Wednesday, December 30, 2015

The most innovative and damaging hacks of 2015

The year's most significant attacks highlight how hackers are changing tactics -- and how IT security must evolve in the year ahead

Not a week went by in 2015 without a major data breach, significant attack campaign, or serious vulnerability report. Many of the incidents were the result of disabled security controls, implementation errors, or other basic security mistakes, highlighting how far organizations have to go in nailing down IT security basics.

But looking beyond the garden-variety attacks and vulnerabilities lends great insight into the future of malicious activity and how to defend against it. And 2015 had its share of intriguing invasions, each of which highlighted the modified techniques that lead to new forms of breaches or pinpoint areas in need of new defenses. The past year saw cyber criminals adopting innovative approaches and state-sponsored actors becoming bolder. Motivations shifted, with financial gain no longer the sole reason for launching an attack. Inflicting physical damage, stealing trade secrets, hacking as a form of protest -- 2015 was a year in which malicious activity served many ends.

The increasingly interconnected world means bad guys can cause a lot of damage; more important, many malicious actors now have the skills and means to carry out chilling attacks. Below is a roundup of some of the most significant incidents of the past year, each of which pushes the overall security conversation further, showing new paths and needs for defense. Which ones did we miss?

Bitcoin under barrage

Bitcoin -- and the idea of crypto currency in general -- captured mainstream attention this year, in part because of nefarious actors who used the platform as cover for payment. Ransomware gangs have demanded payment in bitcoins before unlocking victims’ files and folders, and blackmailers have demanded bitcoins in exchange for not launching DDoS attacks against websites. But bitcoin made security headlines several times in 2015 for a different reason: Thieves kept stealing bitcoins ... lots of them.

European exchange Bitstamp suspended trading after discovering one of its operational bitcoin storage wallets was compromised in early January. The exchange is believed to be the world’s third busiest and handles approximately 6 percent of all bitcoin transactions. About 19,000 bitcoins, or roughly $5 million, were stolen at the time. That wasn’t the only bitcoin attack, as China-based exchange BTER reported in February that 7,170 bitcoins, or roughly $1.75 million, were stolen from its cold wallet system. Thieves stole 10.235 BTC, or roughly $2,500, from bitcoin startup Purse in October.

Consider it a twist on the traditional bank heist: Instead of looting bank accounts, exchanges are raided. In addition to showing there is real financial value associated with the virtual currency, the thefts highlighted the need “for an internationally recognized security standard” for bitcoin, said Florindo Gallicchio, director of information security in the Optiv Office of the CISO. In February, the Cryptocurrency Certification Consortium (C4) proposed 10 standardized rules for the creation, storage, audit, and use of bitcoins, as part of the Cryptocurrency Security Standard (CCSS).

While the amounts stolen aren’t insignificant, they pale in comparison to the 850,000 bitcoins, worth close to $450 million, that disappeared from Japanese-based exchange Mt. Gox in 2014. The exchange, believed to have handled 70 percent of all bitcoins, has since closed and entered bankruptcy. Japanese police believe the theft was an inside job.

As is often the case with technology, the exchanges have thus far focused on functionality and usability, with security an afterthought, said Steve Donald, CTO of Hexis Cyber Solutions. Many of the attacks relied on social engineering to gain a foothold on to the exchange’s network. Exchanges need to adopt secure code development practices, as well as dynamic and static code analysis to protect their applications. “Bitcoin exchanges should be highly incented to improve security as this will be a requirement before this new type of currency will achieve wide scale usage,” Donald said.

Cyber goes real-world

Cyber attacks that result in damage in the physical world happen far more often on TV shows than they do off-screen. It was scary when the Shamoon malware attack partially wiped or totally destroyed hard drives of 35,000 computers at Saudi oil company Aramco back in 2012. We saw the blurring between cyber and physical again -- to be fair, the attack actually happened in 2014 and the report providing the details were released shortly before the end of the year -- at an unnamed German steel mill when attackers manipulated and disrupted control systems. The blast furnace could not be properly shut down, resulting in “massive” damages, according to reports.

There is a tendency to think cyber attacks are about stealing data or knocking systems offline. There can be real-world damage, too. An attacker can potentially compromise a pharmaceutical company’s production process or quality control systems and modify the recipe for a particular drug. Hospital systems are also vulnerable to attack, especially since many legacy systems still in use cannot be secured. As much as 20 percent of hospitals are vulnerable to attacks that can disable critical care systems, Gallicchio said.

“People can be physically hurt from a cyber attack,” Gallicchio said.
Industrial control system security comes up a lot in conversation, but the incident at the German steel mill highlights the fact that the threat is no longer theoretical. One of the challenges facing industrial control system security, especially in manufacturing, is the simple fact that the systems are typically controlled and administered by operations and engineering departments, not IT. The operations and engineering teams are focused on reliability and make decisions at the expense of security in order to maintain uptime.

Improving defenses requires “a mix of basics and more contemporary defenses,” such as ensuring proper segmentation and access controls between different networks, Donald said.
Financial crime goes big

There were a number of attacks against financial institutions in 2015, but none was more audacious than the Carbanak crime ring, which targeted more than 100 banks and other financial institutions in 30 nations. Kaspersky Lab estimated the gang had stolen as much as $1 billion since late 2013 and had managed to stay under the radar for two years because it kept each transaction between $2.5 million and $10 million.

The scale of attacks against financial institutions indicate criminals are moving away from low-value consumer-related attacks such as identity and credit card theft in favor of high-value attacks. “The old ‘smash and grab’ jobs are becoming carefully orchestrated and executed jobs,” said Mike Davis, CTO of CounterTack.

The FBI also warned of an increase in social engineering campaigns where an attacker sends an email purporting to be from the CEO or another senior executive to the CFO or another executive authorizing a wire transfer. If the recipient is tricked and doesn’t validate the email’s authenticity before the transfer, that money is gone, usually for good.

While external attackers still pose the biggest threat to financial organizations, 2015 showed insiders can cause damage as well. Earlier this year, a former employee of Morgan Stanley pleaded guilty to stealing confidential data from more than 700,000 customer accounts while he was interviewing for a new job with two competitors. And external attackers target insiders who already have access to sensitive data. Encryption, dynamic security policies that travel with data, and robust multifactor authentication controls are some of the defenses financial institutions should consider to ensure that unauthorized individuals can’t read anything they shouldn’t be allowed to see, said Ron Arden, vice-president of Fasoo.
Health care on the breach radar

Some of the biggest breaches in 2015 involved health care organizations, including Anthem, Excellus BlueCross BlueShield, Premera Blue Cross, and CareFirst, to name a few. Eight of the 10 largest health care breaches happened in 2015, according to the U.S. Department of Health and Human Services.

It’s no surprise the attackers went after health care, since the companies tend to have valuable data, including names, addresses, Social Security numbers, medical records, and financial information. The data is difficult to change, meaning it has a longer shelf life and can be used in a variety of follow-up attacks. Attackers accessed more than 100 million health care records in 2015.

While some of the breaches may have been part of identity theft and other cyber crime activities, security experts believe Anthem was the work of Chinese state-actors. The attackers may have been after data on specific individuals for intelligence purposes, or they may have wanted intellectual property relating to how medical coverage and insurer databases are set up. The Chinese government has denied any involvement in the attacks, and Chinese authorities recently arrested individuals they claim had targeted Anthem for cyber crime purposes.

“Just like how the financial verticals evolved to the next-generation bank heists, we will soon see attackers use health care information records to support more sophisticated business models,” said Itzik Kotler, co-founder and CTO at SafeBreach.

These attacks were successful in large part because health care companies have not traditionally invested as much on security initiatives as financial institutions have. The Anthem breach, in particular, showed how far some health care companies lag on basic security best practices. As Target shook the retail sector out of its complacency in 2014, Anthem made the health care industry sit up and notice the very real dangers it faces.

Worse, encryption practices around sensitive data had no effect. In many health care breaches, users were socially engineered out of their credentials, letting attackers easily bypass encryption controls. It doesn’t take a lot, either. Attackers stole 80 million personal records from a large health care insurance company by compromising only five user accounts, Eric Tilenius, CEO of BlueTalon, said. “Every company should ask, ‘How much data would be exposed if a user account gets compromised?’ and then work to limit that exposure,” he said.

“It doesn’t matter how strong your security platform is, if employees aren’t properly trained in best security practices, it all can go out the window,” said Garry McCracken, vice president of technology at WinMagic.

Attacks as part of a long game

Perhaps the most intriguing, significant, and shocking security incident of 2015 was the attack against the U.S. Office of Personnel Management. The personal data of millions of government employees, U.S. military personnel, and government contractors who had received background checks and security clearances were stolen. In a typical data breach, the attackers target the organization because they want the information it has. In the case of OPM, the attackers didn’t want the records simply for the sake of having them, but to obtain background information on targeted individuals.

“[The OPM breach] represents human targeting at its finest, understanding that people are our biggest security risk … our weakest link in the chain,” said Renee Bradshaw, manager of solutions strategy at NetIQ, the security portfolio of Micro Focus.

The method of attack followed a formula: Target a subcontractor in a social engineering attack and steal credentials to gain access to the network. Plant malware on a system and create a backdoor. Exfiltrate data for months, undetected. The level of poor security practices at OPM “was astounding,” including lack of consistent vulnerability scanning and two-factor authentication, as well as untimely patch management, said Bradshaw.

The OPM breach also emphasized organizations' vulnerability to social engineering. Government employees and contractors are now subject to security awareness training programs to learn about the dangers of spear phishing and other social media threats.

Vulnerabilities out of control

The attack against Hacking Team over the summer was an eye-opener. The Milan-based company developed and sold surveillance software to government agencies around the world. The company relied on zero-day vulnerabilities to develop software that was difficult to detect and could intercept communications. When an unknown individual released more than 400GB of data stolen from Hacking Team, including email communications, business documents, and source code, security researchers uncovered proofs-of-concept for three different zero-day vulnerabilities in Adobe Flash Player. While Adobe scrambled to fix the flaws as quickly as possible, cyber criminals were able to create exploits and use them in large-scale attacks.

“Hoarding zero-day exploits at both the national and private level is dangerous for everyone. We can’t expect to come out on top if we are sitting on these types of vulnerabilities,” said Tom Gorup, security operations leader at security consulting firm Rook Security.

Not reporting the vulnerabilities to the vendor for fixes means someone else can come along and find the same bug. If it was found in the first place, it stands to reason someone else will eventually find it, too. As Hacking Team learned the hard way, anyone can be breached. And once the vulnerabilities are public, everyone is at risk. Zero-day exploits are not like physical weapons in that the original owner has control over how and when it is used. The weapon can be used right back, with devastating consequences.

toc year in review 2015
“We need to refocus our cyber efforts to a defensive posture and let our infantry and airmen handle the offensive efforts,” Gorup said.
Government services leak too much info

As attacks against government agencies go, the IRS Transcript Service breach was small beans. Only 100,000 people had their information exposed through this breach, which is significantly less than the 21.5 million affected by the OPM breach. The attackers plugged in the victim’s name, address, and Social Security number into the IRS Get Transcript service to obtain detailed information such as income, employer name, and dependents.

More uniquely, attackers used legitimate services to convert basic personally identifiable information to determine detailed data that could be used to falsify tax returns and other forms of financial fraud. The same method can conceivably be used with the Department of Motor Vehicles' online renewal process or with a property appraisal site maintained by the county. With the information obtained through these services, identity theft becomes easier. It was especially effective, as attackers enjoyed a 50 percent success rate using the stolen data, noted Morey Haber, vice president of technology at BeyondTrust.

“Many sites like the Get IRS Transcript website exist all over the Internet for state, local, and federal governments. The IRS was an easy target, but so are the others,” Haber said.
Forget cars, what’s happening with airplanes?

Vehicular hacking burst on to the scene in 2015 and grabbed a lot of security headlines, but we should be worried about all the things we don’t know regarding attacks on airplanes. About the time researchers Charlie Miller and Chris Valasek were exploiting a Chrysler’s UConnect infotainment system to remotely control a 2014 Chrysler Jeep Cherokee, there were reports the group behind the OPM breach had successfully obtained records of origins and destinations of United Airlines passengers, as well as passenger manifests. Another group of attackers also disrupted the IT systems for LOT Polish Airways, which resulted in the airline canceling 20 flights and grounding 1,400 passengers.

Then of course there’s the FBI’s claim that security researcher Chris Roberts caused a plane’s engine to climb when he was poking around aircraft systems while on a United Airlines flight. The jury’s out on whether Roberts actually managed to take over the jet.

Should these attacks concern us? Are airplanes at risk? Both United and LOT have refused to provide any information on the issues.

“The scary answer here is that we don’t know, and that’s both surprising and unsurprising at the same time,” said Johnathan Kuskos, manager of the threat research center at WhiteHat Security.

There are two different types of attacks to worry about. One targets IT systems, such as the airline website and check-in kiosks at the airport. The other targets onboard systems that actually power and control the aircraft. The onboard systems tend to be heavily sandboxed and are locked down. IT systems are more at risk. And according to WhiteHat’s vulnerability statistics report, every online application has at least one serious vulnerability.

“It’s hard to imagine that a professional criminal syndicate or state-sponsored hackers haven’t targeted these major airlines yet,” Kuskos said.
Getting around Apple’s walled garden

Palo Alto Networks this year uncovered XcodeGhost, a malware attack that infected iOS applications and existed in the App Store for months before being detected. The attack relied on iOS developers downloading a compromised version of Xcode, the iOS dev kit. Compromising a toolchain is not a new attack method, and XcodeGhost was extremely successful at infecting developers on a wide scale. The real danger lies in what lessons the XcodeGhost team learned from its success and how it will try again.

The way the malware infected iOS apps before they were distributed into the App Store was completely new, said Ryan Olson, intelligence director at Palo Alto Networks. Developers are vulnerable and attackers can piggy-back on their apps into the App Store, past Apple’s vaunted security measures.

“While the XcodeGhost malware was not particularly dangerous, it was groundbreaking in the way it gained access to millions of devices,” Olson said.

XcodeGhost showed people that Apple’s walled garden can be breached and at a wide scale. It forced app developers to clean up their systems, re-issue their applications, and be better about where they get their developer tools. In order to defend against similar attacks, iOS developers need to understand their dev systems and apps are valuable to attackers looking for ways to target iOS users.

“XcodeGhost was the first truly widespread malware that impacted non-jailbroken phones, it was a massive eye-opener for iOS users who had previously thought they were invulnerable to attack,” Olson said.

Juniper’s unauthorized backdoor scandal
Juniper Networks recently uncovered unauthorized code in its Juniper NetScreen firewalls that could allow attackers to decrypt VPN traffic. The issue arose from the fact that Juniper used Dual_EC_DRBG, a known flawed random-number generator, as the foundation for cryptographic operations in NetScreen's ScreenOS. Juniper claimed it used additional precautions to secure the random number generator. It turned out the safeguards were ineffective.

The backdoor in Dual EC can be viewed as two parts, where one adds a second keyhole that overrides the normal lock on a door, and the other is a specific lock cylinder that fits that keyhole, Matthew Green, a cryptographer and assistant professor at Johns Hopkins University, wrote on Twitter. The attackers replaced the NSA-approved lock cylinder with their own lock cylinder. They wouldn’t have been able to replace the cylinder if the door hadn’t been modified with the keyhole in the first place.

In the end, someone somewhere was able to decrypt Juniper traffic in the United States and around the world. The matter is currently under investigation by the FBI.

“NSA built in a powerful eavesdropping backdoor. The attackers simply repurposed it by changing a few bytes of code,” Green said. “I’ll be honest, while I’ve been worrying about something like this for a long time. Seeing it actually happen is staggering.”

In light of the mounting pressure from government officials on the tech industry over encryption backdoors, what happened to Juniper is a clear example of how backdoors can be abused. 2016 will tell whether law enforcement and government will learn the lesson and back off on those demands.

Understanding 2015

It’s clear from looking at the attacks and breaches this year that the IT security industry is not well-positioned to defend itself. Knowing is half the battle, but there’s a long road ahead for organizations that don’t follow the basics of security best practices. “Security isn’t cheap, and when you’ve historically underinvested in security, what it takes to catch up in both technology investment and human capital is expensive,” said James Carder, CISO at LogRhythm and vice president of LogRhythm Labs.
Certkingdom 20% Discount Promotion Coupon Code: 45K2D47FW4

Wednesday, December 23, 2015

Network World’s 20 Best Products of 2015

Tough to choose
With so many great products on the market, it’s hard to pick the best ones. So we asked our experts, Network World’s independent product reviewers and bloggers to list their favorite products of 2015. What we got back was a list that covers the full spectrum of the networking world, with a little entertainment and gaming thrown in.

White-box switch
As major players in white-box networking, Accton and Cumulus Linux pose an existential threat to incumbent vendors of data center network hardware. The appeal is simple: Run open-source code on commodity hardware, and manage everything as you already do with your servers. It’s the same formula that defeated proprietary server vendors years ago, and there are reasons to believe that, at least in the data center, white-box will again triumph, this time over proprietary networking vendors. See David’s video review here.

Epson Workforce Pro EcoTank printer
It’s been a long time since I got excited about a printer, but I love the new Epson WorkForce Pro WF-R4640 EcoTank printer. Technically it’s an ink jet printer, but one that conquers most if not all of the disadvantages of that format. Unlike the tiny cartridges that most inkjets use, the EcoTank is loaded with what look like silver hospital IV bags. Once in place, they can print for over 20,000 brilliantly colored pages before needing replacement, and the ink is engineered to sit in the bags for at least three years. It’s also fast, printing 30 graphical pages in two minutes and 29 seconds. YouTube video of my speed test.

iPhone 6s
Like clockwork, Apple in 2015 managed to release yet another new iPhone jam-packed with new features. In addition to the usual smattering of spec enhancements, the iPhone 6s introduced us to 3D Touch, a new method of user interaction based on the amount of pressure applied to the touchscreen. The potential ramifications for 3D Touch are immense. Combined with faster Wi-Fi, a better camera, and enhanced Siri functionality, there’s no question that the iPhone 6s is not only one of the top products of 2015, but one of the most exciting iPhone releases in years.

Ironkey Workspace
The Ironkey Workspace W700 looks like a normal 64G key drive, but is actually an entire portable computer that exists completely on the stick. All it needs is any USB port on almost any device and a display to allow users to tap into its Windows 10 operating system. Once you have booted to the on-board OS, you can work just like normal on your chosen desktop with your installed programs. And the W700 is designed so that no trace of its presence is left behind on whatever system is being used as its temporary host. Finally, data at rest on the W700 is protected by XTS-AES 256-bit hardware encryption.

Steam In-Home Game Streaming
As a gamer, I spend a lot of time using the Steam Online Service where PC gamers can purchase, download and play the latest games on demand. The addition of the Steam In-Home Streaming service this year really blew me away. When you play a game using In-Home Streaming, video and audio are sent through your home network from your high-end gaming PC to another device. You can even play games that normally would not work on, say, an older laptop, because the main computer handles the load. Windows games even work with Mac OS X and Linux devices now too, so almost anything can become a supplemental gaming device.

Windows 10
Yes, the latest Windows has gotten a lot of dings over user privacy concerns, many of which are legitimate, but we still have to say that the OS deserves to be regarded as one of the best new tech products of the year. Microsoft gets kudos for listening to the public who signed up to test and give feedback on preview builds of Windows 10, which helped shape and refine the OS’s development. Thus, when the final version was released on July 31, most of what had gone wrong with Windows 8 was rectified: Microsoft ripped out the reviled Start Screen, restored and updated the classic Start Menu UI, and added two major features: The personal digital assistant Cortana, and a better web browser, Edge, to replace Internet Explorer. To top off all this good stuff, Microsoft gave away Windows 10 as a free, downloadable upgrade to any computer running a legit copy of Windows 8 or Windows 7.

Apple TV
With the fourth-gen Apple TV, Apple has finally released a set-top box that’s worth getting excited about. Sporting a number of compelling features, including Universal Search, a dedicated App Store, and a brilliantly intuitive Siri-enabled remote, the Apple TV may soon be the only device required for users to satiate their entertainment needs. It will only get better once developers start releasing more high-quality apps, and if Apple’s TV subscription rolls out in early 2016, as rumors have hinted. With cable costs now exorbitantly high, the value proposition provided by the Apple TV is now more attractive than ever before.

Sandisk USB flash drive
Released this summer, this flash drive is great if you use one of those lightweight, Windows notebooks that have an SSD, but which are only 64GB or 32GB. Just plug the SanDisk Ultra Fit into an available USB port on said notebook to gain additional storage for your large-sized personal documents and media files, and you can just leave this flash drive there. Because of its stubby-short form factor, the Ultra Fit sticks out just a little from the edge of your notebook, so it probably won’t break off or otherwise become unattached when you stow away your notebook into a backpack, bookbag, purse, or carry-on. When it was first released, the 128GB version retailed for $120, but now you can buy it for less than $30. The Ultra Fit also comes in 64G, 32G and 16GB sizes. It supports USB 3.0 and transfers data at a rate of 130MBps.

Cloudready
Have an old desktop or notebook sitting around that you’re not using? You can (possibly) turn it into an ersatz Chromebook or Chromebox by installing CloudReady. (“Possibly” because CloudReady may not work on computers with technical components that are older than 8 years.) CloudReady is built from Chromium OS, the open-source code release of Chrome OS. Developed by Neverware, it was released in February. CloudReady can be run directly from a USB flash drive, but it’s recommended that you install it onto the computer’s hard drive for better performance. There are some limitations; it doesn’t support audio in MP3 format, or video encoded in H.264 or MP4. Still, CloudReady made its mark in 2015 as an intriguing way to turn an old computer into an Internet-connected client. You can use it for free as an individual; businesses and schools are asked to pay. Neverware intends to make their money by selling enterprise and education licenses, and providing technical support.
hMailServer
See larger image
hMailServer

HMailServer is an open source mail server for Windows. Unlike overly complex commercial products, hMailServer occupies a small footprint, and works reliably from the moment it’s fired up until you stop it or the hardware fails. Did I mention it’s open source software and therefore, free? I use hMailServer in production at our data center, and after a lot of initial configuration to get spam checking going, and other important rules established, it has been running flawlessly for four years and counting. I needed some custom rules and these were simple to write in VBScript, which hMailServer supports. Plus the documentation and forum support are great.

IPCop
I’ve grown attached to IPCop, an open source Linux-based stateful firewall that’s been around since 2004. Even though we’re a Windows shop, there aren’t many good, inexpensive, non-OEM gateway products for Windows. But lacking a Windows-based version of IPCop isn’t an issue, since we use it as a dedicated gateway between our home office and the Internet. Configuration takes a bit of work, but once configured, this product is a workhorse that never quits. We bounce the server every once in a while to clear buffers and just because it’s a good practice, but it’s easy to forget to do this because it works so flawlessly. I love the easy web GUI (only available on the internal subnet of course).

MacBook
In a year when Apple, Microsoft, and others highlighted new tablets that double as laptop replacements, Apple introduced an unapologetically pure laptop with a real keyboard and an innovative “force-touch” trackpad instead of a touchscreen. The MacBook’s retina screen is smaller than an iPad Pro’s, and it runs Mac OS X, not a mobile or hybrid OS. Plenty of people still need a real laptop to do real work, and the new MacBook puts to shame the MacBook Air—and will likely soon become ubiquitous in cafes and coffeehouses everywhere.

AWS Snowball
As the cloud becomes more and more mainstream, companies increasingly want to do more than run new jobs in the cloud – they want to migrate existing workloads and databases into the cloud. But that can take days or weeks and cost a lot of money. That’s why Amazon threw in Snowball, a 47-pound ruggedized storage appliance designed to take care of the entire process in one fell swoop. Each Snowball holds up 50 TB of data and includes automatic encryption, and you can rent one for as little as $200 per job. Plus, it looks totally awesome.

Facebook M
Facebook M, the company’s new virtual assistant for its Facebook Messenger system, is a lot more than a challenge to Apple’s Siri, Google Now, and Microsoft’s Cortana. This bold hybrid of human and artificial intelligence is designed to do just about everything for users, including many of the things software alone still struggles to accomplish. Just as important, the service—now in private beta for a few thousand lucky Bay Area users—is intended to serve as a training ground to help software learn to solve those issues on its own without human help.

Google OnHub router
Before the Google OnHub, wireless home routers were frustrating during setup and even more maddening when they broke. With more and more home devices connecting to the Internet, the router is increasingly important. Designed with 12 dual-band antennas, plus one to manage traffic, Google’s OnHub router reliably delivers fast and long-range connectivity even in radio signal-congested urban environments. An Android or iOS app simplifies setup, approaching an almost plug-and-play experience. The device also houses radios for Bluetooth, Smart Ready, 802.15.4, and Weave, which Google can make use of with over-the-air updates.

Docker
Enterprises facing digital disruption are fighting back with Docker, an open standard implementation of Linux containers. It bundles an application with all of its code libraries and executable files, isolating it from the OS and other applications. It removes the friction between development, test, and deployment. Before releasing version 1.0, it recorded the strongest buying intention score in the last six years, according to a survey (PDF) of 685 CIOs by ETR. Docker lets enterprises run private and public clouds like platform companies Google, Salesforce, and Airbnb do.

360 Total Security Essentials
Free antivirus programs often require users to create a membership, or bombard them with pop-up windows pestering them to upgrade to the paid version. Often, the free price tag simply isn't worth the headache. 360 Total Security Essentials doesn't require you to log in to an account. No popups nagging you to upgrade. It's small and unobtrusive and doesn't slow your system at all. In tests, it found Trojans hiding on multiple systems. And it updates regularly and doesn't hit you with false positives.

Wise Care 365
There are lots of system maintenance utilities, but I've found Wise Care 365 to be the more effective and most comprehensive. It combines a bunch of individual utilities from WiseCleaner into one product. It does a great job of keeping your system clean, running daily checks for junk files, cleaning the browser cache, optimizing boot speed, and fixing the Registry. But Wise provides a ton of extra utilities as well, including a very good memory optimizer (often freeing up to 1GB of memory), has secure delete, a program uninstaller, secure erase, file search and hiding folders and more. For $29.95, this is a steal.

Western Digital 6TB My Cloud
This one’s a little dangerous. It’s a 6TB external drive appliance that’s USB3 connectable to your personal desktop or notebook—or even server-- if you must, but why not use its Gigabit Ethernet jack? It warns you that its “embedded” certificate is bad. Why do you care? Because you can hit this drive across an ocean at whatever link speed you can muster. It swallows files without complaint and it’s been seen in refurbished editions for well under $200. It’s every Data Loss Prevention Specialist’s rogue nightmare. I love it. Sitting in a Wi-Fi Hotspot in Istanbul, I could take my photos and send them to the lab in Indiana in about three clicks and a drop. Yes, it’s your own personal gargantuan disk resource, and you can access it via your smartphone. It’s a share on your NetBIOS network, too. It has horrific user security, in my opinion, but it’s become a huge storage pit of photos, old ISO images, and more. I’m not quite embarrassed that I own it.

VMware Fusion 8 For Mac
We reviewed this Type 2 Hypervisor for Mac and really liked it. It does some fairly unique tricks, and you get still more if you’re heavily invested in the VMware ecosystem. If you use VMware’s vCenter, Fusion for Mac 8 becomes an alternative to a browser remote control launch (VMRC) of VMs located within a VMware ESXi infrastructure. It’s a DevOps and infrastructure engineer’s delight. Click on a VMRC link within VMware vCenter and suddenly, Fusion is doing the VDI/remote control for the VM hosted in our data center. Have a bunch of VMs? Open them up and tab among them to watch interactions. No fussy multiple browser windows, just Fusion managing things in the place of VMware’s usual browser window madness. There is a limit to the number of VMs you can open up this way. If you’re a VMware geek, infrastructure construction artist, coder/developer/QA person, it’s a startlingly handy hypervisor.


Sunday, November 29, 2015

Its public cloud soon gone, HP aligns with Microsoft Azure

HP will be a preferred provider of Microsoft's Azure services, Meg Whitman says

Hewlett-Packard Enterprise has partnered with Microsoft to offer its Azure cloud services to customers, filling a gap when HPE closes its own public cloud early next year.

Microsoft will be a "preferred" public cloud partner to HPE, and HPE will become a "preferred provider" of Microsoft Azure services, CEO Meg Whitman said on HP's quarterly earnings call Tuesday. She didn't provide details but said they'll be forthcoming at HPE's Discover conference in London next month.

It's no surprise to see HPE cut its first cloud deal with Microsoft rather than Amazon or Google. The companies work closely in servers and PCs, and they're both trying to sell customers a mix of on-premises and cloud products.

"Microsoft shares our view of a hybrid IT approach for enterprises," Whitman said.

It's likely the deal won't preclude HPE from partnering with Amazon or Google in future, either.

Still, it's the first concrete example of how HPE will fill its customers' need for cloud services, after announcing it will retire its Helion public cloud on Jan. 31.

HPE is pursuing a similar cloud strategy to Dell, which is also working primarily with partners. IBM and Oracle, on the other hand, are building out their own public clouds.

Dell also sells infrastructure appliances that come pre-installed with Microsoft's Azure software. The pitch is that it gives companies the flexibility of a cloud infrastructure in their own data centers. HP might offer something similar, though that could compete with its own cloud software.


Saturday, November 21, 2015

74-343 Managing Projects with Microsoft Project 2013


QUESTION 1
You use Project Professional 2013 to manage a project that has customer-required milestone
completion dates. You need to see graphically that your milestones have slipped beyond your
customer-required dates. What should you add to the project milestones?

A. a Must finish on constraint
B. a finish date
C. a deadline
D. a Finish no later than constraint

Answer: C


QUESTION 2
You manage a project by using Project Professional 2013. Your project is updated with changes to
the baseline for selected tasks. You back up your project fife before you start your next tracking
cycle. After completing the tracking cycle, you notice that the baseline duration values on some
of the summary tasks are not correct. You need to correct these values before re-entering the
tracking data. You open the backed up version of the project schedule. What should you do next?

A. Manually update the summary tasks with the new duration values.
B. Reset the summary tasks to manual scheduling.
C. Ensure the tasks durations are of the same denomination values. Then reenter the tracking data.
D. Reset the baseline checking the Roll up baselines to all summary tasks option. Then reenter
the tracking data.

Answer: D


QUESTION 3
You are a program manager. Your project managers use Project Professional 2013 to manage
projects. The project managers want to utilize the same resources across their projects. You need
to combine the projects, as well as the project resources, to see allocations across the projects.
What should you do?

A. Copy and paste all resource assignments into a Master file.
B. Share resources from an external resource pool.
C. Create a Master project and insert subprojects by using Link to project.
D. Open all projects in a new window.

Answer: B


QUESTION 4
Your company uses Project Standard 2013 to track project progress. You need to accurately
calculate cost performance index (CPI) as a health indicator. Which three actions should you
perform? (Each correct answer presents part of the solution. Choose three.)

A. Ensure there is a value in the Status Date field.
B. Ensure there is a value in the Standard Rate field.
C. Ensure Task Dependencies exist in the schedule.
D. Enter actual progress information.
E. Level resources within available slack.

Answer: ABD


QUESTION 5
You are a project manager who uses Microsoft Excel 2013. Your company decides to migrate all of
the current projects in Microsoft Excel 2013 to Project Professional 2013. They allow all
employees to spend 8 hours migrating each project plan. Your current and unique project plan
has 462 tasks with duration in days, and resources have been assigned and named. You have a
status meeting in two days. You need to provide your project's information by using Project
Professional 2013. What should you do?

A. Create a new project plan in Project Professional 2013 and use the Gantt Chart Wizard to
import from an Excel Workbook.
B. Rename the Excel file from .xlsx to .mpx, and open it by using Project Professional 2013,
activating the Mapping Excel Workbook feature. Map tasks, durations, and resources
assigned into Microsoft Project fields.
C. Open the Excel File .xlsx directly from Project Professional 2013, which will convert and map
tasks, durations, and resources assigned into Project fields.
D. Create a VBA macro by using the Excel Record Macro feature to import all tasks, durations,
and resources assigned from Excel into your new Project Professional 2013 project plan.

Answer: C

Friday, October 30, 2015

644-906 Implementing and Maintaining Cisco Technologies Using IOS XR - (IMTXR)

QUESTION 3
What is the maximum long-term normal operating temperature of the Cisco CRS-1, ASR 9000
Series Routers, and XR 12000 Series Routers?

A. 40C (104F)
B. 50C (122F)
C. 55C (131F)
D. 65C (149F)

Answer: A

Explanation:


QUESTION 4
The Cisco CRS 16-Slot Line Card Chassis Site Planning Guide suggests having 48 inches of
clearance behind the chassis. What would definitely happen to the system if there were only 28
inches of clearance behind the Cisco CRS 16-Slot Line Card Chassis?

A. The system would overheat due to inadequate airflow.
B. The fabric card could not be exchanged if one failed.
C. The modular services card (MSC) could not be exchanged if one failed.
D. The fan tray could not be exchanged if one failed.

Answer: D

Explanation:


QUESTION 5
How many planes are there in the Cisco CRS-3 switch fabric?

A. 1
B. 3
C. 7
D. 8

Answer: D

Explanation:


QUESTION 6
What is the cell size of the cells that traverse the switch fabric on the Cisco CRS-3?

A. 128 bytes
B. 136 bytes
C. 144 bytes
D. 200 bytes
E. 288 bytes

Answer: B

Explanation:


QUESTION 7
Where are client interfaces terminated on the Cisco CRS-3?

A. the modular services card
B. the physical layer interface module(s)
C. the switch fabric interface terminator
D. the Service Processor 40
E. the Service Processor 140

Answer: B

Explanation:


QUESTION 8
In order to determine the hardware and firmware revision of a linecard, what is the correct
command that should be invoked?

A. RP/0/RP0/CPU0:CRS-MC#show version
B. RP/0/RP0/CPU0:CRS-MC#show platform
C. RP/0/RP0/CPU0:CRS-MC(admin)#show platform
D. RP/0/RP0/CPU0:CRS-MC#show diagnostic summary
E. RP/0/RP0/CPU0:CRS-MC(admin)#show diag details

Answer: E

Explanation:


QUESTION 9
In which mode can you check the power usage of a chassis?

A. in EXEC mode
B. in admin mode
C. in both EXEC and admin mode
D. in ROMMON mode
E. in environmental mode

Answer: B

Explanation:

Wednesday, October 7, 2015

CAS-002 CompTIA Advanced Security Practitioner (CASP)


QUESTION 1
An attacker attempts to create a DoS event against the VoIP system of a company. The attacker uses a tool to flood the network with a large number of SIP INVITE traffic. Which of the following would be LEAST likely to thwart such an attack?

A. Install IDS/IPS systems on the network
B. Force all SIP communication to be encrypted
C. Create separate VLANs for voice and data traffic
D. Implement QoS parameters on the switches

Answer: D


QUESTION 2
Joe, the Chief Executive Officer (CEO), was an Information security professor and a Subject Matter Expert for over 20 years. He has designed a network defense method which he says is significantly better than prominent international standards. He has recommended that the company use his cryptographic method. Which of the following methodologies should be adopted?

A. The company should develop an in-house solution and keep the algorithm a secret.
B. The company should use the CEO’s encryption scheme.
C. The company should use a mixture of both systems to meet minimum standards.
D. The company should use the method recommended by other respected information security organizations.

Answer: D


QUESTION 3
A small company’s Chief Executive Officer (CEO) has asked its Chief Security Officer (CSO) to improve the company’s security posture quickly with regard to targeted attacks. Which of the following should the CSO conduct FIRST?

A. Survey threat feeds from services inside the same industry.
B. Purchase multiple threat feeds to ensure diversity and implement blocks for malicious traffic.
C. Conduct an internal audit against industry best practices to perform a qualitative analysis.
D. Deploy a UTM solution that receives frequent updates from a trusted industry vendor.

Answer: A


QUESTION 4
An administrator wants to enable policy based flexible mandatory access controls on an open source OS to prevent abnormal application modifications or executions. Which of the following would BEST accomplish this?

A. Access control lists
B. SELinux
C. IPtables firewall
D. HIPS

Answer: B


QUESTION 5
Company XYZ has purchased and is now deploying a new HTML5 application. The company wants to hire a penetration tester to evaluate the security of the client and server components of the proprietary web application before launch. Which of the following is the penetration tester MOST likely to use while performing black box testing of the security of the company’s purchased application? (Select TWO).

A. Code review
B. Sandbox
C. Local proxy
D. Fuzzer
E. Port scanner

Answer: C,D


QUESTION 6
A developer is determining the best way to improve security within the code being developed. The developer is focusing on input fields where customers enter their credit card details. Which of the following techniques, if implemented in the code, would be the MOST effective in protecting the fields from malformed input?

A. Client side input validation
B. Stored procedure
C. Encrypting credit card details
D. Regular expression matching

Answer: D

Sunday, September 27, 2015

What after CompTIA A+ Certification

It’s a big world we live in and it is completely up to you where you would like to route your career after being a CompTIA A+ Certified Technician. Your geographic location plays a vital role in this. The competition for entry level technical positions is much more fierce in cities where population is high. The CompTIA A+ certification not only will give you a sound edge over others in this competitive world, but also will give you an opportunity to add more certifications to your name.

Here are some of the common jobs that use CompTIA A+ certification:
Technical support specialist
Field service technician
IT support technician
IT support administrator
IT support specialist
Help Desk and Customer Service
Computer Manufacturer

Although the above list seem to be small, still there are endless opportunities for a A+ Certified Technician. Nowadays, specialized training and skills are in huge demand. Some areas worth mentioning are as:

Personalized Training: Teaching users how to use applications, prevent loss of data and not be a victim of cyber-crimes.
Computer Forensics: Due to increase in identity theft, the need for people to analyse data in an encrypted way is a must.
Backup & Recovery: How to recover your data if you forget to back-up your files.
Large Scale Database Management Systems and Very Large Scale Database Management Systems (LSDBMS & VLSDBMS): Commonly known as terabyte data ware housing.

Once you become a CompTIA A+ certified technician, you can redirect your career path in any way you would want to. The various paths that you can tread on would be:


Administration: Providing network support, configuring routers and managing user accounts on the corporate servers.
Development: Design the companies web presence and intranet and manage it on aregular basis.
Hardware: From repairing simple computers to manufacturing high-end workstations and servers.
Technician: Pass the Net+ exam thus leading to installing network cabling, supporting corporate end users and managing the corporate desktop.

As you can clearly see that there are numerous possibilities for a CompTIA A+ Certified technician. But this is only a small piece of the whole cake. You can combine multiple other certifications and direct your career in a whole new direction.

The world of Information technology has huge innovations and prospects in this ever changing industry and the CompTIA A+ certification that you have acquired will always remain a solid foundation for you to build on.


Tuesday, September 22, 2015

CompTIA Project+ Certification Training

There are a variety of certifications available to and benefiting today's IT project manager. Some test the more technical aspects of information technology projects while others test general project management skills as they relate to any industry. The CompTIA Project+ certification allows project managers or those in related roles in the IT industry to acquire a project management credential in relatively short amount of time and with no prerequisites or post-certification continuing education requirements.

This certification tests project management skills for those with at least 12 months of experience participating in or leading projects with a technical component. The exam tests project proficiency in business, interpersonal and technical aspects.

Who should pursue the CompTIA Project+ certification?

The required year of project experience can come in almost any role; example titles might include project manager, business analyst, or project team member. Professionals that are interested in working for companies such as Xerox Analyst Services, BT Global Services or Computacenter would be well-suited to pursue the CompTIA Project+ certification; these and similar firms offer positive testimony on the CompTIA website regarding the confidence they have in the talent of CompTIA-certified professionals.

Because the CompTIA Project+ certification generates exam questions based on industry-wide analysis and survey research, these companies can feel confident in hiring CompTIA certified professionals. Additionally, CompTIA offers vendor-neutral project management certification which allows employers to hire based on skill, regardless of project management software or product experience. Other companies that look specifically for CompTIA certified professionals include Canon, Dell and HP.

The CompTIA Project+ certification process

Unlike some project management certifications, the Project+ credential does not require the candidates apply for or demonstrate exam prerequisites. In part, this is why CompTIA's certification can be earned at a faster pace than other project management credentials. Once an IT professional decides to pursue the CompTIA Project+ certification, the remainder of the certification process looks essentially like this:

Train and prepare for the exam. A wide variety of training methods exist for CompTIA Project+ candidates. Instructor-led classroom study, independent computer-based study, and CompTIA's own eLearning courses are all widely offered. Example exam questions can even be downloaded from the CompTIA website.

Purchase an exam voucher and register. Once candidates finish preparing for the exam, they'll need to purchase an exam voucher. For U.S. candidates and CompTIA members, the exam is $209. For non-members the exam is $246. The voucher is used in registering for the exam. CompTIA Project+ exams can be taken at Prometric and Pearson VUE testing centers.

Take the exam. An exam "blueprint" is available on the CompTIA website. The exam requires candidates to complete 80 questions in 90 minutes. Question formats include multiple-choice, multiple-response and drag-and-drop items. Exam questions cover four project management domains, each covering a different percentage of the exam:
Project initiation and scope definition--20%
Project planning--30%
Project execution, control and coordination--43%
Project closure, acceptance and support--7%


Tuesday, September 1, 2015

Wi-Fi blocking debate far from over

$750K fine levied against Smart City by FCC for WiFi blocking has WLAN pros, vendors talking again

Following the FCC’s warning in January that it would no longer tolerate the Marriotts of the world blocking visitors’ WiFi hotspots, I set a reminder on my calendar to revisit the topic six months later. After all, the issue of WiFi blocking sparked strong reactions from IT pros, end users and vendors of wireless LAN products early in the year, and I figured it wasn’t over yet.

So I started by making an inquiry directly to Marriott Global CIO Bruce Hoffmeister, who foisted me on to a company spokesman, who “respectfully declined” to connect me with anyone for an update on how Marriott is now dealing with perceived threats to its network. He simply directed me back to Marriott’s statement from January that it would behave itself, no doubt hoping the hotel chain could further distance itself from the $600K fine that the FCC hit it with, as well as the rest of the bad publicity. I also inquired at the FCC, which in Marriott-like fashion, referred me back to the agency’s last statement on the matter from January, and in a follow up, said it can’t comment on whether any new investigations are underway. Most of the WLAN vendors and administrators were pretty quiet, too when I made the rounds a few weeks back.

While all this was demoralizing, my intuition about this story still having legs was validated last week (while I was on vacation, of course) when the FCC slapped an Internet service provider called Smart City with a $750,000 fine for pulling a Marriott at several locations and blocking personal WiFi hotspots. Smart City was found not be protecting its network against any specific security threat, but rather, trying to force people to pay for its Internet service.

So despite Marriott’s best efforts, the hotel chain’s past shenanigans were dredged up again in coverage of the Smart City story. Because now all of a sudden, everyone’s talking again.

One vendor spokesman expressed surprise that the FCC had once again levied a big fine on a WiFi blocker: “Trying to control and govern the unlicensed spectrum is a tall order, especially in venues and public areas."

One university network architect, Lee Badman, published an open letter to the FCC on his blog following the FCC's Smart City order in which he says “as a WLAN professional I implore you to recognize that these actions are creating significant amounts of confusion for enterprise Wi-Fi environments and those of us who keep them operational for the millions of business clients that use them every day.” He goes on to list 5 big questions hanging over the WLAN space in the wake of the latest FCC ruling on WiFi blocking.

Among the things Badman’s peers are worried about or are wondering about:

*Does using frequency blocking material in building design constitute WiFi blocking in a passive way?

*Does getting end users to agree to acceptable use policies (AUPs) protect WLAN operators from getting busted for WiFi blocking?

*How can the de-auth/mitigation tools sold by WLAN vendors be used legally?


Some users would also like to see WLAN vendors band together and get clearer answers about what customers can and can’t do in terms of WiFi security and management. And in fact, some vendors have been working at least in the hospitality industry to come up with best practices for successful WiFi deployments. The Hotel Technology Next Generation association, which includes Marriott among its members, issued a WiFi roadmap in April, that while only touching on the topic of blocking tools, looks like it has some potential to help organizations stay on the right side of the law. (Meanwhile, the American Hotel & Lodging Association, a hospitality industry group that sided with Marriott’s right to block users of personal Wi-Fi hotspots, claims to have formed a Cybersecurity Task Force but did not reply to my inquiries earlier this month about whether the task force has in fact been formed or accomplished anything yet.)

Apple's deal with Cisco will lay out a red carpet for critical iOS apps
Buckley suggests that the FCC should allow Wi-Fi blocking at least in the interim, and then “re-open the discussion on the use of this technology and clarify when its use is practical and acceptable. Wi-Fi vendors also need to collaborate to come up with better security mechanisms in public Wi-Fi networks.” He acknowledges that the topic is complicated given that we're talking about unlicensed spectrum that's free for anyone to use.

Xirrus is especially passionate about K-12 schools being able to use WiFi blocking (rogue AP protection/mitigation) to protect students from accessing unfiltered Internet content – protections that the schools have put in place to comply with federal laws designed to safeguard children. Though Buckley says this could also apply to public access Wi-Fi environments, such as cafes, airports and public libraries where you don’t want people potentially “displaying illicit content on their devices” in full view of others.

Buckley stresses that one reason public WLAN operators need to be able to have security tools such as WiFi blocking at their disposal is because such networks can attract schemers who set up bogus hotspots to lure unsuspecting users, say those in a hotel lobby or convention center, to share sensitive personal information. One question then becomes whether a hotel not blocking WiFi could get sued for a guest getting phished after logging onto what he or she thought was the hotel’s network.

While Buckley would very much like to see further dialogue with the FCC take place, Xirrus isn’t waiting around for that to happen either. He says that in a few weeks the company is coming out with technology that will greatly bolster public WLAN network security. “WiFi blocking is another tool that can be used to protect users, but let’s not forget that security is all about defense in depth. You can’t rely on just one layer.”

Monday, August 24, 2015

IDF 2015's coolest demos

IDF 2015's coolest demos
Every year at the Intel Developer Forum Intel and its partners showcase the latest technology with some outstanding exhibits. These are the best of what we found.

The best of Intel Developer Forum 2015
Each year, Intel holds its Developer Forum to lead the PC industry into the direction Intel wants it to go: powerful new PCs, connected devices, touchscreens, and the like.

Well, a bunch of stale PowerPoint foils won’t do the job. So Intel and its partners seed IDF with some amazing, awe-inspiring demos, all in a bid to get the developer community behind this year’s technological focus. What sort of demos, you ask? We have some of the best in the following pages.

SPIDER!
This little beauty graced Intel chief executive Brian Krzanich’s keynote, along with its smaller cousins right behind it. Intel believes its future is in the Internet of Things, and this spider robot is powered by embedded Intel chips.

Intel's WiGig "wire-free future"
Part of Intel’s Skylake vision is a “wire-free” PC: connected by Wi-Fi, charged by Rezence wireless charging, with images sent to a monitor either by WiGig or WiDi.

What’s the difference? What can WiGig do that WiDi can’t?
In Intel’s world, WiDi is designed for the living room, while WiGig is a high-bandwidth connection for your office. In a demonstration, a Dell notebook seamlessly connected to a WiGig dongle attached to an HP NUC. The connection held while the executive walked the notebook walked the notebook about 40 feet away. When he returned, the notebook seamlessly reconnected.

Rezence Wireless Power
What do the guts of a Rezence wireless charging pad look like? Well, this.

Unlike Qi, Intel says that a Rezence pad can be mounted underneath a desk, transmitting power through an inch or two of wood. While you don’t have to align a notebook perfectly to charge it, you do have to get it pretty close, at least according to the demo I saw.

Intel WiDi
Not to be outdone, Intel also had a Wireless Display (WiDi) exhibit in its booth, with a tablet running a custom app that the company developed. Next year, WiDi will support 4K via Miracast.

The problem with WiDi has been latency—meaning that it works best with streaming video. It’s not perfect; there still were a few hiccups in places. But unlike past generations, the new WiDi technology compresses the video on the tablet, then sends it over the wireless link. The demonstration also took place on a show floor, which isn’t an ideal place to demonstrate new technology.

Fallout PC
During Intel’s gaming PC session, the company presented a showcase of custom case designs, all housing a Skylake CPU inside. This Fallout-themed mod was one of our favorites.

Lego PC
Computer builder Mike Schropp built this PC entirely out of Legos—not the only PC modder at IDF to attempt this, by the way.

Compact PC
Intel had a collection of small, compact PCs in its booth, most using passive cooling in place of a fan. Note the massive antennas emerging from the back, to provide better wireless reception.

A Nexus Q?
Is this the Google Nexus Q, back from the dead? Nope! Just another compact PC.

Food Network Gesture Recipes
Who knew? If you visit the Food Network’s Web site, which has been optimized for the Intel RealSense camera, you can scroll hands-free without needing to touch the screen. That’s great when your hands are all gloppy after mashing avocados.

(Be warned, howvever—you have to download a massive SDK package to enable this on your PC.)

Core i7 Extreme Edition
It wouldn’t be an Intel Developer Forum without a Core i7 Extreme Edition playing a 4K version of the indie hit, Rocket League.

Intel True Key
One of the benefits of buying a PC with an Intel RealSense camera installed (to enable Windows Hello) is that you can sign up for Intel True Key, a free service from Intel’s McAfee security division. Like Hello, True Key lets you unlock your PC using facial recognition.

Both Windows Hello and True Key also use your face as your identification around the Web. But Hello’s related Passport technology doesn’t send a password to sites like Facebook; True Key does. Or, to be more specific, True Key uses a password generator to output a complex password to your bank or Web site, then sends it after your facial identification gives it the go-ahead.

Intel True Key 2
If you don’t regularly use the computer or tablet, True Key will ask you for a second form of authentication, sending you a code to your phone to serve as an additional means of security.

Thunderbolt 3
For the first time, the Thunderbolt technology finally seems useful. Not only does it run at a whopping 40Gbps, but it will share a connector with USB-C. Look for USB-C/Thunderbot to share connectors on more PCs going forward.

Aleutia Copper-Coated PC
Aleutia manufactures fanless PCs, the latest of which is shown here. And yes, that copper-looking core is indeed copper, an excellent thermal conductor that, incidentally, is selling for its lowest price in ten years. These fanless PCs are being sent to Africa, where they’re designed to serve as rugged low-cost PCs for the Third World.

Skylake Tower
Intel also had a pair of desktop systems running Skylake, including this NZXT PC with 6th-generation Core i7 inside, on top of an ASRock Z170 Extreme 7+ motherboard.

Skylake Data
Right next to the tower was a similar Skylake system, but running the CPU-Z freeware utility, to show what was inside.

Intel RealSense smart mirror
Intel had several exhibits showing off the power of its RealSense camera, including this “smart mirror” that projected an overlay over the image of the viewer.

Savioke RealSense Robot
This robot from Savioke is designed to roam through a hotel or a conference center, dodging crowds in its quest to bring a user a cold drink, a toothbrush, or some other sundry object that it can put in its hopper. It uses the Intel RealSense camera to navigate.

It's a Shark Camera!
Because it makes sense to put a camera in an inflatable, fan-propelled shark. Naturally.

Lego Future Lab, and RealSense
The Lego Future Lab showed off a cool prototype game where a user could scan in some household objects, then the software would “Lego-ify” them. A minifig could then roam around....this cat statue thing.

Miniature Battlebots
No, there weren’t any chopping blades or flamethrowers. But if you wanted to try your hand at flipping a rival robot over, this was the place to come.

Intel Greenhouse
In Intel’s world of the Internet of Things, an ecosystem of sensors connects to Intel’s Curie embedded processor. In this case, sensors inside the greenhouse help determine whether the fan needs to run to cool the interior.

Gah! More Intel spiderbots!
One of Brian Krzanich’s more esoteric powers is the ability to contol spiders—robot spiders, that is. During the keynote, he wore a special bracelet that the spiders were keyed to—when Krzanich lifted his arm, the spiders responded. These little guys were crawling around a special pen in the lobby.

Skylake supports 12K! ('cause 4K x 3 = 12K right?)
Intel’s new Skylake processor takes the multipanel display properties to new heights. What you’re seeing here is three 4K displays running off a single Core i7-6700K chip. The two UHD 4K on the left are being off of DisplayPort 1.2 while the UDH 4K panel on the right is running on HDMI 1.4 at 30Hz. Skylake is capable of driving all three streams at 60Hz, but the motherboard the demo was running on didn’t have the ports to support it. And, no it’s not really technically 12K but that’s what everyone will call it.

USB-C in the house
It’s true, it’ll soon be time to junk all those micro-USB cables. This nifty AFT card reader is USB-C based and has two USB 3 ports on front too.

Skylake can push 4K raw video, too...
Skylake features fixed function 4K procesing support and in this demo, a Core i7-6700K is playing a 4K RAW video file from a Canon camera without dropping frames and with minimal CPU load.

Image courtesy Gordon Mah Ung
We shot the computer’s task manager as it played a 4K resolution RAW video on Intel’s new Skylake Core i7-6700K CPU. CPU utiliziation was usually 5 to 7 percent or lower. By comparison, a machine next to it playing the same video without using the new Skylake 4K fixed function units to help continually dropped frames, and used 70 to 80 percent of the CPU cycles just to play the file. Another interesting thing to note: This 4K RAW video file is pushing nearly 500MB/s off the SSD. That’s a lot of data being read.

RealSense in a phone!?
Already in super thin tablets, Intel showed off a reference design phone with a RealSense camera integrated into it. The phone shown here is being used to scan some 3D objects...

Why buy toys when you can scan them?
...and here’s the finished product. After moving the phone around the toys and scanning them with the RealSense camera, the phone was able to create a 3D scene that could be rotated and zoomed in and out.

Need for speed?
AFTech’s Blackb1rd lets you run two standard SATA drives in RAID over its USB 3.1 USB-C connection. By our estimates, that’ll use all of USB 3.1’s 10Gbps throughput if the controller in this cabinet and the motherboard can hit the full speed. In other words, we need more speed already. Thunderbolt 3, perhaps?




Monday, August 17, 2015

Top 10 technology schools

Interested in going to one of the best colleges or universities to study technology? Here are the top 10 schools known for their computer science and engineering programs.

Top technology schools
Every year, Money releases its rankings of every college and university in the U.S., and not surprisingly, a number of those top schools are leaders in the tech space. Here are the top 10 technology schools, according to Money's most recent survey of the best colleges in America.

Stanford University
First on the list for not only technology colleges, but all colleges, Stanford University has an impressive 96 percent graduation rate. The average price for a degree is $178,731 and students earn, on average, $64,400 per year upon graduation. Stanford's global engineering program allows its 4,850 students to travel around the globe while studying engineering. There are nine departments in the engineering program: aeronautics and astronautics, bioengineering, chemical engineering, civil and environmental engineering, computer science, electrical engineering, management science and engineering, materials science and engineering, and mechanical engineering.

Massachusetts Institute of Technology
The Massachusetts Institute of Technology, located in Cambridge, Mass., is the second best technology school in the country, with a 93 percent graduation rate. The average net price of a degree comes in at a $166,855, but students can expect an average starting salary of $72,500 per year after graduating. As one of the top engineering schools, it's ranked number 1 for chemical, aerospace/aeronautical, computer and electrical engineering. The top employers for the 57 percent of graduates that enter the workforce immediately include companies like Google, Amazon, Goldman Sachs and ExxonMobil. Another 32 percent of students, however, go on to pursue a higher degree.

California Institute of Technology
Located in Pasadena, Calif, the California Institute of Technology has a graduation rate of 93 percent. The average cost of a degree is $186,122, and students earn an average starting salary of $72,300. CalTech, as it's often called, has departments in aerospace, applied physics and materials studies, computing and mathematical sciences, electrical engineering, environmental science and engineering, mechanical and civil engineering, and medical engineering. The prestigious college is also home to 31 recipients of the Nobel Peace Prize.

Harvey Mudd College
Harvey Mudd College in Claremont, Calif., has a strong technology program, putting it at number 4 on the list of top technology schools. The cost of tuition is also one of the highest on this list, at $196,551 for a degree. Graduates of Harvey Mudd earn an average of $76,400 early on in their careers and the graduation rate is 91 percent. The engineering program at Harvey Mudd College focuses on helping students apply their skills to real world situations. Students can get professional experience and help solve design problems outside of the classroom through an engineering clinic.

Harvard University
Harvard University, located in Cambridge, Mass., technically ties with Harvey Mudd for top technology schools, and top overall colleges. The graduation rate is 97 percent and the average price of a degree is $187, 763 while graduates earn an average annual salary of $60,000 when starting their careers. In the Jon A. Paulson School of Engineering and Applied Sciences at Harvard, which goes back as far as 1847, undergraduate students can study applied mathematics, biomedical engineering, computer science, electrical engineering, engineering sciences and mechanical engineering.

University of California at Berkeley
The University of California at Berkeley has a graduation rate of 91 percent, and students can get a degree for around $133,549. After graduation, the average salary for students starting out their careers is $58,300 per year. The electrical engineering and computer science division of the University of California at Berkeley has around 2,000 undergraduate students and is the largest department within the university.

University of Pennsylvania
University of Pennsylvania, located in Philadelphia, Penn., has a graduation rate of 96 percent and the average cost of a degree is $194,148. Students graduating from Penn and starting out their careers earn an average annual starting salary of $59,200. The Penn engineering department focuses on computer and information science. Students can study computer science, computer engineering, digital media design, networked and social systems engineering, computer science, computational biology as well as computer and cognitive science.

Rice University
Located in Houston, Rice University has a graduation rate of 91 percent and the average cost of a degree is $157,824. Upon graduation, the average starting salary for students comes in at $61,200 per year. Rice University has a Department of Computer Science where students can work in faculty research programs and describes the perfect computer science student as a "mathematician seeking adventure," a quote from system architect Bob Barton. In the electrical and computer engineering department, students can prepare for a career in oil and gas, wearables, entertainment, renewable energy, gaming, healthcare, space industry, security and aviation.

Brigham Young University-Provo
Brigham Young University-Provo, located in Provo, Utah, has a graduation rate of 78 percent, but students won't have as many loans as other colleges on this list. The average price of a degree is a moderate $80,988 and the average starting salary for graduates is around $51,600 per year. Brigham Young University-Provo offers degrees in electrical engineering, computer engineering and computer science. With a wide array of programs to choose from in each degree, Brigham Young University-Provo boasts a rigorous course load with an emphasis on gaining practical skills for the workforce.

Texas A&M University
College Station, Texas, is home to Texas A&M University where 79 percent of students graduate and the average cost of a degree is $84,732. Students can expect to earn an average starting salary of $54,000 per year after graduation. The Texas A&M computer science and engineering programs boasts an "open, accepting, and compassionate community that encourages the exploration of ideas." Students should expect to leave the program prepared to help solve real-world challenges in the technology industry through applied research.


for more info on CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com

Monday, August 10, 2015

Windows 10 is possibly the worst spyware ever made

Buried in the service agreement is permission to poke through everything on your PC.

The usual bumps of an OS launch are understandable and forgivable, but some of the terms of the end user service agreement for Windows 10 put the NSA to shame.

Microsoft is already getting heat after it was found that Windows 10 was being auto-downloaded to user PCs without warning, and more seriously, that it was using the Internet connections of Windows 10 users to deliver Windows 10 and updates to others.

But there are worse offenders. Microsoft's service agreement is a monstrous 12,000 words in length, about the size of a novella. And who reads those, right? Well, here's one excerpt from Microsoft's terms of use that you might want to read:

We will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary to.

EFF, where are you?
The good news is you can opt out of that feature, but the bad news is it defaults to on. You have to go to the Settings and then open the Privacy applet, where you are greeted with 13 different screens to weed through. Most of the offenders are on the General tab, but you really should go through all tabs, such as what types of data each app on your system can access.
See also: How to change Windows 10's default privacy settings

Second, Cortana proves problematic because it has access to your camera and microphone, and more importantly, it has access to your contacts, calendar, and probably all of your documents. You can turn this off in the Speech applet.

Next, the new Edge browser has its own share of new problems. Its integrated PDF and Adobe Flash reader has raised some alarms at Trend Micro. Trend is also concerned about the support for asm.js, a JavaScript subset from Mozilla that has been attacked before. However, Trend does like Edge overall.

Overall, we believe that Edge has reached a security parity with the Google Chrome browser, with both markedly superior to Mozilla Firefox. However, multiple attack surfaces still remain which can be used by an attacker. Given the sophistication and demands on modern browsers, this may well be inevitable.

Edge also comes with personalized ads, which can also be disabled.

There is other potential for exploitation. A Microsoft account is mandatory for many services, including Skype. This gives Microsoft more potential to collect info on you that you have to turn off.

Plus, Wi-Fi sharing defaults to on. That means you will be sharing your Internet connection with your neighbors if you leave it in its default state. So you have to open the settings and turn that off, too.

It seems like you will spend the first 10 to 15 minutes of using Windows 10 turning off all of the privacy-shredding settings. It will be interesting to see the fallout as more is uncovered.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Wednesday, July 8, 2015

How to deploy tablets to your mobile workforce

Wakefield Canada needed a new tablet PC for use in the field. Who better to ask then the very folks who’d have to use the mobile devices? Here’s what they chose and why.

When Wakefield Canada, the exclusive distributor for Castrol in Canada, set out to replace the tablets used by their sales team, it went right to the source to figure out what to buy: The people who would be using them in the field.

"A big part of this was really involving our end users in the tool selection," says Kent Mills, Wakefield Canada CTO.
MORE: 10 mobile startups to watch

The company landed on the Microsoft Surface Pro 3. Here's why – and how they made an easy transition.
Target the real customer

Even though the tablets would be used for sales purposes, the real customer here was the sales people who would be using the devices. The first question IT asked was what didn't they like about the devices they were already using?

"Feedback from the salesforce was that tablets were nice but they were too slow to start up, heavy to lug around and they just weren't feeling like they were that convenient to use," says Mills.

IT chose several potential candidates as replacements, including options from HP, Samsung, Microsoft and Apple.

Then, in conjunction with the salesforce, IT created a matrix of what they wanted in a device, including communication, design, display, integration, performance, peripherals, support and security.

Then the company's top five sales representatives were each given a tablet. After a week, they rotated tablets to the next salesperson until each one had used all five device candidates, and scored how they did in each category.

"It wasn't even close. Microsoft was unanimous by a very hefty margin," says Mills. He admits that the Surface Pro 3 wouldn't have been his first initial choice, but he's not the one who had to use the tablet. After completing the matrix, it was clear that the salesforce was choosing the best tool for them.

"It's not about me. I'm not the guy using it at the end of the day," he says.
Laptop and tablet combined

"It's a fine machine for an on-the-road laptop," says Dan Bricklin, CTO of Alpha Software, a mobile enterprise app development company. "It can act very well as a laptop but it can also be used as a tablet in a sales environment."

That can be key in sales, he says, because tablets are inherently social. "A laptop sits between you and another person. If you're in a sales situation, you can turn it around but you can't really share it. A tablet you can place down on the desk and two people who either sit across from each other or next to each other can easily share it," he says. "It works like brochure marketing material. It's wonderful for a sales environment, presentation type of thing."

Wakefield Canada works on all types of tablets, including iPads. He says they're powerful machines and can be perfect for people who have to stand up a lot in their work environment, like inspectors and health services employees. There, weight is a big factor, and something slim like an iPad Air might be a better choice (it weighs just under a pound versus the 1.76 pounds of the Surface Pro 3).

But for salespeople, a tablet with more laptop-like functionality may be more appropriate, as it has been for Wakefield Canada. For the record, Bricklin talked to CIO.com while using his own Surface Pro 3.

An additional benefit of the Surface Pro 3 is that, for people who travel, it can replace a laptop and still be used with a docking station in the office or at home. Wakefield Canada has arranged for the Surface Pro 3s to be tethered to smartphones, which means the tablets can always be connected, no matter where the salesperson is.
Sell the change

Even though Wakefield Canada's top sales reps chose the Surface Pro 3, the company still had to get the rest of the sales team – about 50 people in total – on board with the decision.

Before its national meeting, where employees would be getting their new Surface Pro 3s, IT send out teaser videos. Some included a quiz, and the first three employees to send back correct responses got a coffee gift card. "By the time they got here, they'd seen all the videos and they were jazzed about it," says Mills.

In the meeting, they added what Mills calls "a little sizzle" to the introduction of the new machines. They themed the transition as "the best of both worlds because you can easily break it apart," he says, referring to how the Surface Pro 3 can snap away from its stand. The presentation also included breaks like "retro treats" and a "Surface Showdown" based on the “Showcase Showdown” portion of the television game show “Family Feud.” They also had support on hand to help users with any questions they may have had during the transition.

And then they had a little luck. Wakefield Canada made their transition in February, right around the time of Super Bowl XLIX, where Surface Pro 3s were on commentator desks and in the hands of Seattle Seahawks coach Pete Carroll (Microsoft co-founder Paul Allen owns the Seahawks, and the team is obviously based in the Redmond, Wash. company’s backyard).

"It's worked out really well," says Mills.

Tuesday, June 30, 2015

Is facial recognition a threat on Facebook and Google?

Photo recognition is so good on Facebook and Google that they don't even need to see your face to ID you. Now what?

Both Facebook and Google have been working hard at using computers and algorithms to identify people in photos. They've gotten really good at it.

We still don't know what they'll do with that technology. To a large degree, it's up to us. But first, we have to understand what's possible.

Why Facebook doesn't need your face

Facebook is one of the leading organizations in the world developing facial-recognition algorithms. Facebook software can now identify people in photographs as well as people can. Facebook's DeepFace (no, I'm not kidding -- it's called DeepFace) can tell whether the subjects in two different photographs are the same person with 97% accuracy. That's even better than the FBI's own Next Generation Identification system.

DeepFace achieves this amazing feat by analyzing faces, turning them into 3D models, then making it possible to recognize the faces from angles and under lighting conditions that are different from those in other photos of the same person. The technology uses more than 120 million parameters, and a page on Facebook's research website explains that the company "trained it on the largest facial dataset to-date, an identity labeled dataset of four million facial images belonging to more than 4,000 identities."

But that's not enough for Facebook. It wants to be able to identify people even when their faces aren't showing. Toward that end, Facebook researchers are developing a system that looks at hairstyle, body shape, posture, clothing and so on.

Facebook can now recognize people whose faces aren't showing with 83% accuracy.

Tellingly, the company tried to avoid freaking people out with this research by developing the algorithm using Flickr pics, not Facebook photos.

While Facebook's ability to recognize people is astonishing, so is Google's.
How Google identifies you without identifying you

Everybody oohed and ahhed at Google I/O last month when Google demonstrated the search feature in its newly announced Google Photos offering.

In fact, we Google+ users have been enjoying this capability for years. Google Photo's search engine can not only tell the difference between cats and dogs, but also identify dog breeds and perform other search feats that seem impossible.

It will even find photos based on adjectives that could be used to describe the images they depict. For example, when I searched my own photo collection using the word delicious, it showed me hundreds of pictures I've taken of foods and beverages that were, in fact, delicious. (It also showed a picture I took during a safari in the Masai Mara in Kenya of a cheetah devouring a gazelle -- I guess that was delicious to the cheetah and Google software somehow knew that.)

Of course, the Google Photos search tool can find people when you search for them. In fact, when you go to the search bar and click to select it, you're immediately presented with three options: People, Places and Things. When you click the More link on the People option, it will show you a picture of every person you have ever photographed -- in order, beginning with the person pictured most frequently.

Click on any of those photos to get all the pictures of that person. When you do that, you'll notice something interesting: Google Photos will show you not only the pictures where the person's face is clearly visible, but also pictures in which the person's face is hardly visible at all.

But unlike Facebook's approach, all the faces that Google Photos search recognizes are visible; I haven't found photos where the person's back is turned.

It's also interesting to note that while Facebook's technology theoretically sounds more advanced, it is still in the research phase and has not been released, whereas Google's search tool is in its shipped product. And it’s already available to everyone free of charge.

Google isn't revealing details about how its photo search works, but it probably uses methods that are similar to Facebook’s.

One of the most interesting and under-reported features of Google Photos search is that Google has chosen to not associate pictures of people with their identity. For example, when I search for my son Kevin -- who is an active Google user, including a Google+ user -- Google Photos doesn’t associate my photos with his identity in its databases.

When I go to Google Photos search, see Kevin's face and click on it, I get hundreds of pictures of him. But when I search for the name Kevin, or for Kevin Elgan, I don't get all the same pictures. Instead, I get pictures that have been tagged or associated with his name directly through mentions on posts.

Obviously, Google could throw an algorithmic switch at any time and start associating people search with identity, but so far it has chosen not to do so.
How Facebook and Google use 'identification by association'

In the old days, facial recognition technology was more straightforward. It would literally analyze faces to look for things like the relative distances between the eyebrows and the nose, and between the bottom of the ears and the chin.

Now, the artificial intelligence behind Facebook's and Google's facial recognition systems is, in fact, recognizing people the way people recognize people. For example, given enough pictures, it actually learns about you. So when it sees your face in one photo, it also makes a note of the setting, the lighting, the clothes you're wearing, your hair and more. When your back is turned and your face is not showing, it can say: "Oh, that's Mike with his back turned."

In the case of Google Photos now, and probably Facebook in the future, facial recognition will also harvest data from social engagement. For example, if I post that my son Kenny is dressed up for Halloween, it can use that information not only to identify him with a mask on, but also to find him in all the other pictures taken of him at the same event with the mask on, but which were not even posted (just automatically uploaded using the Google Photos automated backup feature).
So now what?

There are three important things to note about all this. The first is that research and development on these artificial-intelligence photo recognition technologies will continue and the systems will become far more advanced. It's important for the educated public to grasp the reality of what's possible now, and what will be possible in the future.

In a nutshell, it's only a matter of time before social networks, law enforcement and other organizations will be able to instantly identify any of us with extremely high probability using any photo, including those taken with webcams, security cameras at ATMs and elsewhere, cameras mounted at toll gates, traffic cams and more. Facial-recognition technology is available on more than 28 million mobile devices and that figure is expected to soar to nearly 123 million by 2024.

The second important thing to remember is that the emergence of this technology is not inevitably related to the implementation or abuse of this technology. There seems to be an assumption that it's inevitable that our privacy will be routinely violated in the future. But that's not necessarily true.

The development of technology that can identify everyone all the time is inevitable. But as we've seen with both Facebook and Google, that technology doesn't have to be used to violate our privacy. Facebook is so concerned about the public's reaction that it's not even using Facebook photos to test its latest recognition technology. Google is so concerned about our reaction that it's not associating faces with identities. Clearly, they’re both keenly aware of both public concerns and the potential unintended consequences of using this technology to its full potential -- at least for now.

Apple made it clear at its World Wide Developers Conference that it's possible to offer personalization without privacy violation. The company's new Proactive feature for Siri harvests data from email, calendar and more, but the data never leaves the phone and is never associated with a person's ID. It's not uploaded to the cloud or entered into some permanent database. Apple itself never has access to it.

There is no inevitability that personalization or recognition technology must thoroughly violate our privacy. In fact, many of the current privacy violations that happen through our smartphones and computers could be rolled back. The first step in making that happen is for the public to get more sophisticated about the link between what's possible in terms of features and benefits on the one hand and what's necessary in terms of privacy violations on the other.

The third fact worth noting about the ability of companies to recognize you in pictures is that it can be beneficial for your own privacy. For example, it's possible that the search engines of the future could alert you anytime anyone anywhere uses or posts a picture with you in it, even if you're in the background. And you could have the ability to take action when some type of abuse or misuse of such a photo occurs. It’s also possible that that type of facial-recognition technology could prevent identity theft, which is becoming increasingly problematic as companies and agencies with our data get hacked.

The day when companies like Facebook and Google will be able to recognize you in pictures with 99% accuracy, even when your face doesn’t show, is fast approaching. That capability could lead to a world in which privacy is impossible. But it doesn't have to.

The first step is to understand what's possible and grasp the realm of the technology’s implications. The second is for us to ask questions, demand answers and speak up in defense of our privacy.

It's easy for us to throw up our hands in despair and proclaim that our privacy is already dead and gone. But it's not. We can still enjoy the benefits of advanced technology without giving up all our privacy.