Tech Thoughts Daily Net News – March 21, 2012

Smartphone security checklist – Inattention to potential security threats can result in the invasion of privacy, identity theft, inconvenience, the loss of intellectual property and the actual loss of money. The more dependent a smartphone user is on the technology, the more they have at risk. Attevo offers this 13-point checklist of security habits and usage suggestions for all smartphone owners.

How to Get Off Google for Good – Get a fresh start with our complete guide to moving your data off Google servers and permanently deleting your Google accounts.

Customize Your Windows Installation to Create the OS of Your Dreams – Windows is great, but it isn’t exactly what you would call lean. It comes with a whole host of programs, features, and services that, best case, take up unnecessary space, or worst case, slow down your machine. If you’d rather have a slimmer installation of Windows, you can create your own Windows installer with RT Se7en Lite complete with tons of other customizations so you can turn Windows into your dream OS. Here’s how to do it.

Topless supermodel photos used to spread Mac malware – Somehow I doubt that Mac users are any smarter than their Windows cousins when it comes to resisting temptation. We’re all human, after all. And there is a (probably significant) proportion of the population which isn’t adverse to searching the web for nude pictures of supermodels.

Tech Thoughts Daily Tech News 2

Google explains how it identifies spam – Some people ignore the very existence of their spam folder; others, though, have a check-through every now and again to see if they’ve missed anything vital. And occasionally it’s hard to understand why one piece of marketing bumph has made it through to the inbox, while another is consigned to spam purgatory. Now, though, Google has introduced a feature telling users the reasons for its decisions.

Linux Unites With Android, Adds Business-friendly Features – The new Linux 3.3 Kernel integrates the code from Google’s Android OS while updating security, scalability, and hardware support.

Ten tips for using your LinkedIn profile to the best advantage – Your LinkedIn profile is basically an online resume. Here are the Profile elements you should be paying attention to.

Web Services Single Sign-On Contain Big Flaws – Microsoft Research report shows how risky single sign-on can be without solid integration and better support from Web service providers like Google and Facebook.

GSM cracking revelations are profound – Commenting on news reports that an Indian company has revealed it can tumble and clone the credentials of mobile phone SIM cards over the airwaves – apparently because certain Indian GSM carriers are using the A5/0 minimal encryption system on their cellular networks – Cryptzone says this raises, once again, the issue that GSM voice calls can no longer be considered secure.

Tiny Core Linux, a great kiosk and emergency platform – Tiny Core Linux is a tiny Linux operating system that starts out as a bare-bones distribution, but it could easily make an ideal kiosk, cafe, or emergency OS. Unlike many of the other small-footprint distributions, Tiny Core Linux isn’t based on another distribution. It starts with the 3.0 kernel and adds a lightweight graphical desktop (though you can download a CLI-only version) and just enough tools to make you dangerous.

Company News:

Secunia and MS-ISAC in New Partnership to Provide Vulnerability and Patch Management to US State and Local Governments – Secunia, the leading provider of vulnerability intelligence and vulnerability management solutions, today announced a new partnership with the Center for Internet Security, Multi-State Information Sharing and Analysis Center (MS-ISAC) division, the cyber security focal point for US state, local, territorial and tribal (SLTT) governments.

ManageEngine EventLog Analyzer Leads TRC Companies, Inc. to SOX Compliance – ManageEngine, the real-time IT management company, today announced that TRC Companies, Inc. is using the syslog and event log management tool, EventLog Analyzer, to successfully meet Sarbanes-Oxley (SOX) compliance audit requirements. Using EventLog Analyzer, the national engineering services, consulting, and construction management firm is now able to collect, retain and review terabytes of audit trail log data generated by its IT infrastructure to support IT process controls of SOX Section 404.

Network intrusion detection for Amazon Web Services – Alert Logic announced the availability of Alert Logic Threat Manager and ActiveWatch for Amazon Web Services (AWS). AWS customers using Amazon EC2 interested in an added layer of network protection can cenhance the protection of their networks by subscribing to Alert Logic’s fully managed vulnerability assessment and intrusion detection solution.

EZShield Offers SMBs Data Breach Prevention, Response Tools – The new offerings, released yesterday, are available under the SycurityMax Business Suite and will be sold through EZShield’s network of partners throughout industries such as financial services, insurance and human resources.

Red Hat Delivers Beta of JBoss Enterprise Application Platform 6 – The release of JBoss Enterprise Application Platform 6 reflects the culmination of Red Hat’s efforts to facilitate the adoption of Java Enterprise Edition 6 technologies, enable a platform-as-a-service-ready platform and simplify the management of application servers regardless of where they are deployed.

Microsoft faces Windows 8 trouble if it fails to ship in October – Microsoft has October, and October only to ship out Windows 8. If it misses its time frame, it will likely be slammed by its rivals, and have nothing to ship in 2012.

Webopedia Daily:

Crowdsourcing – A slang term used to describe the practice of using both the skills and time of underpaid — or unpaid — amateurs to create content or solutions for established businesses. Basically, crowdsourcing means to “use talents of the crowd”, and is a play on the word outsourcing. The origins of the word crowdsourcing are credited to Jeff Howe, a Wired Magazine writer who first brought crowdsourcing to people’s attention and vocabulary with his 2006 story, “The Rise of Crowdsourcing”.

Off Topic (Sort of):

Why the Demise of Print Media Is Bad for Humanity – The transition from print to digital media has tremendous benefits for Earth and society as a whole, but the downsides could be devastating.

Could a Google Nexus tablet at $149 be a game-changer? – Google’s rumored tablet, built in partnership with Asus, could be priced as low as $149, undercutting the Kindle Fire by $50.

Cyberwar: hype or reality? – Is “cyberwar” really upon us? Is a “digital Pearl Harbour” imminent? And is an international agreement on “cyberarms” a plausible solution?

New iPad hits 116 degrees – mind your scrotum, chaps – The new iPad runs considerably hotter than its predecessor, tests have shown – making it perfect for reading in bed, perhaps, but alarming some users.

Today’s Quote:

When you’re through changing, you’re through.”

–     Bruce Barton

Today’s Free Downloads:

Photoscape – Photoscape has some features that far exceeded my expectations others that floundered. It’s basic, but interesting in its own right if you look beyond the editing tools and play with some of the hidden gems this free program offers.

ZoneAlarm Free – ZoneAlarm makes it easy. Unlike other personal firewalls, ZoneAlarm protects automatically from the moment it’s installed – no programming required. ZoneAlarm barricades your PC with immediate and complete port blocking. And, then runs in Stealth Mode to make your PC invisible on the Internet – if you can’t be seen, you can’t be attacked.


Comments Off on Tech Thoughts Daily Net News – March 21, 2012

Filed under Internet Security Alerts, Tech Net News

Comments are closed.