Within the next few years the BYOD concept will become widespread and generally accepted ( I think this is long overdue) – basically due to the operation cost reduction it presents to businesses. This will indeed increase the security burden on CIOs and may prove to be a really hot headache if the strategy is not right.
This webcast deals with this in a light that will dazzle you. Enjoy! Hmmmm… and i think Webroot mobile security suit is not bad – though not a total solution in my opinion.
Please click https://www.brighttalk.com/webcast/288/65745 to view. Please don’t forget to return here to leave a comment.
When it comes to buying a Computer, you want to get the absolute best. Of course, if you are like most of us, you don’t really have the cash for the computer of your dreams. In fact, you are going to be lucky if you can afford one at all. If you can find the money for a computer, there are a couple of things that you will want to consider before you make your purchase.
Laptop or Desktop
Now that laptops are becoming increasingly more capable, fewer and fewer people are opting for the desktop computer. That doesn’t mean that a laptop is the perfect thing for you. A laptop can provide great portability, but it comes at the cost of memory, processing power and screen-size. Depending on what you will use your computer for, you may find that a desktop computer is better(though mobility is everyone’s dream!). If price is really important, you might look into a portable piece like a tablet to bring to class paired with a cheaper desktop in order to avoid sacrificing the function that you need for price.
Bigger is better, but it is also a lot more expensive. Bigger screens are also not necessary for reading online papers for class. Those big screens can also effect your body’s biological clock. With smaller screens you are going to run into other problems – you might have a difficult time seeing what you are working on. It is important to remember why you are buying the computer. If you only need one for classes, it might be a lot easier to tote it around if it has a smaller screen. It is worth noting that screen resolutions are measure in DPI(dot per inch),DP(Dot pitch). The higher the value the higher the display’s resolution.
The fastest, smartest computers are always the most expensive. Of course, cutting costs on things like screen size and accessories can cut down the cost a little, but in the end, the bigger your computer’s brain, the more costly it is going to be. To get enough memory, you may eventually find yourself needing a desktop. If you use a lot of file space on your computer for programs, videos, and photos, you might need all of that space to keep your computer running. If you are worried, look into the price for an external memory bank. it is worth noting that the term memory in the computing world is used interchangeably between the Hard drive and the RAM. Since this article’s intenstion is not to bore you with technical terms, it is worthy to note that when talking speed of processing more attention should be given to RAM size but when talking about permanent storage, more should be given to Hard Drive space.
What computer would be complete without all of its accessories? Web-cams, special mouses, Wifi cards and fancy sound cards can all pimp out an otherwise boring computer. Some of those things are going to be pretty cheap, like laptop covers; and others are going to cost you a lot more, such as fancy graphics cards. Weigh the benefits against the things that you are going to be using your computer for. If you are only going to be writing papers, a fancy graphics card might not be a good idea. If you are going to be designing webpages, it might be worth it. Other gears like the docking station, microphone e.t.c are also available. The rule of thumb here is “Buy What You Need” balancing the cost.
Though functionality is the word, you still don’t want to by a slimy looking computer without good external appeal. I personally hate ugly computers, no matter how good its functionality. You can also look into the possibility of building your own PC.
The infamous Flame virus can infect even secure PCs by tricking them into believing its malicious payload is actually an update from Microsoft.
As we already know, Flame has gained traction by tapping into security certificates for Microsoft’s Terminal Server. Though they appear to be digitally signed by Microsoft, the certificates are actually cooked up by the people behind Flame, thereby tricking PCs into accepting them as legitimate.
Microsoft and Symantec revealed yesterday that the virus can up the ante by using the fake certificates to spoof Microsoft’s own Windows Update service. As such, Windows PCs could receive an update that claims to be from Microsoft but is in fact a launcher for the malware.
Symantec described the method behind Flame’s madness: The virus, also known as Flamer, uses three applications to infect PCs — Snack, Munch, and Gadget. Collectively, this trio can trick PCs into redirecting Internet traffic to an infected computer with a fake Web server,. Once infected, a PC thinks the file that loads Flame is actually a Windows Update from Microsoft.
And as Symantec explained in its blog, spoofing Windows Update is not a trivial matter.
Hijacking Windows Update is not trivial because updates must be signed by Microsoft. However, Flamer bypasses this restriction by using a certificate that that chains to the Microsoft Root Authority and improperly allows code signing. So when a Windows Update request is received, the GADGET module through MUNCH provides a binary signed by a certificate that appears to belong to Microsoft.
The unsuspecting PC then downloads and executes the binary file, believing it to be a legitimate Windows Update file, Symantec added. The binary is not the Flame virus itself but a loader for Flame.
Microsoft also confirmed the risk to Windows Update, explaining that the vulnerability could be used to attack customers who weren’t the focus of the original Flame virus.
“In all cases, Windows Update can only be spoofed with an unauthorized certificate combined with a man-in-the-middle attack,” Microsoft said. The Flame virus itself has employed a man-in-the-middle attack to steal data, listen in on audio conversations, and take shots of screen activity.
Microsoft has already taken action by issuing a Security Advisory on how to block software signed by the unauthorized certificates, releasing an update to block the rogue certificates, and cutting off the ability of the Terminal Server Licensing Service to issue certificates that allow code to be signed.
To further protect its customers, the software giant is promising to harden its Windows Update service.
“We will begin this update following broad adoption of Security Advisory 2718704 in order not to interfere with that update’s worldwide deployment,” Microsoft said. “We will provide more information on the timing of the additional hardening to Windows Update in the near future.”
Some security experts have downplayed the danger of Flame, claiming it’s not as huge a threat as feared.
“As we continue our investigation of Flame, more and more details appear which indicate our initial statement: this is one of the most interesting and complex malicious programs we have ever seen,” Kaspersky said in a blog yesterday.
- ‘Nightmare’ scenario: Flame virus spreads by hijacking Microsoft’s Windows Update (geekwire.com)
- Microsoft ‘hardens’ Windows Update from Flame penetration (go.theregister.com)
- Flame malware used man-in-the-middle attack against Windows Update (nakedsecurity.sophos.com)
NOTE: This method below has seized working. The only option now is to get an Airtel Sim, register for BBC or any other Blackberry internet plan using a Blackberry phone, remove the sim and insert in yourAndroid phone and ZAP!!! you are connected. No rooting! No Special Configs!! Browse away.
The post below is outdated. use an Airtel sim as stated above.
This post is for our audience from Nigeria..it may work with other network if appropriate configuration parameters like the APN, proxy, port, Username and password is known
1. A rooted android phone.
2. An MTN BIS plan
3. Dolphin mini browser
4. Orbot app
make sure you install the browser and the Orbot
apps before you start and you have MTN APN
settings already set up in the phone. finally, make
sure your phone is rooted.
1. create a new APN with these settings
APN = blackberry.net
proxy = blank
port = blank or 8580
Username = web
Password = web
2. save it and make it your default settings.
3. install Orbot and dolphin browser mini.
4. in Orbit settings, tick Tor everything,
transparent proxy, Tor tethering
5. activate your internet access, then start Orbot.
wait until the ON button turns green. then click the
test button,select dolphin browser and wait for the
check tor webpage to show up.
Congratulations,your BIS browsing is now active.
1. For some strange reason, the test webpage
doesn’t show on Opera mini but you can still
browse with it if you ticked “tor everything”
2. this works even when you have zero
naira.however, if you send 2 to 131,it would say
you have no credit.
3. i have tired this on only two android phones and
it works. you may or may not have issues.
- Cell phone privacy guide (Android) (encrypteverything.ca)
- Google Play And Dolphin Browser Receives Update (goandroid.co.in)
- Dolphin Jetpack Supercharges Dolphin Browser, Makes Mobile Surfing Stupid Fast (lifehacker.com)
- Dolphin Jetpack Supercharges Dolphin Browser (lifehacker.com.au)