Apr 27 2009

Windows 7’s Virtual XP Mode a Support Nightmare?

CWmike writes “Microsoft’s decision to let Windows 7 users run Windows XP applications in a virtual machine may have been necessary to convince people to upgrade, but it could also create support nightmares, analysts said today. Gartner analyst Michael Silver outlines the downsides. ‘You’ll have to support two versions of Windows,’ he said. ‘Each needs to be secured, antivirused, firewalled and patched. If a company has 10,000 PCs, that’s 20,000 instances of Windows.’ The other big problem Silver foresees: Making sure the software they run is compatible with Windows 7. ‘This is a great Band-Aid, but companies need to heal their applications,’ Silver said. ‘They’ll be doing themselves a disservice if, because of XPM, they’re not making sure that all their apps support Windows 7.'”

Read more of this story at Slashdot.

Share

Mar 13 2009

Beyond Firewalls — Internet Militarization

angry tapir writes “One of the discussions at the Source Boston Security Showcase has been the militarization of the Internet. Governments looking to silence critics and stymie opposition have added DDOS attacks to their censoring methods, according to Jose Nazario, senior security researcher at Arbor Networks, with international political situations spawning DDOS attacks.”

Read more of this story at Slashdot.

Share

Mar 12 2009

Windows Security and On-line Training Courses?

eggegick writes “My wife has taken a number of college courses over the last three years and many of the classes used on-line materials rather than books. The problem was these required IE along with Java, Active X and/or various plug-ins (the names of which escapes me), and occasionally I’d have to tweak our firewall to allow these apps to run. I don’t think any of these training apps would work with Firefox. All of this made me cringe from a security point of view. Myself, I use just use Firefox, No-Script, our external firewall and common sense when using the web. I have a very old windows 2000 machine that I keep up to date. To my knowledge I’ve never had a virus or malware problem. Her computer is a relatively new XP machine, and this point she feels here computer has something wrong. But now she prefers to use my old machine instead of hers since it seems to be more responsive. We plan to run the recovery disk on hers. Assuming the college course work applications were part of the cause, what recommendations do any of you have when having to run this kind of software? Is there a VMware solution that would work — that is have a Windows image that is used temporarily for the course work and then discarded at the end of the semester (and how do you create such an image, and what does it cost?).”

Read more of this story at Slashdot.

Share

Mar 12 2009

Windows Security and On-line Training Courses?

eggegick writes “My wife has taken a number of college courses over the last three years and many of the classes used on-line materials rather than books. The problem was these required IE along with Java, Active X and/or various plug-ins (the names of which escapes me), and occasionally I’d have to tweak our firewall to allow these apps to run. I don’t think any of these training apps would work with Firefox. All of this made me cringe from a security point of view. Myself, I use just use Firefox, No-Script, our external firewall and common sense when using the web. I have a very old windows 2000 machine that I keep up to date. To my knowledge I’ve never had a virus or malware problem. Her computer is a relatively new XP machine, and this point she feels here computer has something wrong. But now she prefers to use my old machine instead of hers since it seems to be more responsive. We plan to run the recovery disk on hers. Assuming the college course work applications were part of the cause, what recommendations do any of you have when having to run this kind of software? Is there a VMware solution that would work — that is have a Windows image that is used temporarily for the course work and then discarded at the end of the semester (and how do you create such an image, and what does it cost?).”

Read more of this story at Slashdot.

Share

Mar 5 2009

The Best Way Through the Great Firewall of China

eldavojohn writes “The MIT Technology Review brings news of a new report from Harvard assessing circumvention software. The best tools they tested (and they actually did test them in cybercafes in China) were Ultrareach, Psiphon, and Tor, while Dynaweb and Anonymizer also scored well — of course, the huge downside is the long loading times. The report also includes responses from developers of the tools.”

Read more of this story at Slashdot.

Share

Feb 21 2009

HowTo: Share A Printer Across The Internet (Cross Platform)

That’s right boys and girls you read that correctly, and without any Admin intervention or setting up and modifying any firewall/router permissions.

Share

Feb 17 2009

Hacking With Synthetic Biology

blackbearnh writes “If you’ve gotten tired of hacking firewalls or cloud computing, maybe it’s time to try your hand with DNA. That’s what Reshma Shetty is doing with her Doctorate in Biological Engineering from MIT. Apart from her crowning achievement of getting bacteria to smell like mint and bananas, she’s also active in the developing field of synthetic biology and has recently helped found a company called Gingko BioWorks which is developing enabling technologies to allow for rapid prototyping of biological systems. She talked to O’Reilly Radar recently about the benefits and potential dangers of easy biological design, why students should be hacking wetware, and what’s involved in setting up your own lab to slice genes.”

Read more of this story at Slashdot.

Share

Feb 10 2009

You Are Not a Lawyer

Paul Ohm is starting a new “very occasional” feature on the Freedom To Tinker blog called You Are Not a Lawyer — “In this series, I will try to disabuse computer scientists and other technically minded people of some commonly held misconceptions about the law (and the legal system).” In the first installment, Ohm walks through the reasons why many techies’ faith in the presence of “reasonable doubt” is so misplaced. “When techies think about criminal law, and in particular crimes committed online, they tend to fixate on [the ‘beyond a reasonable doubt’] legal standard, dreaming up ways people can use technology to inject doubt into the evidence to avoid being convicted. I can’t count how many conversations I have had with techies about things like the ‘open wireless access point defense,’ the ‘trojaned computer defense,’ the ‘NAT-ted firewall defense,’ and the ‘dynamic IP address defense.’ … People who place stock in these theories and tools are neglecting an important drawback. There are another set of legal standards — the legal standards governing search and seizure — you should worry about long before you ever get to ‘beyond a reasonable doubt.'”

Read more of this story at Slashdot.

Share

Jan 14 2009

A Cheap, Distributed Zero-Day Defense?

coondoggie writes “Shutting down zero-day computer attacks could be carried out inexpensively by peer-to-peer software that shares information about anomalous behavior, say researchers at the University of California at Davis.The software would interact with existing personal firewalls and intrusion detection systems to gather data about anomalous behavior, says Senthil Cheetancheri, the lead researcher on the project he undertook as a grad student at UC Davis from 2004 to 2007. He now works for SonicWall.”

Read more of this story at Slashdot.

Share