Use Ordinary Paper and Tape to Prevent Webcam Spying
February 22, 2010
This post has been moved to:
http://globalizenetworks.com/blog/2010/02/23/use-ordinary-paper-and-tape-to-prevent-webcam-spying/
Macworld 2010 Highlights
February 18, 2010
So I went to MacWorld 2010 and was surprised at how many cool things there were. Most of our client’s machines run on Windows, but scientists and designers still tend to prefer the Mac experience. I am even working on a project in which we are replacing all the Windows machines with Macs and running the one required Windows application within a Windows VM running XenApp on a Mac OS X server. XenApp serves up Windows applications to any client (even Macs) via a web based Java applet.
The iPad discussion was so popular that the 1500 person capacity primary room filled up and they had to open an overflow room. The discussion covered most of the topics which are being discussed in the gadget blogosphere. Probably the most contentious point is Apple’s control of which apps can be installed. Other platforms allow users to set a well-buried option to enable 3rd party apps. One panel member likened this to Cuisinart forbidding users to cook pop-tarts in their toaster ovens. I actually sympathize more with the stability argument. Also, why shouldn’t Apple get more revenue as a reward for building the most cohesive mobile experience? If people want more choice, HTML5 might be an alternative going forward. Google built a good Voice app for the iPhone using HTML5. This might open the door to many more applications to side-step the apps store.
Here are my favorite products from the show:
There were some cool touch surfaces, but they were all running VISTA! I was surprised that there weren’t more multi-touch interface products. | |
I was fascinated by these nanotech-enabled leather gloves that work with capacitive screens. I understand that the process is integrated into the tanning of the gloves and is very durable. I also like this touch screen which brings us one step closer to Minority Report. |
Big patch Tuesday
October 15, 2009
Are we addressing the real security problems?
September 16, 2009
This report from SANS was an eye-opener for me:
http://www.sans.org/top-cyber-security-risks/
Priority One: Client-side software that remains unpatched.
Waves of targeted email attacks, often called spear phishing, are exploiting client-side vulnerabilities in commonly used programs such as Adobe PDF Reader, QuickTime, Adobe Flash and Microsoft Office. This is currently the primary initial infection vector used to compromise computers that have Internet access…
Priority Two: Internet-facing web sites that are vulnerable.
Attacks against web applications constitute more than 60% of the total attack attempts observed on the Internet. These vulnerabilities are being exploited widely to convert trusted web sites into malicious websites serving content that contains client-side exploits…
Even high profile security experts can get hacked
August 2, 2009
Don’t ever re-use passwords between sites. Here is an article about high-profile security sites getting hacked:
Google searches will set you free
July 21, 2009
Day in and day out, I cannot imagine doing my job without the internet and specifically google searches to find those obscure solutions to all manner of technical problems. Here are some links to improve your own Google Searching experience:
Skipping Vista and looking at Windows 7
July 19, 2009
Gartner is recommending that enterprises not deeply into a Vista roll-out should wait for Windows 7. It’s no secret that a majority of companies surveyed are keeping XP rather than deploy Windows Vista to the desktop. Common complaints include performance, driver, and application compatibility problems, though these latter two have been greatly reduced over time. It is nice to have a homogeneous desktop environment, but it will probably be less expensive and problematic to keep XP on older systems and rollout the new OS on new hardware.
Personally I would prefer to stick with XP until the bitter end, but we will begin to see increased support overhead after mainstream support ends. My main concern is the “Non-security hotfix support” which will require a special agreement with Microsoft. http://support.microsoft.com/gp/lifepolicy.
It makes sense start putting together a roadmap to transition
- full environment software and hardware inventory
- determine possible hardware problems
- Printers, scanners, business-card readers, etc.
- Determine software problems
- Compatibility of standard software
- What about non-standard, business critical applications?
- set up training or at least some simple documentation like cheat-sheets