Tag Archive for 2012

Black Sabbath on Tesla Coils

Black Sabbath on Tesla CoilsBoingBoing says that if you need an explanation why you should spend 1:26 watching ArcAttack do a Tesla Coil version of Iron Man by Black Sabbath, you are in the wrong place.

 


ArcAttack is playing Black Sabbath on MIDI-compatible Tesla coils while standing in a Faraday suit. According to BoingBoing, the MIDI signal from the guitar is routed through a fiber optic cable to control the Tesla coils.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Better Mobile Security

Better Mobile SecuritySmartphone users should be concerned about mobile security. This is more true if the mobile device is used for work and has your employer’s email or messaging server. IT staff can take steps to protect the data on the mobile. Eric Geier, the founder of NoWiresSecurity writes provided CIO Update with 6 tips for better mobile device security.

Choose encryption and use itTip No. 1 – Choose a mobile OS that supports encryption and use it: Mr. Greer says to make sure the mobile operating system (OS) and device support hardware-based encryption. The article says Apple’s (AAPL) iOS and Research In Motion’s (RIMM) BlackBerry support encryption for both internal and external storage. Without encryption, it’s possible that someone could recover the data on the device even without your lock PIN or password.

Full device encryption is limited and varies on current Android device manufactures. Mr. Greer writes that Motorola Mobility’s (MSI) business-oriented smartphones offer encryption capabilities on Android 2.3. Android 3.x includes an API to help developers offer encryption on tablets. Android 4.x tablets and smartphones should support encryption sometime in 2012. WhisperCore is a third-party encryption solution that is in beta for Nexus S and Nexus One.

Set a lock PIN or password:Tip No. 2 – Set a lock PIN or password: The article says that enabling a password, whether it’s called a PIN, passcode, or passphrase, is the first line of defense in maintaining privacy and security. It helps prevent others from picking up your phone or device and snooping around if it becomes lost, stolen, or just left unattended. It’s also usually required if encryption is enabled on the device writes the author. A PIN will protect data and privacy from causal snoopers.

Tip No. 3 – Enable auto-wiping of data: Most mobile OSes support automatic wiping of the device’s data after a certain number of incorrect passwords attempts. Mr. Greer says auto-wiping is natively supported by iOS, Windows Phone 7, and BlackBerry. Android requires a third-party app, such as Autowipe.

It is important to keep all your data regularly backed up so the data can be restored to a new mobile after it is wiped.

Setup remote trackingTip No. 4 – Setup remote tracking and management: Before your phone or device gets misplaced or stolen the blog recommends that a remote tracking and management system should be set up. Most let you see the device’s GPS location on a map, send audible alerts to help you find it, and display a visual message to tell others how to return it. They typically also let you remotely lock and/or wipe it before someone else gets their hands on it. According to Mr. Greer:

  • For iOS 4.2 or later, Apple provides a free service.
  • For earlier iOS versions there’s the MobileMe service from Apple at $99 a year after the 60-day free trial.
  • For Android, you have to use a third-party app.
  • For Windows Phone 7 Microsoft provides the free Windows Live for Mobile service.
  • For BlackBerry, RIM provides the free BlackBerry Protect service.

Limit Wi-Fi hotspot usageTip No. 5 – Limit Wi-Fi hotspot usage: When you use public Wi-Fi hotspots that aren’t encrypted, all your Internet traffic is transmitted through the air and can be easily intercepted. The most important sites and services, such as banking websites, usually implement their own (HTTPS/SSL) encryption that protects their individual traffic. But most email providers and many social networking sites don’t; thus eavesdroppers can likely capture their passwords and traffic.

On the other hand, most 3G, 4G, and other cellular data connections are usually encrypted by the carriers. Plus eavesdropping on these types of connections isn’t as popular. Therefore, when you’re out and about you should try to use the data connection rather than unsecured Wi-Fi hotspots.

If you insist on using Wi-Fi hotspots, use those that offer enterprise encryption and 802.1X authentication, such as from T-Mobile and iBahn. Alternatively, consider using a VPN connection to secure your traffic from local eavesdroppers.

Use an antivirus or security app:Tip No. 6 – Use an antivirus or security app: Viruses, malware, and hacking on mobile devices is a growing problem. The author recommends installing a security app to help prevent infections and intrusions. Most AV solutions also offer other features, such as remote wiping, backup, and locating.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Schools Riskiest for Computer Theft

Schools Riskiest for Computer TheftAbsolute Software Corporation (ABST), is a Vancouver, Canada-based computer security and end-point management firm. The company founded in 1993 provides firmware-based, computer theft recovery, data protection, and secure computer life-cycle management systems identified the top 10 target areas for the theft of mobile computers.

Absolute Software logoThe maker of LoJack for Laptops told ITnewsLink that the top 10 list reveals that consumer computers are more likely to be stolen while at school or home. The list is based on theft reports filed to the Absolute Theft Recovery Team by Absolute customers over a one-year period. With the holidays approaching, Absolute is warning that the risk of computers being stolen from the home is higher than what many consumers perceive.

“The trends in this list may surprise some computer owners. They often think of security issues only when they are on the move,” said Mark Grace, vice president of consumer business at Absolute Software. “However, with schools and residences topping the list of places computers are stolen, owners need to be extra cautious, particularly around the holidays when home burglaries often increase.

Top 10 Places Consumer Computers Are Stolen

Typing class1. K-12 Schools
2. Residential Properties
3. Automobiles
4. Businesses/Offices
5. Universities and Colleges
6. Hotels and Motels
7. Restaurants and Cafes
8. Stores and Shopping Malls
9. Public Transit (includes taxis, buses, trains, etc)
10. Airports (terminals, security checkpoints, storage areas and airport restaurants

rb-

The Absolute software offers several advantages. When a device is reported stolen a signal is sent that freezes the computer and displays a custom message for whoever finds it. In order to prevent identity theft unauthorized users cannot access the content on the computer, and even delete files, including the operating system. If a computer is stolen, the Absolute Theft Recovery Team will work with local law enforcement to recover it.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Social Network Safety Tips

Social Network Safety TipsIn case you have lived under a rock, social networking sites are very popular. LinkedIn (LNKD) has over 100 million users; 1 billion tweets are posted on Twitter each week and Facebook is approaching 1 billion users. Despite these numbers, they also open users up to more computer viruses and online threats according to a report from Webroot. A Help Net Security article details a few of the threats social network users face. They include:

Social networking malwareBogus e-mails from “friends”: The blog warns that hackers lure users into taking actions they shouldn’t. They do this by making it seem as if a friend within their social network has sent them an in-network e-mail. Only the e-mail is from a hacker who’s hijacked the friend’s account.

Malicious links or bait: This type of scam involves personal messages to users. The messages encourage victims to click on a link. Doing so can do a number of things including sending users to a fake website. There they are prompted to download and install an executable file that turns out to be a virus that infects the user’s PC explains the author.

Identity theftIdentity theft: Social network users who share personal information with their entire network of friends leave themselves vulnerable to hackers. Oversharing details like birth dates, addresses, pets’ names, and other details make it easier for attackers to guess your password and access Yout profile based on the personal information shared reports Help Net Security.

To help increase your PC protection, Webroot advises users to install updatable Internet security software and keep a few simple rules in mind, such as:

Be skeptical – E-mails, friend requests, Web site links, and other items from sources you do not know could be malware.

Social networking privacyUse privacy settingsSocial Networking sites, such as Facebook and Twitter, offer privacy settings that let you control who sees your posts and personal information. Use them to control who access to your page, contact information, etc.

Protect your password – Choose your passwords wisely, incorporate numbers, letters, and special characters, and never use the same password at more than one site.

For those who may need new internet security software, you should select a program that has a multi-level security program to:

  • Block viruses, spyware, spam, Trojans, worms, rootkits, and keyloggers;
  • Make your PC invisible to hackers;
  • Encrypt passwords and remember them for you;
  • Offer multi-layer identity protection;
  • Provide firewall security.
Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Data Centers To Go Wireless

Data Centers To Go Wireless

MIT’s Technology Review reports researchers from IBM (IBM), Intel (INTC), and the University of California, Santa Barbara have come up with a way to improve data transmission in data centers. Heather Zheng, associate professor of computer science at UCSB who led the research says wireless is the answer to the in-rack cabling mess usually found in data centers. In their paper (PDF), the researchers say that transmitting data wirelessly within a data center would be simpler than rewiring data for tech titans like Google (GOOG), Facebook, or Twitter.

Line-of-sight connections

WiFi radio wavesThe earlier challenge for multi-gigabit wireless in the data center was it required a line-of-sight connection to be useful. Achieving the required data center speed could not happen in the maze of metal racks, HVAC ducts, and electrical conduits that make up most data centers.

TR reports that the researcher’s solution is to bounce 60-gigahertz Wi-Fi signals off the ceiling, which could boost data transmission speeds by 30 percent. Stacey Higginbotham at GigaOm points out that this could result in data transfers up to 500 Gigabits per second. She says current Ethernet cables in data centers are generally 1, 10, or maybe 40 gigabits per second.

60-gigahertz Wi-Fi for servers

Data center ceiling WiFiMs. Zheng and colleagues used 60-gigahertz Wi-Fi, which has a bandwidth in the gigabits-per-second range and was developed for high-definition wireless communications according to TR. However, it has its limitations, says Ms. Zheng. To maximize the bandwidth and reduce interference between signals, it needs to use 3D beamforming to focus the beams in a direct line of sight between endpoints. “Any obstacle larger than 2.5 millimeters can block the signal,” she says in the TR article.

One way to prevent the antennas from blocking each other would be to allow them to communicate only with their immediate neighbors, creating a type of mesh network. But that would further complicate efforts to route the data to the proper destinations, Professor Zheng told TR. Bouncing the beams off the ceiling directly to their targets not only ensures direct point-to-point communication between antennas but also reduces the chances that any two beams will cross and cause interference. “That’s very important when you have a high density of signals,” she says.

Flat metal plates placed on the ceiling offer near-perfect reflection. “You also need an absorber material on the rack to make sure the signal doesn’t bounce back up,” says Ms. Zheng.

Wireless can add 0.5 terabytes per second

Data centerAccording to Technology Review, the UCSB team worked with Lei Yang from Intel Labs in Oregon and Weile Zhang at Jiao Tong University in Xi’an, China, to simulate a 160-rack data center to see how the system might work. “Our simulation shows that wireless can add 0.5 terabytes per second,” she says.

IBM is also looking into using wireless technology in data centers, Scott Reynolds, a researcher at IBM’s T.J. Watson Research Center in Yorktown Heights, NY, who has been developing 60-gigahertz systems told TR. “These data centers are just choked with cables,” he says. “And so every time you want to reconfigure one it’s very labor-intensive and expensive.” But one problem with turning to wireless transmission, he adds, is that “you need to have hundreds of these wireless data links operating in a data center to be useful.” Since 60-gigahertz Wi-Fi has only four data channels, it’s important to configure the beams so they don’t interfere with each other.

Mark Thiele, the EVP of data center technology at Switch CommunicationsSuperNAP data center, told GigaOm that the research is worth following as low-latency networking inside the data center can be a bottleneck today for applications that range from financial trading to trying to move gigantic data sets around.

TR reports Ms. Zheng and her colleagues are now working on building a prototype data center to put their solution into practice.

rb-

Cable mess under a raised floorHaving just done a small data center cleanup, the idea is appealing. We pulled out 2 generations of cabling, IBM Type 1, and a bunch of Cat 3 multi-pair out from under the deck.

Ms. Higginbotham says the choice of 60 GHz for the data center is a smart move. Intel is pushing 60GHz for consumer use, under the WiGig brand (I wrote about WiGig in 2010 here). This means the chips would be cheap.

Some of the possible security issues raised by running Wi-Fi in the data center are tempered by using the 60Ghz range. She says if you are worried about someone standing outside the data center trying to eavesdrop on the data you are transmitting the 60Ghz, signals deteriorate rapidly.

Of course, change is hard and data center guys are going to have to learn wireless and top-of-rack switches would have to get radio cards installed. The Wi-Fi reflective panels would have to be installed on the ceiling of the data center and the servers would need a signal-absorbing surface so the Wi-Fi signals don’t continually bounce around the data center.

Just if you are confused about WiGig, Wi-Fi, and IEEE, EETimes says, “WiGig forged a deal with the Wi-Fi Alliance so its 60 GHz approach can be certified as a future generation of Wi-Fi. The group has aligned its technical approach with the existing IEEE 802.11ad standards effort on 60 GHz.”

Now if only they could do wireless electricity……..

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.