Archive for June 29, 2011

Richard Dreyfuss Reads the iTunes EULA

CNET asks why are end-user license agreements (EULA) and terms of service so long and convoluted. In order to find out, they asked Academy Award winner Richard Dreyfuss to help them understand by doing a dramatic reading of the Apple (AAPL) EULA.

Richard Dreyfuss Reads the iTunes EULA

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

40 Years of Malware – Part 2

40 Years of Malware - Part 22011 marks the 40th anniversary of the computer virus. Help Net Security notes that over the last four decades, malware instances have grown from 1,300 in 1990, to 50,000 in 2000, to over 200 million in 2010. Fortinet (FTNT) marks this dubious milestone with an article that counts down some of the malware evolution low-lights.

The Sunnyvale, CA network security firm says that viruses evolved from academic proof of concepts to geek pranks which have evolved into cybercriminal tools. By 2005, monetization of the virus scene was underway and almost all viruses developed for the sole purpose of making money via more or less complex business models. According to FortiGuard Labs, the most significant computer viruses over the last 40 years are:

See Part 1 Here – See Part 2 Here  – See Part 3 Here  – See Part 4 Here

1945 – A Bug is Born –  Grace Murray Hopper, a researcher at Harvard, notes a system failure and finds a moth trapped in relay panels.

1949 – Self-replicating programsJohn von Newman a researcher from Hungary published the theoretical base for computers that store information in their “memory”.

1962 – A group of Bell Telephone Labs researchers invents a game that destroys software programs.

1971 – The Creeper Virus appears on ARPANET, the forerunner of the Internet. It replicates itself and displays a message: “I’m the Creeper: Catch Me if You Can.”

1974 – The Wabbit – was a self-replicating program, that made multiple copies of itself on a computer until it bogs down the system to such an extent that system performance is reduced to zero and the computer eventually crashes. This virus was named wabbit because of the speed at which it was able to replicate.

Apple IIe1981 – Elk Cloner – the first widespread virus on the Apple (AAPL) II platform, spreads by the floppy disk and infects boot sectors, generating messages and impairing performance.

1983 –  The term “computer virus” comes into vogue after Professor Len Adleman at Lehigh University demonstrates the concept at a seminar.

1986 – The Brain is the first global epidemic on the PC platform and shows businesses and consumers are clueless about protection.

1987 – Jerusalem virus – On any Black Friday (Friday the 13th), it would delete any programs that were run, instead of infecting them, so it simply couldn’t be ignored,” Roger Thompson told News.com, Australia. “You couldn’t throw away your hard drive, and reformatting it didn’t remove the virus,” the chief research officer for AVG said.

BSD Daemon1988 – The Morris worm – created by Robert Tappan Morris, infects DEC VAX and Sun machines running BSD UNIX connected to the Internet and becomes the first worm to spread extensively “in the wild”, and one of the first well-known programs exploiting buffer overrun vulnerabilities.

1990 – Chameleon– the first documented polymorphic virus, malware that adapts and changes to avoid detection.

1992 – Michelangelo – was expected to create a digital apocalypse on March 6, with millions of computers having their information wiped according to mass media hysteria surrounding the virus.  Later assessments of the damage showed the aftermath to be minimal.

1995 –  Concept – the first Macro virus attacked Microsoft (MSFT) Word documents.

1996 – Laroux – the first Microsoft (MSFT) Excel virus, appears in the wild.

1999 – The Happy99 worm – invisibly attached itself to emails and would display fireworks to hide the changes being made then wished the user a happy New Year. It modified system files related to Microsoft (MSFT) Outlook Express and Internet Explorer (IE) on Windows 95 and Windows 98.

1999 – The Melissa worm targeted Microsoft (MSFT) Word and Outlook-based systems, and created considerable network traffic.

rb-

Back in the day, I had to deal with both Happy99 and Melissa, as well as the occasional Stoned. Melissa was the easiest to deal with since I was running a GroupWise shop at the time, once the news spread, we just pulled the Cat5 from the GWIA and we saw minimal blowback. Let’s hear it for technological diversity.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Teachers Highly Susceptible To Phishing Attacks

Teachers Highly Susceptible To Phishing Attacks Internet Security Awareness Training (ISAT) firm KnowBe4 has released new cybercrime statistics that identify Education as one of the most Phish-prone™ industry sectors. Education is the second most susceptible sector to cybercrime ploys. DarkReading reports the percentage of companies in each sector that responded to the phishing emails are:

  • Travel – 25%
  • Education – 22.92%
  • Financial Services – 22.69%
  • Government Services – 21.23%
  • IT Services – 20.44%

KnowBe4 founder and CEO Stu Sjouwerman told DarkReading,  “Our cybercrime statistics should serve as a wake-up call … Not only are these businesses at risk for financial loss through a cyberheist, but their susceptibility to phishing tactics could compromise sensitive customer data such as credit card, bank account, and social security numbers.

These findings are based on a recent phishing experiment KnowBe4 conducted among enterprises featured in the latest Inc. 500 and Inc. 5,000 listings.

rb-

Having worked in K12 for a number of years, I saw lots of teachers and a few superintendents get caught by phishing traps, They would then complain to me why they and their organization has entered SPAM jail and then needed me to hit SORBS.net to get the mail flowing again.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tablet Notes

Tablet NotesiPad sold three million units in the first 80 days after its April 2010 release. Its current sales rate is about 4.5 million units per quarter, according to Bernstein Research. This sales rate is blowing past records. iPad is outselling iPhone and the DVD player, the most quickly adopted non-phone electronic product.

Apple iPad Will Fail in the Enterprise

Dell logothe Apple (AAPL) iPad would ultimately fail in the enterprise. That is what Andy Lark, Dell‘s (DELL) global head of marketing for large enterprises and public organizations told CIO Australia.

… longer term, open, capable and affordable will win, not closed, high price and proprietary [Apple has] done a really nice job, they’ve got a great product, but the challenge they’ve got is that already Android is outpacing them.

Apple is great if you’ve got a lot of money and live on an island. It’s not so great if you have to exist in a diverse, open, connected enterprise; simple things become quite complex.

Mr. Lark claimed Dell had taken an enterprise approach toward tablet PCs. This approach will ultimately give Dell an edge. Dell has a major stake in Microsoft Windows and the desktop PC market. “We’ve taken a very considered approach to tablets, given that the vast majority of our business isn’t in the consumer space,” he said.

The cost of Apple products was another deterrent to iPad deployments. Dell’s Lark claims that the economics on a fully loaded iPad did not add up. “An iPad with a keyboard, a mouse, and a case [means] you’ll be at $1500 or $1600; that’s double of what you’re paying,” he claimed. “That’s not feasible.

Despite the company’s history with Microsoft, it had embraced both Windows Phone 7 and Android operating systems “…Our strategy is multi-OS,” Lark said. “We will do Windows 7 coupled with Android Honeycomb, and we’re really excited. We think that giving people that choice is very important.

Outlook on the iPhone and iPad

Pst Mail an iPad appHelp has arrived for Apple (AAPL) iPhone and iPad owners who need access to their Microsoft (MSFT) Outlook e-mail. AppScout says users can check their email even when they don’t have an Internet connection.Pst Mail from Arrow Bit is an iPad app that provides offline access, potentially saving money on the user’s data plan. With the app, you can carry around a year’s worth of messages with you. Pst Mail can interact with the Mail app on your iPhone or iPad to reply to or forward messages. It can also open pst files created with any version of Microsoft Outlook.

AppScout says to find messages in large pst files, Pst Mail includes an advanced search feature. You can search by sender, recipient, subject text, message body, or even attachment name. You can also limit the search to a particular time frame. The developers offer a free lite version of the app in the iTunes Store, which has all the same features as the full version but is limited to the number of messages a user may open in each folder. The full version costs $9.99 in the iTunes app store.

GoToMyPC: iPad App

GoToMyPC Citrix (CTXS) has launched an Apple (AAPL) iPad version of GoToMyPC, a remote desktop application that lets you log in to your computer and control it on the go. Up until recently, you needed a PC to log in to a remote PC using the service. But the iPad app lets you do it anywhere you can get an internet connection on an iPad.

Mobilputing says GoToMyPC is hardly the first app of its type for the iPad. LogMein, TeamViewer, Parallels, and Splashtop all offer similar apps. But the GoToMyPC app has tight security features including 128-bit AES encryption, user authentication, and dual passwords, oriented for business.

Apple Sued Over Apps Giving Information to Advertisers

Apple is being sued over the collection and sharing of user data with outside companiesApple (AAPL) and Apple app developers have been sued over the collection and sharing of user data with outside companies (which I wrote about here). Two suits were filed in the Northern District of CA against the iPhone and iPad manufacturer. Apple is named in Lalo v. Apple, 10-5878.

Lalo seeks class action and claims that iPhones and iPads are encoded with identifying devices that allow advertising networks to track what applications users download, how frequently they’re used, and for how long. “Some apps are also selling additional information to ad networks, including users’ location, age, gender, income, ethnicity, sexual orientation, and political views,” reports Bloomberg’s BusinesWeek.

According to Wired the second suit, Freeman v. Apple seeks both monetary damages and a court order to stop the profiling by app makers being sued are Pandora and Dictionary.com, Toss It, Text4Plus, The Weather Channel, Talking Tom Cat, and Pimple Popper Lite.

Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

GM to Build New Data Center in Michigan

GM to Build New Data Center in MichiganDetroit Michigan based automaker General Motors (GM) will invest $130 million to build an enterprise data center at the GM Technical Center, in Warren, MI reports Data Center Knowledge. According to the article the new data center, the Information Technology Operations and Command Center, will allow GM to cut operating costs. The savings will come from consolidating GM global IT infrastructure into a more efficient facility.

GM said it will renovate and expand the former Cadillac administrative building on its Warren Tech Center campus. Design is underway on the renovation and construction, with the last phase scheduled for completion in 2015. The project is expected to create 25 high-tech jobs. InformationWeek says the state-of-the-art center will allow GM to merge tech operations spread across many sites into a single facility, reduce IT operating costs, and cut energy consumption by 40%. The company expects the data center to meet requirements for Leadership in Energy and Environmental Design (LEED) certification by the U.S Green Building Council.

Michigan to be center of GM IT

DCK reports the new enterprise data center will use a “modular design” to allow for future expansion. Data Center Modular designs often use factory-built structures, but the term is increasingly being used to describe phased build-outs using pods of raised-floor space. The facility will contain IT laboratories to run computer simulations for vehicle designs. It will also serve as a hub for monitoring GM’s digital applications globally. “The Enterprise Data Center will contain technology laboratories and a global information technology operations center that will serve as the hub for monitoring General Motors information technology applications around the world,” GM Vice President and chief information officer Terry Kline told reporters.

GM Enterprise Data Center at Warren tech Center

New GM Enterprise Data Center at Warren Tech Center

This new facility and other GM data centers around the world support the tools the company needs to design, build and sell the world’s best vehicles through digital applications enabling all business functions,” said Mr. Kline. “This investment is possible because of the cooperation between GM, the Warren community, and the Michigan Economic Growth Authority (MEGA). We think the result is a win for everybody involved.

The automaker received a tax credit from MEGA to support the $130 million redevelopment of the computer center. The Warren city council unanimously approved a brownfield redevelopment plan for space at the sprawling Technical Center campus.

rb-

A few years back,  I worked for about 18 months at the Tech Center, at the Vehicle Engineering Center (VEC). The best part of the job was going over to the Cadillac building for lunch. I recall the cafeteria having leather walls and real china with the Cadillac logo.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.