Linpus Lite 1.4 is the latest update to the Linux distribution published by Linpus Technologies, Inc. of Taipei, Taiwan. Though designed for use on netbooks and low-power computers, it is one of the best distributions that I have reviewed for publication on this website. It boots up real fast and shuts down even faster. It features a slick installation program […]
Post Tagged with: "security"
Not too long ago, Jason Chen, a Gizmodo editor, had all the computer related materials in his residence seized by cops acting on a warrant in relation to Apple’s missing iPhone 4G prototype. If you recall, Jason Chen got hold of the pre-release iPhone from a guy who found it in a California bar. So Jason blogged about it (the […]
What if there were widely accepted standards for cloud security and, better yet, a universally recognized designation for “trusted” cloud providers? The basic promise of cloud computing is undeniably appealing: Increase efficiency and reduce cost by taking advantage of flexibly pooled computing resources managed by somebody else. Indeed, as Bill Brenner of CSO put it, “Given how expensive it is […]
Computer scientists at the University of Hertfordshire have found a way to share information online securely for a fraction of the cost of existing systems. Professors Bruce Christianson and Alex Shafarenko at the University’s School of Computer Science, working in collaboration with Professor Sergei Turitsyn at the University of Aston, have been awarded a UK patent for a fibre optics […]
The limited power and processing ability of RFID chips makes them vulnerable to attackers operating at a distance. A new protocol could tackle this problem. One drawback with RFID chips is their inability to know the distance of any device that is interrogating them. That allows a malicious user to attack from a distance, more or less at leisure and […]
A firewall is the safety barrier between a computer network and the outside world. Individuals, companies and large organizations alike rely on a firewall being robust enough to fend off hackers attempting to break into a computer system. However, managing the firewall rules that decide between online friend and foe has proved to be complex, error-prone, expensive, and inefficient for […]