do something else so this is a total waste of time and money.Karen Hughes is an interior decor consultant, get further hardware ideas at Cabinet and Door Hardware
this is your first stop for door and cabinet hardware help.

#doorhardware #door #lock #security
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***Lock Workstation Fast*** When you work in an office, it's unimarter UniMarter
***Lock Workstation Fast***

When you work in an office, it's important to lock your workstation every time you step away from your computer. A pain, but a security measure. You wouldn't want someone sending a nasty-gram in your email address, would you? Here's a faster way to lock a workstation without going through the CTRL+ALT+DEL route.On the desktop (Window+M), right-click an empty area and select New > Shortcut.Copy and paste the following into the location box:rundll32.exe user32.dll,LockWorkStationName the shortcut "Lock workstation" or whatever you prefer and click Finish. Click on it and the PC stands guard until you return and enter the correct password.FYI: rundll32.exe is already in the path.A reader wrote in, "Firstly, I'm not totally sure how creating an icon is any easier than the ALT+CTRL+DEL option. Pressing those keys then hitting space I would say is more often then not going to be quicker than finding your desktop and clicking on an icon. However, if you are looking for a quicker way to lock your computer. Perhaps you should try Windows + L."I responded saying the ALT+CTRL+DEL option requires selecting Lock Workstation. Since we have to lock our workstation so often, I find clicking an icon faster. However, the Windows+L will work for keyboard fans. However, I checked Windows+L and it didn't work on my work computer.Meryl K. Evans is the Content Maven behind meryl's notes, eNewsletter Journal, and The Remediator Security Digest. She is also a PC Today columnist and a tour guide at InformIT. She is geared to tackle your editing, writing, content, and process needs. The native Texan resides in Plano, Texas, a heartbeat north of Dallas, and doesn't wear a 10-gallon hat or cowboy boots.

#computer #lockworkstation #protect #password #security #pc
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***Bluetooth Can Be Cracked!*** Nothing is completely safe t unimarter UniMarter
***Bluetooth Can Be Cracked!***

Nothing is completely safe today. Adobe has recently released a patch for a security hole in different graphical software, so why should Bluetooth be safe?... and Bluetooth isn't safe off course! ;)Two researchers of the Tel Aviv University School of Electrical Engineering Systems say they have discovered a technique for taking control of Bluetooth-enabled mobile phones. After you've established a connection with an other cell phone, the attacker can easily make calls with your phone. If there is a Bluetooth connection with a PC, the hacker can even transfer data between his Bluetooth device / cell phone and the hacked computer. Bluetooth can be very dangerous as you can see! Even when the handsets have security features switched on, your cell phone isn't save at all!Avishai Wool, senior lecturer and Yaniv Shaked, graduate student and both researchers of the Tel Aviv University School of Electrical Engineering Systems have published recently a paper about three methods for forcing a repeat of the pairing process, "Cracking the Bluetooth PIN" ( http: / / www.eng.tau.ac.il / ~yash / shaked-wool-mobisys05 / ).
In this paper, a passive attack is described, in which an attacker can find the PIN used during the pairing process.
The eye-opening conclusion of these two researchers: "Our results show that using algebraic optimizations, the most common Bluetooth PIN can be cracked within less than 0.06-0.3 seconds. If two Bluetooth devices perform pairing in a hostile area, they are vulnerable to this attack."A Belgian Master student is making a fresh attempt to keep a list with Bluetooth security links on http: / / student.vub.ac.be / ~sijansse / 2e%20lic / BT / welcome.html.Ollie Whitehousen security researcher of @stake, a digital security consulting firm ( http: / / www.atstake.com ) has written in October 2003 a paper that "examines methods of assessing the security of Bluetooth devices in relation to the protocol's design and implementation flaws" ( http: / / www.atstake.com / research / reports / acrobat / atstake_war_nibbling.pdf ).In general, the most critical point is the 'pairing' - connection procedure of two Bluetooth devices. When a Bluetooth device asks you to re-enter the PIN number for re-pairing, once the two devices are re-connected, the hacker can now easily crack the PIN code.Links:- http: / / www.atstake.com / research / reports / acrobat / atstake_war_nibbling.pdf- http: / / student.vub.ac.be / ~sijansse / 2e%20lic / BT / - http: / / www.eng.tau.ac.il / ~yash / shaked-wool-mobisys05 / For feedback on this article, please visit http: / / wallies.info / blog / item / 145 / index.htmlWalter V. is a self-employed internet entrepreneur and founder-webmaster of several websites, including
wallies.info :: A snappy blog about snappy blue things :: blog | wiki | forum | links - http: / / wallies.info
mblo.gs :: A snappy moblog community - http: / / mblo.gs

#bluetooth #crack #pin #pairing #safety #security #hack #code #wallies .info
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***How To Backup Your Hard Drive*** We all know that we shou unimarter UniMarter
***How To Backup Your Hard Drive***

We all know that we should back up our system as soon as possible. But if you're like most of us, you will get to it tomorrow. The problem is that tomorrow rarely ever comes until you experience a serious computer failure and then it?s too late.Taking the time to backup your data or entire hard drive is not as painstaking as it may seem. And the rewards of doing so will be great should your system experience a crash.WINDOWS AND OTHER BACKUP SOFTWAREIf you have Windows XP you will need to install the new Windows backup utility from the Windows XP cdrom. Just place the WinXP cdrom in your cdrom drive and locate the line D:VALEADDMSFTNTBACKUP.Here you see the first letter as D but if your optical drive has a different drive letter, exchange the D with your drive's letter. To install the utility, click on the file named NTBackup.msi.The backup utility will be installed to the system tools group. Click Start, All Programs, Accessories, System Tools, and Backup. There is a neat wizard that will walk you through the backup process.WinXP's backup utility will backup your entire hard drive and will make a recovery disk to boot.One neat third party backup software you can try is NewTech InfoSystems at http: / / www.ntius.com where you can download their trial version and put it to use for 30 days. And if it?s your cup of tea, the full version will run you about $79.95INCREMENTAL OR DIFFERENTIAL BACKUPSYou should back up your entire hard drive when you perform your first backup. After that it is best to perform an Incremental backup. This type of backup only allows you to backup files that have changed since your last performed backup.Differential Backups copy changed files that have been added since you last did your entire backup. This type of backup is more detailed than incremental backups and is easier to restore.BACKUP STORAGE DEVICESYou can backup your files on cdroms and have the files compressed to save both space and backup time. WinXP will compress folders, subfolders, and files during backup.You can purchase compression software that will do the same, saving you cdrom storage space. The compressed files are automatically uncompressed once they are restored onto your hard drive.You can also use a second hard drive as your backup storage device. We use two backup hard drives to be certain Ultimate PC Repair is up and running 24 / 7.You can either purchase an internal hard drive and install it to your ide cable, or you may want to purchase an external hard drive that connects to your Universal Serial Bus or USB Port.The advantage of the external drives is that they have very large amounts of storage space, transfer data fast, and can be moved from your computer to any other computer.We use the Western Digital 170 Gigabyte External Hard Drive and we simply bounce it around to either one of our four computers with the greatest of ease.USING ONLINE BACKUP SERVICESYou may also consider online services for backing up your data. If you lose all your backup data, say due to a natural disaster such as a flood, your online data is right there waiting for you.Another advantage of online backups is that you can access, upload, or download your data from any location. It is best to use high speed internet access if you're considering online data storage.One such online backup service is Istorage located at http: / / www.iomega.com / istorage and charges from $2.49 a month for 50MBs to $17.95 a month for a big 1,000MBs of storage.Or you can check out FilesAnywhere located at the url http: / / www.filesanywhere.comStill another online service to try is CapSure located at http: / / www.capsure.comBackup your system now in one way or another if you have not done so. If you have critical data that you simply cannot do without, take the time to invest in a backup device or one of the many online backup services.Stop and perform those backups as soon as possible. You will be thankful you did should something go wrong with your computer. It?s always better to be safe than sorry.About The AuthorOtis F. Cooper is the author of the award winning PC Super Pack, the Computer Training By Video course. For hundreds more free PC repair tips, sign up for his bi-monthly newsletter and learn the PC free at http: / / www.ultimatepcrepair.com

#computer #security #harddrive #pc #pctech #tech #technology
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***Thumb Drives - Great New Technology!*** The ability to ea unimarter UniMarter
***Thumb Drives - Great New Technology!***

The ability to easily move data from PC to PC with minimal inconvenience is just another benefit computers have brought to the current business world.Over the past few years, the different options to save and move data have multiplied dramatically. Usually the floppy disk (with it's 1.2 MB limitation), ZIP drives, CD-R's & CD-RW's, and even tape backups are the common ways to move data on non-networked PC's.The latest innovation, the USB Removable Flash Memory (Thumb Drive, Key Drive, Flash Drive, USB Drive, Micro Drive) brings a whole new meaning to easy transport of data. These USB compliant devices are small enough to fit on a key ring or carry in your shirt pocket.As a way to protect sensitive information, the security of one of these drives can't be beat. It's in your pocket!Their size belies a huge data storage volume; the current sizes start at 16MB and go up to 4GB. The pricing on these devices is steadily falling, making the purchase of one of these handy drives almost a must have item.Check out the accessories at your local computer store or go online to get the best deal.For very little cost you can now conveniently move data between PC's just as easily as accessing the data on your internal hard drive.? 2004 ODECMike Burstein has been helping the SOHO and Small Business community grow & prosper for over 20 years by solving start up problems, creating best practices, automating their offices, getting free publicity and dramatically increasing traffic and sales.Visit http: / / www.SOHOWiz.com for the latest FREE business tips.Email the Wiz at: SOHOWiz@SOHOWiz.com

#usb #thumb #drive #key #flash #micro #data #store #transport #security
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***Video Encryption*** What is Video Encryption?Video Encryp unimarter UniMarter
***Video Encryption***

What is Video Encryption?Video Encryption is an extremely useful method for the stopping unwanted interception and viewing of any transmitted video or other information, for example from a law enforcement video surveillance being relayed back to a central viewing centre.The scrambling is the easy part. It is the un-encryption that's hard, but there are several techniques that are available. However, the human eye is very good at, spotting distortions in pictures due to poor video decoding or poor choice of video scrambling hardware. Therefore, it is very important to choose the right hardware or else your video transmissions may be un-secure or your decoded video may not be watchable.Some of the more popular techniques are detailed below:Line Inversion:Method: Whole or parts of the signal scan lines are inverted.
Advantages: Simple, cheap video encryption.
Disadvantages: Poor video decrypting quality, low obscurity, low security.Sync Suppression:Method: Hide / remove the horizontal / vertical line syncs.Advantages: Provides a low cost solution to Encryption and provides good quality video decoding.Disadvantages: This method is incompatible with some distribution equipment. Obscurity (i.e. how easy it is to visually decipher the image) is dependant on video content.Line Shuffle:Method: Each signal line is re-ordered on the screen.Advantages: Provides a compatible video signal, a reasonable amount of obscurity, good decode quality.Disadvantages: Requires a lot of digital storage space. There are potential issues with video stability. Less secure than the cut and rotate encryption method (see below)Cut & Rotate:Scrambling Method: Each scan line is cut into pieces and re-assembled in a different order.Advantages: Provides a compatible video signal, gives an excellent amount of obscurity, as well as good decode quality and stability.Disadvantages: Can have complex timing control and requires specialized scrambling equipmentThe cut and rotate video encryption method is probably the best way of achieving reliable and good quality video encryption, an example of a good implementation of this system is in the Viewlock IIImplementing vice scramblingThe video scrambling hardware, in particular the decoder should function correctly even if there is a noisy (for example having what are commonly known as 'snow' on the screen. 'Snow' is when there are flecks on your TV screen, often seen in poor reception areas) or unstable signal. If the link to the encrypted signal should stop working then this should not be a problem. The link between the video encoder and video decoder should be regained and the decryption quickly continued.The very nature of security camera systems is that they are often outdoors as so must be able to withstand the rigours of the weather. The video encryption hardware should be stable under or protected from the effects of rain, sunlight, extreme heat and cold. It should not be damaged if there is a power spike in the supply. In these systems the video encoder emits a wireless signal to the video decoder unit before it is viewed, it obviously must be the case that the very act of broadcasting the signal does not effect the video encoding hardware and likewise the video encoding hardware should not effect the radio transmitter.The most important item is that the video scrambling system should be secure, else why bother? It is amazing how some encryption methods can easily be cracked. For example certain cable television stations 'encrypt' their channel broadcasts via a relatively un complex method, which can easily be decoded using a number of cheap bits of electronics from radio shack. That would obviously be illegal! The cable TV's method of encryption is very crude, they usually just dynamically alter the vertical sync signal so that your TV cannot get a proper lock on it and so it scrolls randomly.The other extreme is to scramble the transmitted video signal too much so that it is costly both in equipment and time to the video at the receiver. Remember that this is a 'live' video scrambling broadcast followed by a 'live' video decryption display. ANY electronics can be copied, given enough money and time, but making this process as hard as possible is of benefit as it at least delays the time when illegal copies will be available.Finally and most obviously each user must have a unique encryption key so that other users of the system cannot view the transmitted video by accident or purpose without the key owners knowledge. The total number of possible user keys must be such that it is highly unlikely for someone to guess the correct key.Visit http: / / www.whatprice.co.uk for more helpful advice.

#video #encryption #scrambling #security #covertsurveillance
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***Coping with a Serious Data Loss from your Computer Hard Drive* unimarter UniMarter
***Coping with a Serious Data Loss from your Computer Hard Drive***

Data loss is an expensive reality. It's a hard fact that it happens more often then users like to admit. A recent study by the accounting firm McGladrey and Pullen estimates that one out of every 500 data centers will experience a severe computer disaster this year. As a result, almost half of those companies will go out of business. At the very least, a data loss disaster can mean lost income and missed business opportunities.
The other side of data loss is the psychological and emotional turmoil it can cause to IT managers and business owners. Despair, panic, and the knowledge that the whole organization might be at risk are involved. In a sense, that's only fair, since human error is one of the two largest contributing factors in data loss. Together with mechanical failure, it accounts for almost 75 per cent of all incidents. (Software corruption, computer viruses and physical disasters such as fire and water damage make up the rest.)
Disk drives today are typically reliable. Human beings, it turns out, are not. A Strategic Research Corp. study done in 2000 found that approximately 15 per cent of all unplanned downtime occurred due to human error. A significant proportion of that happened because users failed to implement adequate backup procedures, either having trouble with their backups, or having no backup at all.
How does it happen that skilled, high-level users put their systems - and their businesses - at such risk?
In many cases, the problem starts long before the precipitating system error is made, that is, when users place their faith in out-of-box solutions that may not, in fact, fit their organization's needs. Instead of assessing their business and technology requirements, then going to an appropriate engineered solution, even experienced IT professionals at large corporations will often simply buy what they're sold. In this case, faith in technology can be an vice instead of a virtue.
But human intervention itself can sometimes be the straw that breaks the technology's back. When the office of a Venezuelan civil engineering firm was devastated by floods, its owners sent 17 soaked, mud-coated disks from three RAID arrays to us in plastic bags. A tough enough salvage job was made even more complex by the fact that someone had frozen the drives before shipping them. As the disks thawed, yet more damage was done. (After eight weeks of painstaking directory-by-directory recovery, all the data from the remaining fifteen disks was retrieved.)
Sometimes, the underlying cause of a data loss event is simply shoddy housekeeping. The more arduous the required backup routine, the less likely it will be done on a regular basis. A state ambulance monitoring system suffered a serious disk failure, only to discover that its automated backup hadn't run for fourteen months. A tape had jammed in the drive, but no-one had noticed.
When disaster strikes, the normal human reaction is panic. Because the loss of data signifies critical consequences, even the most competent IT staff can jump to conclusions, and take inappropriate action. A blank screen at a critical time can lead to a series of naive decisions, each one compounding the preceding error. Wrong buttons get pushed, and the disaster only gets worse. Sometimes the pressure to correct the system failure speedily can result in an attempt to reconfigure an entire RAID array. IT specialists are typically not equipped to deal with crisis modes or data recovery techniques. Just as a good physician is trained to prolong life, the skilled IT specialist is trained to keep the system running. When a patient dies, the physician turns to others, such as nurses or counselors to manage the situation. When significant data loss occurs, the IT specialist turns to the data recovery professional.
Data recovery specialists are innovative problem solvers. Often, the application of basic common sense, when no-one else is in any condition to apply it, is the beginning of the journey towards data recovery. The data recovery specialist draws on a wealth of experience, married to a "never say die" attitude, and a comprehensive tool kit of problem-solving procedures. Successful recovery outcomes hinge on a combination of innovative logistics, applied problem-solving, and "technology triage," the process of stabilizing an affected system quickly, analyzing and treating its wounds, and preparing it for surgery. The triage process sets priorities, such as targeting which files are needed first or which are absolutely vital to the functioning of the business, and establishes whether files might be recovered in less structured formats (such as text-only), which may be desirable when time is crucial.
The art and science of professional data recovery can spell the difference between a business' success or its failure. Before that level of intervention is required, though, users can take steps to ensure that the probability of a data loss disaster is minimized.
Basic to any business technology plan is a regular fire-drill procedure. Back-up routines may be in place, staff may assigned to specific roles, hardware and software may be configured - but, if the user isn't completely sure that everything works the way it should, a data loss event is inevitable. Having adequate, tested, and current backups in place is critical. A hardware breakdown should not be compounded by human error - if the malfunctioning drive is critical, the task of dealing with it should go to a data recovery professional.
Just as data loss disasters are rooted in a combination of mechanical failure and human error, so, too, the data recovery solution lies in a creative marriage of the technological and the human. The underlying philosophy of successful data recovery is that technology is something to be used by human beings, not something that uses us.Name: Darryl PeddleCompany: CBL Technologies, CanadaAuthor description: Darryl Peddle is an Internet Marketing Specialist with CBL Technologies, one of the largest data recovery specialists in the world.Website: http: / / www.cbltech.com

#datarecovery #computers #technology #dataloss #harddrive #security
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***Is Public Wi-Fi Access Safe?*** Surfing Safely in Starbuc unimarter UniMarter
***Is Public Wi-Fi Access Safe?***

Surfing Safely in Starbucks...A few months ago I met with a group of Internet professionals, all of us sporting laptops with wireless connections to the hotel's access point. On the second day of the conference, one of the attendees put up a slide on the overhead showing logins and passwords from a dozen of the attendees. Needless to say, many jaws dropped open.He was running a "sniffer" program that anyone can download to spy on the internet traffic floating around in the air. Fortunately, he was a trusted colleague, and was nice enough to tell us that we were caught with our virtual pants down.Wifi Safety TipsFirst, be aware that (almost) ANYTHING that you type or any info that appears on your screen while you're using a wireless connection can be seen by others nearby. If you are accessing a page that requires a login and password, or if you are entering ANY personal data (credit card, SSN, etc) make sure that you are on a secure site. That's easy enough -- just check that the web address begins with https instead of the usual http -- and your information will be safely encrypted before transmission. As long as you're on a page with an address that begins with https, the data you send and receive is protected from sniffers and snoopers.But be on your guard, some web-based email providers have a secure login page, but after you're logged in the access reverts to normal non-encrypted mode. So any email you send or receive while on a wireless connection is out in the clear. Google's GMail and Yahoo Mail are examples of webmail services that work this way. Until recently Hotmail didn't even offer a secure login option. So look for the link or checkbox for the secure login when accessing your web-based email. If your service doesn't offer one, consider switching or decide to live with the security exposure.Oh, and there are the "shoulder surfers" to watch out for. Just like when you're entering your PIN code at an ATM, you need to keep an eye open for anyone who might be glancing over your shoulder while you hunt and peck in the airport or coffeeshop. I always use two fingers when entering my pin or password... one presses the correct key and other is a decoy. So even if someone was watching from across the street with binoculars, it's almost impossible to steal a password.And beware of the Evil Twins! The Internet Patrol warns of a scam where a hacker may put up a bogus copy of the wi-fi hotspot's login page. Learn how to stay safe from this attack by reading this helpful article: http: / / www.aunty-spam.com / wifi-hotspot-evil-twins-mimic-wi-fi-hotspots-and-steal-your-dataSecuring Your Wireless HOME NetworkDo you have a wireless laptop and router at home? You may be providing free internet access to your neighbors, or opening your system to drive-by hackers. Don't miss my article on securing your wireless home network, here: http: / / www.askbobrankin.com / wireless_security.htmlBOB RANKIN... is a tech writer and computer programmer who enjoys exploring the Internet and sharing the fruit of his experience with others. His work has appeared in ComputerWorld, NetGuide, and NY Newsday. Bob is publisher of the Internet TOURBUS newsletter, author of several computer books, and creator of the http: / / LowfatLinux.com website. Visit Bob Rankin's website for more helpful articles and free tech support.

#wi -fi #wifi #wireless #hotspot #security #privacy #hacker
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***E-mail Privacy Mythology*** Many people believe that e-ma unimarter UniMarter
***E-mail Privacy Mythology***

Many people believe that e-mail privacy is inherent and guaranteed, psychologically equating it with the postal system. E-mail systems were a crucial tool in creating the Internet, and actually predate the Internet in existence. While the ability to access your personal e-mail messages is secured with a password, this is insufficient to guarantee legitimate security. There are additional security considerations when using laptops to access e-mail systems.Businesses are increasingly relying on electronic mail to correspond with clients and colleagues. As more people find the need to transmit sensitive information through the internet, the need for e-mail privacy becomes more apparent.The e-mail message is perpetually exposed to unauthorized access as it travels along this unprotected Internet from the composer to the reader. If routers between the source and destination of an e-mail message are compromised, potentially any e-mail message passing through that router could be accessed.Unencrypted e-mails should be regarded as postcard, in that anyone who receives it can read it. Intelligence agencies screen unencrypted e-mails with ease and conduct these screens regularly.Some e-mail you may send and receive could be considered company property. It is unwise to associate personal e-mails of any kind with a company address.When using laptop notebooks to send and receive e-mail, you may often be using someone else?s network. You must be aware if using a wireless network if the network is encrypted. If the network is not properly encrypted any e-mail you send or receive is accessible to any skilled person within the wireless signal range. Even when using secure networks, everything you send and receive is going through their system. It is imperative that one uses TLS encryption when sending mail, and to use a send mail server other than the foreign network. When reading e-mail on someone else?s network, you must make sure your mail server supports SSL and use the encrypted access only.If you delete an e-mail you must not have the misconception that the existence of the e-mail is gone forever. This is not the case as most electronic documents are backed up and recoverable, and most e-mails are backed up on a remote server at some point in time.For more information about Laptop Security visit Security4Laptops.com.Security4Laptops.com is your definitive guide to using mobile devices with the privacy and security necessary in this modern work-a-day on-the-go world.

#e-mail #security #wireless #network #laptop #notebook #mobile #encryption
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***Thieves Want Your Laptop and Your Data*** Thieves find la unimarter UniMarter
***Thieves Want Your Laptop and Your Data***

Thieves find laptops easy prey because they are small, light and easy to handle. Anyone who takes their eye off a laptop in public, even briefly, may never see it again.While special theft protection devices are offered for mobile computers,
experienced thieves often view this as little more than an annoyance. In the end, the loss of the hardware is only part of the problem. It's when sensitive data resides on the laptop that real problems begin.

Common thieves can be good at instantly taking advantage of a laptop owner's inattentiveness: The thief strikes while passing by, snapping up laptops in a airport food courts, desks in offices or unlocked automobiles. The hot laptops are then converted into cash easily by using an internet auction site.

"One in ten laptops gets stolen," according to Bill Schiering, of
Camera Security Now, which sells security camera systems.

Businesses with laptops can be protected with an inexpensive internet based camera system, says Schiering.

"Security Camera systems are likely at best to scare off the common garden
variety thieves," says PC expert Andrew Wendt from the Computer Service Now."More important than protecting the laptop is protecting sensitive company data," says Anthony Cipollone, Tech Travel Agent for Rentacomputer.com, a nationwide computer rental firm. The theft of databases hurts companies more than the loss of the laptop, especially since company laptops are often covered by insurance and databases are not.If a thief gets control of company documents or sensitive access codes, these can lead to greater damages. Users must therefore take steps before a theft occurs. This includes encrypting data on the hard drive or by only accessing company data via Terminal Services or Citrix remote desktop operating systems," Cipollone says.

To prevent access to the laptop's data, users should also create additional Windows and BIOS passwords, Wendt says. Experienced hackers can get around these, however, warns PC expert Cipollone. An alternative for preventing unauthorized access is fingerprint scanners, says Wendt from Computer Service Now.

In the end, a combination of steps is the best, Wendt advises. The latest theft protection devices for laptops are now offered as PC expansion cards, containing a motion sensor and encryption software is a must.

Companies should record the laptop's serial number so that the police can make a positive identification in case of a theft recovery. Laptop owners can also make recovery of their laptops easier engraving the company name in the plastic case of the laptop.

There one more trick for keeping thieves at bay while traveling. Use a regular suitcase instead of a classic laptop bag for transporting the laptop. The surest way to keep a thief away from stealing your company laptop is to not make it obvious you have a laptop computer.John Beagle is a writer for Xponex Web and Media
Services. Telephone: 513-422-1907x222

#Laptops #SecurityCamera #CCTVSurveillance #computerrentals
@unimarter UniMarter Blog@unimarter
ponad 3 tygodnie temu
***Now You See It, Now You Don't: Preventing Laptop Computer Thef unimarter UniMarter
***Now You See It, Now You Don't: Preventing Laptop Computer Theft***

When Irwin Jacobs, chief executive and founder of Qualcomm Inc. had his laptop stolen from a journalism conference in September 2000, it shed light on a growing problem.Other recent events have focused national attention on the laptop security issue, consider the following:? In July 2001 the Federal Bureau of Investigation reported that 184 laptops had been stolen or lost. At least one and possibly as many as four contained classified information.? In April 2001 the British Defense Ministry reported 205 laptops missing since 1997, most of which contained classified materials.? In February 2000 a laptop computer with ?highly classified? information disappeared from the U.S. State Department. Then, in May 2000 two more laptops were reported missing from the U.S. State Department.While technology has made laptops smaller, easier to store and transport, it has also made them easier to conceal and steal. It?s the convenience that has made the laptop computer so popular and the information vehicle of choice for business people throughout the world..The computer itself is a valuable asset and one that should be protected, but it can be replaced, however, the information stored on it in many cases is not replaceable and of greater value to competitors if compromised. A thief can get a few thousand dollars for a top of the line laptop, but he can get a whole lot more for a company?s marketing plans.High Risk LocationsA high percentage of laptops are stolen from the office. FBI officials estimate as much as 75 percent of laptop thefts are committed by insiders, individuals who are expected to be on the premises. For example, employees, delivery people and janitors all have access to the grounds and buildings and have opportunities to steal unprotected laptops.In one case, Canadian authorities apprehended a man believed to have stolen 20 to 30 laptops from an office building over a span of a few weeks. The suspect would enter the building dressed as a maintenance employee, load computers onto a dolly and exit the building. He performed this routine so often, that building employees believed he was actually a member of the maintenance staff.According to a USA Today article, heightened airport security as a result of the September 11 terrorist attack has caused an increase in the number of lost laptops at airport checkpoints. . The problems stem from new procedures that require passengers to remove their laptops from their cases and put them through x-ray machines. They either forget to pick them up or grab a stranger?s laptop by accident. It becomes more problematic for travelers who are singled out for magnetic wand searches and may be separated from their valuables on the conveyor belt for extended periods of time.Business travelers should also pay close attention to their laptops when at the following locations:*Hotels*Train Stations*Bus terminals*Car rental agencies*Conference Centers*Restaurants*Restrooms*PayphonesAlways remember, laptop theft can happen anyplace, at any time.Laptop Theft Prevention TipsEmployees? Disguise your laptop. By carrying your laptop in a case designed for computers, you alert the thieves you have a laptop. Carry your laptop in an ordinary piece of luggage, satchel or other inconspicuous bag.? Record the laptop serial number, make and model information. Keep this information in your purse or wallet so if your computer is stolen, the information will be readily available when you file a police report.? Never leave your laptop unattended in a public place.? Use computer-locking cables to secure the computer to a desk or table? Never place a computer in checked luggage.? If a laptop must be left in the car, store it in the trunk of the vehicle prior to arriving at the final destination.? Identify your carrying case in some unusual way to make it stand out from all other bags. An unusual color, colored tape or yarn or exceptionally large or brightly colored tags attached to the bag will help you immediately locate the bag and give police probable cause to stop and question the carrier.? Also consider taping colored paper or placing a large tag on the front of you laptop to avoid accidental mix-ups at the x-ray machine.? Regularly back up information and store it separately in case your computer is stolen.Employers? All laptops should be permanently marked or engraved with inventory or serial numbers so they can aid in recovery if found by the police. Check with the manufacturer regarding appropriate marking locations and warranty criteria prior to marking.? Conduct scheduled inventories of laptops periodically.? Proper documentation should be maintained for all laptops. Records could include the type of equipment identifiers such as make, model and inventory or serial numbers, an equipment assignment date, and the employee responsible for the laptop.? Some companies utilize electronic asset tracking technology. Employers can tag laptops with a small electronic transponder. If an employee attempts to leave the building with the computer, the system records the time, date and exit used. Some systems can also give security the ID of the employee taking the equipment.? Access to the area where laptops are stored when not assigned should be limited to a select few individuals.? The limited access storage area should be situated away from high traffic areas.? Access should be controlled to areas such as offices where employees utilize laptops. This can also be accomplished through the use of ID card systems.? Some companies have established policies making employees responsible for the loss of a laptop if they do not follow company policy for safeguarding it. Communicate the policy in writing and get a signed statement of acknowledgement.? Employers have also been known to require employees to purchase their laptops, reasoning that employees will better care for them.? Provide employees with loss prevention and security awareness training. E-mails, brown bag luncheons, new hire orientations security awareness literature / posters and video presentations are all excellent vehicles for getting the word out.? Provide employees with adequate secure storage areas for their laptops such as locked security closets, cabinets and lockdown devices at desks and workstations.Johnny May is an independent security consultant / trainer and the executive producer of the video production Now You See It, Now You Don't: Preventing Laptop Computer Theft. For more information visit http: / / www.security-videos.com

#crime #security #laptop #computer #theft
Artykuły Video Społeczność Rynek Zdrowia Market Placówki medyczne Baza leków
Seniorzy Ubezpieczenia Kalkulator OC/AC Przyczepy
Prywatność Regulamin #Tagi ☈ Popularne ❖ Rankingi Kontakt
YouTube Facebook @unimarter
© 2019 UniMarter.com.
blog@unimarter.com
UniMart
er
Konto @  Market ❖