Archive

Category Archives for "Networking"

Controversial MacKeeper security program opens critical hole on Mac computers

A critical vulnerability in MacKeeper, a controversial security program for Mac computers, could let attackers execute malicious commands on Macs when their owners visit specially crafted Web pages.MacKeeper’s developers acknowledged the recently discovered problem and released a fix for it Friday, saying in a blog post that users should run MacKeeper Update Tracker and install version 3.4.1 or later.MacKeeper registers itself as the handler for a custom URL scheme, allowing websites to automatically call the application through the browser.Researcher Braden Thomas found an issue in the program’s validation of such URLs that makes it possible for attackers to execute arbitrary commands with root privilege when MacKeeper users visit a specially crafted website in Safari. As a proof of concept, he posted a link on Twitter that automatically executes a command to remove MacKeeper when clicked.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why Wi-Fi will be the technology of choice for the Internet of Things

With projections of more than 5 billion connected devices by the end of this year and growth to 50 billion by 2020, the challenges facing the Internet of Things (IoT) include a lack of standardization, security, integration, battery life, and rapid evolution. Wi-Fi, in its 16th year, is getting ready for IoT and will perhaps make the most suitable network for the technology.IoT may be a recent buzzword, but the quest for connected things is old. Very old. Caller ID, connected Coca-Cola vending machines, M2M, smart meters, RFID, AutoID, etc. The whole appeal of connected things has been efficiency and experience. And the desire for experience and efficiency is even greater today. We live in an experience era and have no patience. We expect 'great experience' and 'efficiency' around us. Only IoT can enable that. IoT is nothing but an intelligent and invisible network of things that communicate directly or indirectly with each other or the internet to enable experience and efficiency.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why Wi-Fi will be the technology of choice for the Internet of Things

With projections of more than 5 billion connected devices by the end of this year and growth to 50 billion by 2020, the challenges facing the Internet of Things (IoT) include a lack of standardization, security, integration, battery life, and rapid evolution. Wi-Fi, in its 16th year, is getting ready for IoT and will perhaps make the most suitable network for the technology.IoT may be a recent buzzword, but the quest for connected things is old. Very old. Caller ID, connected Coca-Cola vending machines, M2M, smart meters, RFID, AutoID, etc. The whole appeal of connected things has been efficiency and experience. And the desire for experience and efficiency is even greater today. We live in an experience era and have no patience. We expect 'great experience' and 'efficiency' around us. Only IoT can enable that. IoT is nothing but an intelligent and invisible network of things that communicate directly or indirectly with each other or the internet to enable experience and efficiency.To read this article in full or to leave a comment, please click here

GPU malware can also affect Windows PCs, possibly Macs

A team of anonymous developers who recently created a Linux rootkit that runs on graphics cards has released a new proof-of-concept malware program that does the same on Windows. A Mac OS X implementation is also in the works.The developers are trying to raise awareness that malware can infect GPUs and that the security industry is not ready for it. Their goal isn’t to tip off malicious hackers, but the source code they released, while incomplete and buggy by design, could potentially be built upon and used for illegal purposes.The problem the developers are trying to highlight lies not with the operating systems, such as Windows or Linux, nor with the GPU (graphics processor unit) vendors, but rather with existing security tools, which aren’t designed to scan the random access memory (RAM) used by GPUs for malware code.To read this article in full or to leave a comment, please click here

General Howe’s Dog

The morning after a battle — one of the first won by the American army in its battle for freedom from the British Empire — if you happened to be on the scene, you might see an American soldier, under a white flag of truce, struggling with something small he is carrying between the lines. Approaching, you can see the package is, in fact, a small terrier — a dog. If you could read the note the carrier is holding there in his scrip, you would find it says —

General Washington’s compliments to General Howe, does himself the pleasure to return to him a Dog, which accidentally fell into his hands, and by the inscription on his collar, appears to belong to General Howe… October 6th, 1777

So — in the midst of a war that cut people down from their young lives, we find a singular scene of a man carrying a dog across a field to return it to the enemy’s commander. What has any of this to do with the life of an engineer? Perhaps more than you think.

Let me return to a much younger time in my technical life, a time when I was Continue reading

Don’t panic! How to fix 5 common PC emergencies

Your PC may not be as essential to you as your smartphone, but chances are it’s still pretty damn important. So it’s completely understandable if your first reaction is to freeze and freak out when you run into a PC emergency, such as a broken screen, accidentally-deleted important file, or a virus. But panicking is counter-productive, because time is often of the essence.Don’t worry. While you can’t call 9-1-1, here’s what you can do to fix five common PC emergencies.Broken laptop screen A few months ago, I was working on my MacBook Air next to my French bulldog, Blanka. For some unexplained dog reason, Blanka suddenly decided he needed to be in my lap, so he jumped on me—and landed on my laptop’s screen. A laptop screen is no match for a 27-pound Frenchie, so, needless to say, my screen was toast.To read this article in full or to leave a comment, please click here

Galaxy S6 edge an impressive enterprise phone — with one big exception

Samsung, one of the largest and most popular Android partners, has slowly been making inroads in enterprise. Last month, the company released its two new flagship smartphones, the Galaxy S6 and Galaxy S6 edge, which are identical except for the GS6 edge's curved display and slightly larger battery.Due to the popularity of Samsung's Galaxy S devices, it's easy to find GS6 reviews, but our evaluation is written specifically for business users — and the IT staffers who need to support them. I've been using both devices regularly for almost two months, though I gravitated to the GS6 edge. As such this evaluation is focused on the GS6 edge, though most of conclusions apply to both phones.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Monday, May 11

China’s smartphone market slows downThe world’s largest smartphone market may be losing its appetite: first quarter shipments of the devices in China dropped by 4 percent year over year, according to IDC. It’s the first time in six years that China’s smartphone market has contracted.IBM’s slimmed down Power servers aim at cloud, in-memory databaseIBM has brought out another round of Power8 servers, targeting private, public and hybrid clouds as well as in-memory database applications and analytics. The multipurpose servers include the four-socket Power E850 and the more powerful Power E880.To read this article in full or to leave a comment, please click here