Friday, August 12, 2011

About TechnoPopular

Posted by echa 9:54 PM, under | No comments

TechnoPopular TechnoPopular is the most important technology news, developments and trends. Coverage includes hardware, software, networking, wireless,  computing, personal technology, reviews, science, core services, security and cutting-edge technology from the business world to the consumer world.

Tech News » Mozilla's Boot 2 Gecko: Who Wants Another Web-Based OS?

Posted by echa 9:34 PM, under | No comments

Mozilla's Boot 2 Gecko: Who Wants Another Web-Based OS? | Mozilla's Boot 2 Gecko "If this doesn't show Mozilla has lost their way, frankly I don't know what does," said Slashdot blogger hairyfeet. "Remember when Firefox was supposed to be the 'fast, light' browser? What happened? I'll tell ya: They got a bad case of Chrome envy and have been shooting themselves in the foot ever since."

Well it's been another scorching week here in the Linux blogosphere, where all the vegetation has been baked to oblivion and all the tempers are running hot.

There's nary a drop of water to be found around here anymore -- all the wildlife have packed up and set off in search of more hospitable ground -- but at least there's still the Punchy Penguin blogobar, where the shades remain drawn and the air conditioning stays on High.

Linux Girl was comfortably settled on her favorite barstool for the day, in fact, when a brawl broke out in the pool room in back. Turned out it was over Web-based operating systems, and which one looks the most promising.

It was then that Linux Girl first learned of Mozilla's crazily named "Boot 2 Gecko" plans, and ever since her head has been ringing with questions. What about Chrome OS? What about Webian Shell? What about Jolicloud, for that matter? And why now?

Linux bloggers seemed to be pondering similar queries.

'I Don't Want a Mozilla OS'

"Maybe Mozilla should focus on making a useable Android browser before trying to re-invent the OS," suggested brunes69 on Slashdot, for example. "Firefox for Android is abhorrent compared to the built-in Webkit browser."

Similarly, "How about just going back to making a good desktop browser?" agreed Elbereth. "I don't want a Mozilla operating system, some sort of 'open web experience,' a smartphone browser, or anything else that Mozilla is peddling these days.

"I want a browser that's dedicated to desktop computers, with a UI designed for a big, desktop monitor (not a netbook or a tablet), and I want the browser to render HTML," Elbereth added. "I don't need a database in my URL bar; a radical, new UI; an integrated PDF viewer, implemented in Javascript; Harry Potter themes for my browser; or anything else that Mozilla has been advertising (except for the faster Javascript performance, which is pretty nice)."

'Just Ignore Everything Else'

Then again: "I'm using Firefox 5.0 right now, and it's probably the best browser they've made thus far," countered derGoldstein.

"They're already working on future versions," derGoldstein added. "If they feel they can develop additional software that's adjacent (or possibly contains overlapping code) to the browser, then why not? If their function, in your eyes, is to make a good desktop browser, then you should be pleased. Just ignore everything else they do if you find it distracting."

And again: "You gotta realize that with smartphones outselling computers, if Mozilla doesn't get into mobile web browsers (and yes, Firefox mobile for Android needs A LOT OF WORK), then they won't have a say in the open web one day," offered kangsterizer, referring to Boot 2 Gecko's stated focus on the mobile arena.

'Very Limited Appeal'

The dusty patrons down at the Punchy Penguin had their own opinions.

"Interesting idea," opined Chris Travers, a Slashdot blogger who works on the LedgerSMB project, for example. "I think these approaches have very limited appeal. After all, a lot of people, including me, prefer to have a lot that works on the client even when there is no internet connection."

And while it is "certainly possible to write word processors and spreadsheets that will do this with boot to gecko, you have a chicken-and-egg problem in that it is hard to justify this without a user community and it is hard to get a user community that needs this without the software," Travers pointed out. "Java equivalents help, but in a lot of areas there are not a lot of really mature options."

Travers' prediction, then, "is that this will become common on internet kiosks and uncommon elsewhere," he said.

'A Bad Case of Chrome Envy'

Consultant and Slashdot blogger Gerhard Mack took a similar view.

"It is still far too early for a web-based OS, since a lot of the world (and even a lot of the US) don't have internet connections reliable enough to pull this off," Mack pointed out.

For Slashdot blogger hairyfeet, Mozilla's move is a symptom of something bigger.

"If this doesn't show Mozilla has lost their way, frankly I don't know what does," hairyfeet told Linux Girl. "Remember when Firefox was supposed to be the 'fast, light' browser? What happened? I'll tell ya: They got a bad case of Chrome envy and have been shooting themselves in the foot ever since."

'The Chromium Engine Is Better'

To wit: "FF sucks memory like there is no tomorrow, slams the CPU, and they expect to use THAT engine on mobile devices, an area that is typically RAM and CPU starved? The Gecko engine simply can't do what Chromium can, and the sooner Mozilla either accepts that or decides to rewrite Firefox, the better," hairyfeet opined.

In short, "the Chromium engine is simply the better engine, no doubt about it," he concluded. "Thinking they can pull a 'me too!' and do what Chrome can simply isn't based in reality."

Blogger Robert Pogson, however, took a more upbeat view.

'No One Can Predict the Outcome'

"Innovation is always a good thing," Pogson told Linux Girl.

"I am not sure we need yet another OS, but who knows? Alibaba, Baidu, Google (Nasdaq: GOOG), Intel (Nasdaq: INTC), etc., are all doing similar things," Pogson noted. "No one can predict the outcome.

"We want the world to produce its own software, and everyone needs a focus," Pogson concluded. "I expect software developers will push for a unified platform like Java or Dalvik to make the multiple OSes less of a problem for them."

Tech News » HowStuffWorks: A Wild and Wonderful Cornucopia of Explanations

Posted by echa 9:31 PM, under | No comments

HowStuffWorks: A Wild and Wonderful Cornucopia of Explanations | HowStuffWorks HowStuffWorks for iPad is a seemingly endless supply of information and explanation about anything from movie stunts to quantum physics. It surrounds you with information in a variety of media forms, and it just makes you want to learn more and more, bit by bit, about everything. It seems more like an entertainment app than a practical how-to guide, but it sure is

HowStuffWorks, an app from HowStuffWorks.com, is available for free at the App Store.

There is a HowStuffWorks app for iPhone, but I went for the iPad version -- bigger, better, easier to navigate and consume, especially when I want to kick back and learn about how things work. I was expecting a nitty-gritty experience of things like how combustion engines work, or how a potato-launching spud gun manages to blast a tuber 100 yards. Well, I got what I was expecting, but so much more.

HowStuffWorks | Stuff to Blow Your MindWhat's the more? More information about less-mechanical things, like how lying works, how makeup works, the top five most poisonous plants, and communicating with animals. HowStuffWorks is like a giant cornucopia spilled out over your desk, the floor, and when you want more, you just tap away on your iPad to dislodge a few new explanations, like signals from black holes or how to fix a small drywall hole.

This seemingly endless supply of explanations is served up through more than 40,000 articles and 12,000 video clips. Some clips come from high-profile sources, like Bear Grylls from the TV show "Man vs. Wild." While you don't get the entire show, you can see how Grylls roasts a snake in a survival situation. Just an example. I also watched the dudes from "Mythbusters" try to jump a speedboat like James Bond.

A Feast of Information

All these articles and videos seem almost overwhelming at first glance, but then you tap one, and boom, you learn something new. And all this learning-something-new in small little nuggets might lead to an addiction of sorts -- with every tap, you give your brain a bit of something new to chew on, like stuff you missed from history class. It's like learning without a reason.

Of course, you can search, and when you search for combustion engines, for example, you'll get a lots of different options to learn about engines, including everything from two-stroke engines to jet turbines.

In addition to the articles and videos, there are more than 1,000 quizzes containing more than 30,000 questions. I tried a few quizzes, and while functionally they work well and have some interesting questions, I'm not really a quiz kind of guy, and I'm not interested in earning badges of any sort. While the quizzes are sprinkled throughout the HowStuffWorks experience, you can choose to filter out media types. If you don't want quizzes, you can hide them. Same theory works if you just want to see video options.

And about the videos: They are all AirPlay-enabled, so you can watch them on your Apple (Nasdaq: AAPL) TV-connected HDTV, too.

Any Podcasts?

Along with videos and articles, there's an entire section of podcasts. At first, listening to a podcast on my iPad seemed odd, but only because I've never bothered to before -- I've always consumed podcasts through my iPhone or iPods. Still, good old audio explanations and topic discussion -- not bad, not bad at all.

The app also sports all the typical email and social media 6 Ways to Use Social Media for Business. Free Guide. sharing tools, along with a really handy "star" button for creating a list of favorites you can refer back to easily. Some of this stuff, especially the quantum physics and explanations for our universe(s), need a little mind-bending and massaging to get -- or even just sort of get. Like quantum suicide. I'm still mulling that little theory over.

The Advertisements

So far, I've found the built-in ads that make the app free for consumers to be both easily noticed and ignored. The iPad form factor lets the app deliver a banner ad, for example, at the bottom. It sits there permanently, it seems, while you scroll through the content. Tap it, and you'll get a quickly loading full-screen ad experience that you can also easily leave to return to the content. Nice, actually.

The first time I got served up a video commercial, though, I was confused. I was looking to learn how to find a stream in Costa Rica, again, with Bear Grylls, when an ad for a Toyota loaded into the video window first. I thought I had miss-tapped until I realized what was going on. The price of free, you know.

All-in-all, I see HowStuffWorks for iPad more as an entertainment app than an answer finder, though I do believe that I might start considering it for answers to life's vexing questions as using the app becomes more embedded in my frontal lobes.

Tech News » Dilbert Gets Windows Phone 7, the US Gets the Three Stooges

Posted by echa 9:23 PM, under | No comments

Dilbert Gets Windows Phone 7, the US Gets the Three Stooges This is like watching divorce court, in that neither side is being reasonable, both come across as a bit nuts, neither wants to admit they are equally to blame, or to pay for the mess they created. This has been great for Twitter, which now seems to be fomenting the kind of revolution that was such a big hit in Egypt. It is kind of gutsy for politicians to create demand for a party that might have barbecued lawmakers as appetizers.

The two things I found particularly interesting last week were the continued focus on the U.S. government's inability to live within its means and Scott Adams, the father of Dilbert, accepting the Windows Phone 7 challenge. The first continues to piss me off because both sides seem to be unable to grasp the need to actually live within a budget, and the second provides a much-needed chuckle and some attention to what is likely the most underappreciated operating system in the market.

The two concepts -- politicians seeming to work really hard to ignore the actual problem and Microsoft (Nasdaq: MSFT) giving a product to a guy who likely will make fun of folks who have lost their sense of humor, like Steve Ballmer -- seems to be perfect for a Dilbert cartoon. In addition, I find I could use a chuckle this week myself, so let's see if I can find a way for us to laugh a little about both of these events. Granted there was a third major event last week, Harrison Ford refused to settle a long standing feud, but unfortunately, I'm still too upset to talk about that.

I'll close with my product of the week: the HTC Status, a phone that wants to be the perfect BlackBerry replacement but falls a little short.

Zune: History of the Bizarro iPhone

I've been researching both what's been going on in Microsoft over the last decade, in general, and the path to the Windows Phone 7, in particular.

For instance, the path to the Windows Phone 7 started with a major push inside Microsoft to create an iPhone before there was an iPhone. It appeared clear to many of the executives that what was needed to compete with the iPod was a music device that was also a phone. It was also clear that Microsoft's sustaining advantage against Apple (Nasdaq: AAPL) was its ability to license its platforms to a broad market. Also, that Microsoft's one big successful strategy was "embrace, extend, extinguish."

Then, an executive who shall remain unnamed -- but must be related to Dilbert's pointy-haired boss -- created the first Zune, a product that didn't embrace the iPod at all, that only connected wirelessly to other Zunes. In effect, it was an iPhone without virtually everything that made the iPhone compelling. It killed Plays for Sure, the only competing iPod platform that had any traction. Then to add to this theme, the product design group created a butt-ugly product and led with the color brown, which provided a distinct and lasting comparison to dog poop.

The memorable joke: "What did Microsoft do when they had the opportunity to beat Apple to market with an iPhone? They Pooped a Zune."

What is the first thing it did when the Zune didn't' sell? Make the Poop look better.

What is the second thing ity did when the better-looking Zune didn't sell? Reduce the variety and cut marketing .

What is the third thing it did? Actually build a licensed platform that was a better phone than the iPhone. And then instead of calling it something trendy, Microsoft named it "Windows Phone 7" because, well, Windows phones had been so incredibly successful, it didn't want to lose all that wonderful equity.

In short the company spent nearly a decade doing some of the most incredibly stu..., er, creative things imaginable only to finally get it right. They it gave the phone to Scott Adams, who probably won't find anything in this story worth writing about.

The Three Stooges (House, Senate, President) and how to F*Up Washington

So the nation is in a world of hurt and this is largely because our government is spending substantially more than it is making. It is currently trying to get permission to borrow more money without any real focus by the old-time politicians on actually addressing the core of the problem, which is the country is buying too much and not making enough. Some really foolish new politicians are trying to force government to demonstrate fiscal responsibility and balance the budget. What a bunch of, er, Hobbits?!?

Yes, John McCain got so upset he called the foolish folks who are trying to force fiscal responsibility "Hobbits," which suggests he didn't actually watch "Lord of the Rings," or is using some kind of brilliant reverse psychology.

In that movie, the only guys who thought the Hobbits were bad either were big evil flaming eyes, or bad wizards who burned smart trees to make Orks bigger and dumber. Let's see, very pro-business anti-ecology -- OMG John McCain is Saruman (I always wondered what happened to that guy). No wonder he doesn't like Christine O'Donnell (wizards aren't fond of witches). He also seems to have forgotten that his ex-running mate is now a Tea Party favorite. Though, granted, you can learn a lot from Sarah -- like that Paul Revere worked for the British and was a huge gun rights advocate.

This is kind of like watching divorce court, in that neither side is being reasonable, both come across as a bit nuts, neither wants to admit they are equally to blame, or to pay for the mess they created. This has been great for Twitter, which now seems to be fomenting the kind of revolution that was such a big hit in Egypt. I have to admit it is kind of gutsy for our political leaders to create demand for a party that might have barbecued lawmakers as appetizers. This is bad for politics but bodes well for a Three Stooges remake (I'm a fan).

Crap -- when did C-SPAN become the comedy channel? Jon Stewart will be so pissed.
Wrapping Up: Ensuring Success for Democratic and Republican Plans

To net out the Democrats' push, it appears to be to make the Republicans pay more taxes, thus getting the Republican politicians fired. To net out the Republicans' strategy, it is to cut funding to key Democratic programs and thus get their Democrat counterparts fired.

The goal for the U.S. citizen should therefore be to make sure the second part of both plans succeeds. Now that would be government by the people. Funny thing, you'd think one of the first things you'd learn when becoming an adult is how to balance a budget.

Channeling Dilbert, I think the first step to fixing the debt problem is to tie politicians' total compensation (including gifts) and benefits to U.S. financial performance. I'll bet things would get fixed a lot faster that way. Or we could elect more wizards and witches, because that has as big a chance of fixing the current problem as what both parties are separately advocating.

Product of the Week: HTC Status, the BlackBerry of Android Phones

Product of the Week | HTC Status
There is no product quite like the HTC Status to showcase both Android's promise and problems.

On the good side, it is a full Android phone, which means an iPhone clone, but on more of a traditional BlackBerry hardware platform.

HTC Status
HTC Status
Basically, it's designed to be great for anything involving text entry and written communication. The small screen makes browsing the Web, games, and movies less exciting than on an iPhone. The hardware design is clean and attractive, and the camera on the back of the phone is more than adequate.

Like most Android phones, the software feels a bit raw, and it lacks the elegance of an iPhone or Windows Phone 7 product. This phone isn't for everyone; you should have a tolerance for some minor software headaches and love to live on text-based services like email, social networking 6 Ways to Use Social Media for Business. Free Guide. and forums.

I like choice. Not everyone wants an iPhone or iPhone clone. For those who want something different and rely on text communications, the HTC Status may be the best Android phone in the market. Because that mostly fits my own profile, the HTC Status is my product of the week.

Tech News » The Greening of Government IT

Posted by echa 9:14 PM, under | No comments

The Greening of Government IT | GSA and EPA GSA and EPA will establish multi-stakeholder groups -- including IT equipment vendors -- to address key research questions and design challenges, and accelerate the development of and investments in green electronics design standards. GSA will "more effectively direct federal government spending on electronics toward green products through procurement changes," according to a benchmark document it released.

The U.S. government is actively pursuing a major shift in information technology operations that emphasizes the use of cloud technology. While this effort eventually may reduce the amount of "on-site" electronic equipment used by federal agencies, other forces are at work that will keep the government's demand for electronic devices and components at a high level. Throughout the federal government, agencies are shifting to using more portable devices such as laptops, cellphones, netbooks and tablets.

In addition to meeting functional standards and requirements for such equipment, the U.S. government has added another element to its procurement regimen: All purchases of electronic equipment must meet an expanded set of environmentally acceptable goals.

The Obama administration released its National Strategy for Electronics Stewardship on July 20 in a joint announcement from the Council on Environmental Quality (CEQ), the Environmental Protection Agency and the General Services Administration. The program is aimed at the design, purchasing, management and recycling of electronic equipment.

The strategy will ensure that the federal government, as the United States' largest consumer of electronics, "will become the nation's most responsible user of electronics," said Martha Johnson, GSA administrator. The strategy covers both conventional equipment, such as servers, desktops and printers, and more recently developed mobile devices.

A $14 Billion Market

"In our dual role as the government's premier procurement agency and property disposal expert, GSA will lead the government by purchasing more strategically and recycling more responsibly," Johnson said. The U.S. government spends nearly US$14 billion per year for IT equipment.

According to the plan, GSA will remove products that do not comply with "comprehensive and robust energy efficiency or environmental performance standards" from the information technology purchase contracts used by federal agencies, and it will ensure that all electronics used by the federal government are reused or recycled properly.

The program is centered around the use of electronic products that are compliant with two existing initiatives: EPEAT, and Energy Star. EPEAT is a definitive global registry for green electronics, which serves as a resource for purchasers, manufacturers, resellers and others wanting to find or promote environmentally preferable products.

Energy Star, launched by the EPA and the U.S. Energy Department in 1992, is a program designed to identify and promote energy-efficient products to reduce greenhouse gas emissions. Computers and monitors were the first labeled products.

GSA will implement the stewardship program in several ways, according to a "benchmark" protocol that accompanied release of the national strategy. The agency will work "to the maximum extent practicable" to remove all products from the standing government-wide IT acquisition contracts that are not Energy Star- or EPEAT-compliant, where compliant products are also available

"GSA will implement this policy by requiring compliant products in all new contracts, as well as current contracts as they come up for renewal," the agency said in a statement provided to CRM Buyer by spokesperson Cara Battaglini.

Purchasing requirements related to Energy Star and EPEAT products are already in place, so a separate rulemaking process will not be necessary, GSA said. Noncompliant products will continue to be available on any contracts that currently offer them and have not come up for renewal.

"Eventually, GSA will exclusively offer compliant products for purchase through our online purchasing site, allowing federal agencies to quickly and easily meet the requirements," GSA said. The agency does not plan to maintain lists of noncompliant products.

GSA will join the EPEAT standard development process to represent the interests of the Federal government as a consumer. GSA and EPA will establish multi-stakeholder groups -- including IT equipment vendors -- to address key research questions and design challenges, and accelerate the development of and investments in green electronics design standards. GSA will "more effectively direct federal government spending on electronics toward green products through procurement changes," according to the benchmark document.

In addition to the equipment procurement program, federal agencies will initiate a robust program to re-use and recycle electronic equipment, including encouragement of U.S. based recycling centers and cooperative efforts with manufacturers on take-back programs.

Vendor Cooperation

The Obama administration took care to launch the initiative jointly with private sector organizations, including scheduling an announcement event at a Texas electronics recycling center. Representatives of Dell (Nasdaq: DELL), Sony (NYSE: SNE) and Sprint (NYSE: S) participated in the event.

"Dell strongly supports the Energy Star and EPEAT standards and will continue to register products to these standards in support of our customers," said Mike Watson, director of Dell Take Back Programs.

"Our goal is to deliver the highest quality and energy efficient products with the least impact on the environment," he told CRM Buyer.

"Our current policy and this commitment with the EPA highlights our goal to handle electronic waste holistically -- from product design to disposal -- and is another proof point to our broader commitment to sustainability innovation," said Sprint CEO Dan Hesse.

Tech News: The New Must-Have App for Parents: FBI Child ID

Posted by echa 9:08 PM, under | No comments

FBI Child ID | The New Must-Have App for Parents: FBI Child ID When a child goes missing, parents and other caregivers must immediately give relevant identifying information to the police -- height, weight, hair color, eye color, birthmarks, etc. In the panic that often surrounds such moments, that information may not come together as quickly as it needs to. The FBI's latest contribution to the App Store is intended to address that.

FBI Child ID, an app from the FBI, is available for free at the App Store.

The U.S. Federal Bureau of Investigation (FBI) has released a fabulous new app to help locate missing children, but it has one glaring omission: password protection. Still, there's a lot to like in this new free iOS-based app called "FBI Child ID."

FBI Child ID | The New Must-Have App for ParentsThe premise for the app is this: When a child goes missing, precious time is wasted while frantic parents, grandparents or caregivers gather relevant information for the authorities to aid their search. It seems like simple things like hair color and eye color and photos would be in their minds ready to share, but I imagine they could be difficult to say when your child has disappeared. This app not only aims to help keep those details handy, but it compiles additional key details like height, weight, and any other identifying characteristics, like birthmarks.

Plus, there's room to enter additional comments where parents can add less-common information, like medications a child might need.

Photos, Too

While the app does not yet let you use a photo from your iPhone, iPod touch, or iPad's camera roll, you can snap a photo of your child through the app to use. Unfortunately, the app only appears to let you snap one photo, so parents should make it a good one.

At the same time, while the app does let a parent enter in quite a bit of information, only a clear-headed parent will be able to add what a child was last wearing, like a blue coat, white basketball shoes, jeans, etc.
What Happens Next?

If a parent downloads the free app, which is currently only available for iOS, it's easy to add a child to the app through a self-explanatory form. In the unlikely event that your child does go missing, the app (and the FBI) recommends that you first call 911. In fact, the emergency button at the bottom of the app provides a big red button that says, "Call 911." (I didn't test this, but I assume it works.) There is another button for calling the National Center for Missing and Exploited Children.

After that, how do you get the information from your iPhone to the authorities? Presumably the only way is to get an email address from a 911 dispatcher, but I'm guessing you would be verbally relaying this information to the dispatcher in the first place. Once you have the email address of the local authorities, you can email the missing child report, using your own default email address and service you use with your iPhone.

It's important to realize that the FBI doesn't not collect or store any of the information you place in the FBI Child ID app. In fact, the FBI wouldn't even get involved in your missing child case until the local authorities alert the FBI or you contact the agency directly. There is a handy "Checklists" feature, too, that walks a parent through what should be done if their child goes missing. No. 2 on the list, right after calling 911, is to ask local investigators to put the missing child in the FBI's National Crime Information Center (NCIC) Missing Person's file. And No. 3? "Request that the FBI be involved in the search for your child."

Great Top-of-Mind Details

Anyone who has been around children knows how easily they can wander off and get lost, never mind the heartbreaking chance they could be abducted. In my mind, the best thing about the FBI Child ID app is that it would seemingly help a parent be more aware about the potential for disaster, as well as what to do in the event their child disappeared.

On the downside, the biggest problem with the app is that it encourages a full profile of your child ... but doesn't provide for rudimentary security of that information. For instance, even my "to-do list" apps provide app-based password protection through simple PIN numbers. There is no such PIN for FBI Child ID. It's possible that the FBI has some experience with frantic parents, and maybe frantic parents can't remember PIN numbers. If this is the case, the security feature would defeat the app.

Still, I can imagine plenty of parents who might be weighing the pros and cons of using the app without some small measure of security. Sure, you can secure your iPhone with a PIN, but who wants to constantly be entering a PIN each time you want to access your iPhone?

Then again, this issue is more about a parent's feelings than reality: What are the odds that some kid-focused bad guy will snag your iPhone and then use this app to harm your children? Even without the FBI app, I'm guessing that most parents have plenty of pictures and various other details, perhaps easily called up through social networking 6 Ways to Use Social Media for Business. Free Guide. apps, that would make them uncomfortable if the iPhone got into the wrong hands. I'm no mathematician, and while the FBI claims a child goes missing in the United States every 40 seconds, I'm guessing that the odds of your iPhone being used against you and your children is significantly smaller than the chance that your child will go missing in the first place.

My recommendation? If you've got kids, get the app. At least you can decide to use it in the heat of the moment, say, while you're waiting in line to get into your local theme park. And when the FBI finally comes around to giving super-safe parents the ability to lock the app with a password, you'll get the notification to update the app when it's available.

Internet » Social Menaces

Posted by echa 8:52 PM, under | No comments

Social Menaces | highly effective vector for cybercriminals Socially engineered attacks are a highly effective vector for cybercriminals. Using highly versatile social engineering techniques, attackers can exploit an online professional network to target employees who are not likely to be data security experts, but who may have access to various essential data resources stored within the organization's network.

In terms of online communication, social media 6 Ways to Use Social Media for Business. Free Guide. is the biggest trend in recent years. There are billions of participants around the globe as well as an array of forms: blogs, forums, wikis, multimedia content, social bookmarking and, of course, popular platforms such as Facebook, Twitter and Google+.

What's more, social media is strongly established as an important channel for companies to communicate with their customers. Corporate social media pages keep users informed about products and trends in an informal way and allow a simpler, more effective method of communication between the two parties.

Another important aspect worth mentioning is that social networks are among the few platform-independent applications currently in existence, which means that they can run on any PC with a fairly recent browser installed, as well as on all of the main mobile platforms: iOS, Android, Symbian and Windows.

Don't Become a Zombie

Predictably, the millions of contacts, email addresses, pictures and other sensitive data present on social networks make them a prime target for cybercriminals. Part of the issue here is that social networks sometimes encourage users to keep personal data public as the default privacy setting.

Many social networking sites and profiles could provide an ideal and cost-effective platform for the distribution of a range of malicious content such as viruses, bots, Trojans, spyware and adware. The way in which these threats can be spread is not limited to simple tactics such as posting infected links on a wall with an appealing call-to-action -- "see who viewed your profile" is one most of us are aware of -- or stealing email addresses to send malicious attachments en masse.

We have also seen cases where a piece of code has been attached to a profile page, so that when the user logs in, a bot is automatically downloaded into the system, transforming the unprotected computer into a "zombie" -- a compromised machine that is part of a larger net of infected machines, called a "botnet," which an attacker remotely controls.

Details such as the user's list of friends can also be easily exploited by attackers. A potential intruder could then gather data concerning the size of the organization, its employees' hierarchy, their work expertise, degree of IT and communications literacy, etc. This information might simply outline the profile of the most vulnerable employee who could later be tricked into revealing even more sensitive data that will open a backdoor into the company's network.

Layers of Protection

Scenarios involving combined tactics are also possible. Using highly versatile social engineering techniques, attackers can exploit an online professional network to target employees who are not likely to be data security experts, but who may have access to various essential data resources stored within the organization's network.

Let's consider an example in which cybercriminals try to persuade the victim to deliver sensitive data by email. They may well carefully craft a message so as to give it the appearance of an official and legitimate message, coming from the organization's CEO, for instance. This will have a higher likelihood of being noticed and opened. The email may well include a PDF attachment containing malware, which once opened by the recipient will activate the threat and allow access into the organization's network to easily extract further sensitive data.

With such a range of information about users easily available online, socially engineered attacks are a highly effective vector for cybercriminals. So what can be done to combat them? Along with using a security solution, there are a few basic protection methods available to all users.

Have a strong password policy. Use a strong password to social network accounts; reusing the same passwords for other accounts means a higher exposure, as once the password is stolen, the attacker has access to all associated accounts.

Generating a 12-character password that includes both upper and lower case characters, and which do not contain common names or brands, is a minimum requirement. Do not store the password to the account in the browser if you are using a laptop outside the company network. If you cannot avoid it, it is recommended that you encrypt your file system.

Use encrypted connections. Always browse the social network under a secure connection ("https" prefix in the browser). Be careful to switch secure browsing back on once you have accessed content on pages that do not have SSL support. Moreover, never switch to an unsecure connection while in an open/unsecured network.

Enable all log-in notifications. Facebook allows you to get notified by email or SMS every time somebody logs in to your account from a new device. This helps you identify more rapidly any suspicious activity that may take place.

Prepare a recovery plan in case of account hijacking. In the event your account is hijacked, in order to regain control over it, you will be requested to provide verification information. For verification purposes, it is advisable to associate your account with a phone number. However, you should also keep in mind that it's very easy for a social network account to be hijacked if the phone on which the account is set up is stolen.

Carefully monitor any mobile phones that can allow access to the company's social network accounts. Login to the social network accounts from the mobile phone should not be automatic, as this poses a higher risk of illegitimate access in case the phone is stolen. The phone should lock automatically.

Select and train account/page administrators. Limit the number of users who have access to the corporate page/account, and make sure they are aware of the e-threats associated with communication within this environment. Depending on the social platform permission structure, abide by the minimum access rights rule so that employees can interfere with the account operation/content only within predefined limits. For example, an employee may only require access to statistics info on the account activity, which makes it unnecessary for that person to have full administrative rights.

Train employees who are to become administrators of company pages/ accounts to carefully select the applications they install, making sure that they have read the list of requested permissions and have assessed the risk of seeing important info posted in the account being taken over by apps with a hidden agenda.

Enforce strong security policies. The security of social network accounts depends on the security of the computers/smartphones they are accessed from. The exposure of these devices to data leaks or to infections with malware using social media as a propagation medium can have serious consequences.

Protect your company from targeted attacks. To avoid being contacted by unknown persons who seek to fraudulently obtain information about the company or about its organizational chart, employees should adjust their social network account settings so that the content they post is only visible to their friends. In this context, employees should proceed with caution when interacting with unknown persons online.

Protect your user information. Should you develop an application that collects and stores users' private data, make sure that you encrypt this info using a strong algorithm. Remember to adequately protect the API key and secret of your applications. If you use input forms to collect information from your users, make sure that it is transferred to your servers over a secure connection.

Carefully select online published content. Remember that it will be very difficult for a specific piece of content to be completely erased once it has been published online. Web robots permanently scan for online content and multiply it in an uncontrollable way. Before posting content online, carefully assess the legal and reputation consequences the published material may have.

Internet » Beware of Corporate Recruiters on Facebook

Posted by echa 8:47 PM, under | No comments

Facebook | Beware of Corporate Recruiters on Facebook I'm starting to wonder -- especially if corporate recruiters ultimately come to favor Facebook over LinkedIn -- if we're quickly approaching the day when it will be impossible to maintain distinct professional and personal personas. ... While LinkedIn is widely recognized as the premier social network for professionals, it hasn't inspired the type of emotional connection that users seem to have with Facebook.

It's no secret that nearly everyone is on Facebook. So, it shouldn't be a surprise that corporate recruiters are starting to infiltrate the world's largest social network in search of potential new hires.

It makes sense for corporate headhunters to set up shop on Facebook for numerous reasons, starting with the sheer number of people who are present on the platform. There also are a number of reasons Facebook members who think they might find themselves looking for a job any time in the future should be concerned about this development.

First, let's talk about what recruiters may or may not be doing on Facebook. Companies are starting to use their own Facebook pages to post job openings free of charge, according to a recent report in The Wall Street Journal, rather than pay the several hundred dollars it might cost to list a single opening on a regular job site like Monster.com.

So far, only a few companies are employing this strategy, accounting for less than 1 percent of total corporate hiring, according to Job2Web, a firm that specializes in using Web technology in the recruitment process.

If the trend continues, however, Job2Web notes that it won't be long before Facebook becomes a threat to online job boards as well as to LinkedIn, which currently is the premier site for professional networking.

Monster and LinkedIn Respond

Recognizing that possibility, Monster.com recently launched a Facebook app and is preparing a campaign for companies to offer employees cash rewards for using the app to refer candidates. A few independent software developers have recently released recruitment apps for Facebook as well.

LinkedIn's response to Facebook encroaching on its territory has been to simply note that its user base -- which totals roughly 100 million in comparison to Facebook's 750 million -- prefers to maintain separate personal and professional networks.

I understand that sentiment. It's why I can be found on LinkedIn, but not on Facebook. However, I'm starting to wonder -- especially if corporate recruiters ultimately come to favor Facebook over LinkedIn -- if we're quickly approaching the day when it will be impossible to maintain distinct professional and personal personas.

When I first heard recruiters were combing Facebook in search of new talent, I questioned the logic behind that strategy. As I explored further, however, it began to make more sense.

While LinkedIn is widely recognized as the premier social network for professionals, it hasn't inspired the type of emotional connection that users seem to have with Facebook.
Facebook's Allure

Facebook users tend to check their sites every day -- in fact, many of them do so several times a day. LinkedIn users typically can go weeks without checking the site, and when they do so, it's generally a quick look, while Facebook users tend to linger a while.

LinkedIn has taken steps to improve its stickiness. It sends users emails when someone in their network updates a profile, and it's added news feeds in an attempt to grab users' interest when they log in. But lacking an attraction like "FarmVille" -- or just the general feeling that this is a place for hanging out with friends -- LinkedIn will probably never match Facebook's traffic patterns.

The social nature of Facebook contributes to another aspect recruiters like about the site, according to The Wall Street Journal. Several recruiters told the paper that they like having access to detailed resume information available on LinkedIn, but they have found that job candidates tend to place more value on a referral that reaches them through a Facebook connection.
Friends vs. Colleagues

That's probably because most people view the members of their Facebook networks as personal friends -- people they can trust to tell them the real story behind a job, a company or a potential boss. Meanwhile, their LinkedIn networks are filled with people they know primarily -- if not exclusively -- from work or business settings. These relationships have always been somewhat arm's length. So, they may wonder if a job tip coming from this network will include everything they need to know to make an informed decision.

I understand the inclination to place more trust in someone you consider a friend than you would a mere colleague. But this entire situation, for me at least, deepens my resolve to maintain separate personal and professional online personas.

In reality, I only have a professional online persona, and there's a good reason for that. By keeping my private life private -- which means out of cyberspace -- I have at least the hope of controlling what parts of the life may leak over into the professional realm and possibly cost me a business opportunity.
Guilt by Association

Once you create a personal online profile via a site like Facebook and start connecting with other people, your name, picture and your comments can make their way around the world in the click of a mouse. You also raise your chances of being a victim of guilt by association.

Even if you've never put anything that could be considered remotely irresponsible on your on Facebook page, a recruiter could spot some offensive material on the site of someone you're connected to and hold that against you.

A recent incident in my own life made me acutely aware of this possibility. I mentioned to a friend -- in a face-to-face conversation -- that I was trying to secure work from a place where he was previously employed. "Good luck," he said, before telling me not to mention his name to the person who would make the final decision on my bid. "We had a few differences of opinion, and any association with me might not be good for you in this case."
The Value of Privacy

Since this was a private, real-world conversation, I was able to keep his name out of my negotiations and win the job.

Had I been linked to this friend on Facebook, the potential employer might have discovered the connection and eliminated me from consideration.

Would that have been fair? No. But it certainly could have happened, which is why I would advise job seekers to avoid Facebook -- no matter how many corporate recruiters may be lurking there.

If you simply have to do social networking 6 Ways to Use Social Media for Business. Free Guide., try Google+. It gives you a better chance of maintaining a firewall between your personal and professional lives.

Computing » A Visit from the Ghost of Linux Future

Posted by echa 8:45 PM, under | No comments

Linux Future | A Visit from the Ghost of Linux Future "I see Linux going into a smaller, simpler OS, with a good base of apps integrated to the web," predicted Mobile Raptor blogger Roberto Lim. "The standard for ease of use won't be how close it is to MS Windows and Office, but how similar it is to the iPhone or Android." The home desktop is "soon to be extinct," Lim concluded. "So, Linux in a decade: 'Android' on a laptop. Somewhere between Chrome OS and Windows."

Industry pundits may typically favor the start of a new year for making long-term predictions, but here in the Linux blogosphere -- where the dog days of summer have us effectively trapped in a small set of heavily air-conditioned bars and saloons -- we like August.

When else, after all, are the hours so plentiful or the tempers so hot?

That, indeed, may be why TuxRadar's recent Open Ballot -- entitled, "What will Linux look like in 10 years?" -- was met with such glee.

At last, a meaty topic that can help us while away the time until the mercury sees fit to dip below 100 again!

'What Sort of OS Will It Be?'

To wit: "We want you to tell us: how do you think Linux will look, one decade from now?" the TuxRadar mavens asked. "We don't mean in a cosmetic sense (although you're free to comment on that if you want). But rather, what sort of OS will it be, and how will most people be using it?

"For instance, you might predict that the desktop wars will die out and most users will be running little more than a browser on the kernel," TuxRadar explained. "Maybe via Android it'll morph into a free alternative to iOS."

Readers on the site had no shortage of ideas.

'People Won't Talk About It'

"It will look like a cross between Android and MacOS," suggested heiowge on TuxRadar, for example. "Probably. Unfortunately."

Alternatively, "It will look however I want it to look," offered Prolific Puffin. "This is LINUX. That is the entire point of it."

Then again: "Because it will underlie most computing applications in the world, people won't talk about it -- just the applications that run on top of it," predicted John. "Whether you are a FOSS coder or a proprietary, you will differentiate yourself by what the user sees, not what is under the hood."

And, for some comic relief: "I believe they will still be waiting for the year of the desktop," quipped Hamster.

'GPLv3 Has No Place in Their Playpen'

The topic had just barely made it across the wires and into the blogosphere when the first frosty mug was slammed down decisively on the ring-stained surface of the Punchy Penguin's bar. The first local Linux blogger had awoken, and a feisty debate was about to begin.

"What will Linux look like in 2021? That answer is simple...Android!" began Slashdot blogger hairyfeet. "The future is mobile, and Google (Nasdaq: GOOG) has already said GPLv3 has no place in their playpen."

Google also has "the money and the moxie to pull it off by giving their product away for free," hairyfeet added.

'A Diverse Set of Devices'

"Linux won't look like anything," opined Chris Travers, a Slashdot blogger who works on the LedgerSMB project. "It will be powering lots of different devices with many different user interfaces, from touchscreen devices to conventional laptops and desktops."

GUIs for Linux, in fact, "will stop trying to be everything to everybody and start to specialize," Travers asserted.

"I would predict these trends based on the fact that a larger community of users working with a more diverse set of devices will be better able to create specialized interfaces for them," he concluded.
'The Problem Was Not the OS'

Roberto Lim, a lawyer and blogger on Mobile Raptor, looked to the past for insight.

"In trying to figure out where the Linux desktop will be in 10 years, I have to look at why it has not gotten where it could have been by now in the past decade," Lim told Linux Girl.

"I think the Linux OS pretty much became ready for the average user way back in 2003 or 2004," he explained. "The problem was not the OS, but the applications -- people were just too used to IE and MS Office, and similar was not good enough."

'Just an App Launcher'

Indeed, for the typical home and business user, "the OS is just an app launcher," Lim added.

If Office and Photoshop had been made available for Linux, in fact, "I think things could be very different today," he suggested.

In any case, "the main benefit to Linux from the rise of iOS and Android is that people realize there are good apps outside of MS Office and Adobe (Nasdaq: ADBE) Photoshop and other Windows software," Lim said. "Windows' market domination is at its greatest risk ever, and this is where Linux should focus."

'Android on a Laptop'

Linux, then, should not try to compete for "those who are invested into Windows or Mac OS, but the new young generation of smartphone users who are more open to using 'alternative' software, since they grew up on smartphones using Document To Go or PicSay," Lim recommended.

"I see Linux going into a smaller, simpler OS, with a good base of apps integrated to the web," he predicted. "The standard for ease of use won't be how close it is to MS Windows and Office, but how similar it is to the iPhone or Android."

The home desktop is "soon to be extinct," Lim concluded. "So, Linux in a decade: 'Android' on a laptop. Somewhere between Chrome OS and Windows."

'It's the Right Way to Do IT'

Finally, blogger Robert Pogson took an even higher-level view.

"2021 will be another great year for GNU/Linux," Pogson began. "I expect it will have 1/N share of everything in IT, where N is the number of choices of OS."

Linux, in fact, "may well have a much larger share, as we have MeeGo, Android/Linux and who knows how many other operating systems built on the Linux kernel," he pointed out. "Linux will be the core of many because it supports so much hardware."

Windows, meanwhile, "may still have a share of IT," but primarily just "from those lacking imagination or utterly locked-in to M$," Pogson predicted.

"Whether money or malware dictates choices in IT remains to be seen, but freedom to examine, modify, copy and distribute the code will keep FLOSS around forever," he concluded. "It's the right way to do IT."
Katherine Noyes has been writing from behind Linux Girl's cape since late 2007, but she knows how to be a reporter in real life, too. She's particularly interested in space, science, open source software and geeky things in general. You can also find her on Twitter.

Computing » Scientists Pop Atoms in Microwave, Out Comes Quantum Entanglement

Posted by echa 8:39 PM, under | No comments

Scientists Pop Atoms in Microwave, Out Comes Quantum Entanglement | Scientists Pop Atoms Scientists have found a way to force ions into a state of quantum entanglement by using microwaves rather than the typical lasers. The development could point the way not only toward the creation of quantum computers, but also the miniaturization of quantum computers. This research marks the first time that microwave sources were positioned close enough to the ions to enable entanglement.

Researchers at the National Institute of Science and Technology have used microwaves to entangle ions in yet another step toward developing quantum computers.

Quantum entanglement is a feature of quantum physics in which two atoms are linked together in such a way that in order to describe the properties of one, you must describe the properties of the other.

The use of microwaves instead of the normally employed laser beams to entangle the ions indicates that we may be able to shrink down the size of quantum computers.

The microwaves used are similar to those used in smartphones, and NIST speculates that eventually a quantum computer could resemble a smartphone.

However, that doesn't mean quantum computers using microwave technology will impact smartphones close by "because the qubits, or quantum particles, respond only a particular microwave frequency," Susumu Takahashi, a professor at the University of Southern California, told TechNewsWorld.

The NIST researchers did not respond to requests for comment by press time.

About the NIST Experiment

This NIST research marks the first time that microwave sources were positioned close enough to the ions to enable entanglement.

An ion is an atom or molecule that has a net positive or negative electrical charge.

The NIST researchers integrated wiring for the microwave sources directly onto a chip-sized ion trap and used a table of lasers, mirrors and lenses that was only about one-tenth the size of previous equipment.

They held two ions with electromagnetic fields. The ions hovered above an ion trap chip consisting of electrodes made from gold-plated aluminum nitride.

The electrodes were activated to create pulses of oscillating microwave radiation in the 1-2 GHz range around the ions. This created magnetic fields used to rotate the ions' spins. The orientation of the ions is one of the quantum properties used to represent information.

In quantum mechanics, spin is a fundamental characteristic property of elementary particles, composite particles or hadrons, and atomic nuclei.

The ions were entangled by gradually increasing the microwaves' magnetic fields across them.

The NIST researchers used low-power ultraviolet lasers to cool the ions and observe the results of their experiment. These lasers might be shrunk to the size of the lasers used in portable DVD players.

Trap Technology Explained

An ion trap is a combination of electric or magnetic fields that captures ions in a vacuum system or tube. The Paul, or quadrupole ion, trap, employs constant direct current (DC) and radio frequency oscillating alternating current (AC) fields to trap ions.

The Paul trap's commonly used as a component of a mass spectrometer, and its use may lead to the development of a trapped ion quantum computer.

A trapped ion quantum computer is based on the fact that ions can be confined and suspended in free space using electromagnetic fields, as was done in the NIST experiment.

Qubits, which are units of quantum information, are stored in the stable electronic states of each ion. Quantum information can be processed and transferred through the collective quantized motion of the ions in the trap.

You apply lasers to induce coupling, or interaction, between the internal qubit states and the external motional states for entanglement between qubits.

Taking It to the People

The use of mass-market technology -- microwave electronics similar to that used in smartphones and UV lasers similar to those used in DVD players -- may make quantum computers feasible.

"The lasers used in quantum computers will likely be specifically designed for this purpose, but the fact that similar technology has been used in low-cost consumer devices could make the likelihood of a quantum personal computer more likely near-term," Rob Enderle, principal analyst at the Enderle Group, told TechNewsWorld.

Computing » Linux Distros: When It Absolutely, Positively Has to Be Secure

Posted by echa 8:36 PM, under | No comments

Linux Distros: When It Absolutely, Positively Has to Be Secure | Linux Security minded Linux users have options if they want to lock their systems down extra-tight. They can jump to a close Linux relative like OpenBSD. If they know what they're doing, they can set ultra-secure configuration options. Or they can choose from a few freely available Linux distros that make security a top priority.

If you use Linux instead of Microsoft (Nasdaq: MSFT) Windows, its free availability may well be a deciding factor. But the fact that virus and malware contamination are less likely to take down your Linux computers are no doubt essential influencing factors as well.

But does using a more popular Linux distro like Cononical's Ubuntu make your system more or less vulnerable than a Linux-on-a-stick variety such as Puppy Linux? More likely than not, if you use any Linux distro, you will compute in a relatively strong security envelope.

Still, some aspects of the open source community are pushing out hybrid Linux distributions that claim to be more secure than your otherwise plain-vanilla Linux distro of choice. So if you want a more hardened Linux configuration, you have options.

One is to ensure that you have all the security-enriched configuration options selected. That could take a Linux systems expert to achieve.

The second option is to use one of a few available ultra-secure Linux distros. The newest candidate for super-secure Linux is Lightweight Portable Security, or LPS. An established alternative is Security Enhanced Linux (SELinux) from the U.S. National Security Agency.

The third choice for having a more secure computing platform is to switch to one of Linux's close family relatives. You could use OpenBSD. This is not really a Linux distro. Instead, it is a Unix derivative.

"It depends on the usage -- desktop, mobile device or server. Even generally for security, OpenBSD is probably the best choice when it comes to tight security. All standard Linux distributions are fairly equal when it comes to security, so it mainly comes down to preference," Rainer Enders, CTO of Americas at NCP Engineering, told LinuxInsider.

Linux Is Linux

From a security perspective of Linux reliability, most attacks occur at the kernel level. All Linux distros use the same kernel, so that is an advantage. But when security really counts, Unix is more secure than Linux, said Enders.

"With Linux the security posture is nearly identical in all distros. So it really doesn't matter which distro you use," he asserted.

The Linux security issue is not like the ongoing debate over which operating system is more secure. We are not comparing Linux to Mac OS and Windows 7. You can generalize about Linux security and say that all distros are secure, he said.

Even the so-called ultra-secure Linux distros are mostly just adaptations and tweaks, he explained. The ultra-secure versions of Linux harden the network connections.

"The difference among distros in Linux is found at the high end. The interface and package management are different, for example," he said.

It's the Layering

Linux is not defined by a single security feature. Instead, it is marked by a series of security layers, according to Matthias Eckermann, SUSE Linux Server Product Manager for Novell (Nasdaq: NOVL). Some distros have more layers than others.

"What makes some distros more secure than others is how those layers are applied. That is the result of a series of factors that include the product's production, its structure or architecture, how configurable it is, and how it is serviced," Eckermann told LinuxInsider.

The special security sauce that SUSE engineers add to configure the company's version of the Linux OS with a minimum set of daemons running. The more running daemons there are, the greater the security risk, said Eckermann.

"Security is a process. This provides users with an infrastructure to maintain and increase their security," he said

Security Syrup

Novell's engineers developed SUSE's architecture to minimize the need for open access. That distro has three levels of permissions to open or close the system, noted Eckermann.

For instance, the hardening of the platform is handled by the Yost package system. That makes intrusions more difficult to achieve, he said. A minimum package load starts at 80 packages running for a more lightweight security level.

Also, security choices are integrated into the architecture of SUSE. For example, customers can configure the password aging and the number of daemons running.

Caution Needed

"One of the really strong points with Linux is the user can custom compile a unique version to suit specific corporate needs. That is the beauty of using Linux," explained Enders.

But it is also its sticking point. To harden whatever distro you use, you really need to be a systems expert.

"You must really know what you are doing. Otherwise, you could break something in the architecture and be worse off than when you started," warned Enders.

Selecting Settings

For OSes to be secure, you need to limit the number of operations that are allowed to run. So when you hear about hardening an operating system, that generally refers to reducing the number of operations, according to Charles Kolodgy, research vice president for secure products at research firm IDC.

"Some are just turned off. The better solution is not to load them when the operating system is installed," he told LinuxInsider.

For a secure OS to work, you need to know exactly what operations are needed and which can be discarded. All OSes can be hardened or made more secure. The Unix based operating systems -- including Linux of course -- have more controls built into the OS that allow for more secure customization.

"That is why there have been different secure versions," he said.

Powerful and Complex

Linux is very complex with many touch points. The security issue cuts both ways, Enders explained.

For example, out of the box, a lot of the special network security might not work. One wrong flip of a setting switch can make any distro less secure.

"But that happens in any OS. For instance, even Windows lets you disable the firewall," he said.
Security Is as Security Does

One such ultra-secure option is Lightweight Portable Security (LPS). It boots from an external source such as a thumbdrive from an Intel-based PC or Mac computer. Once loaded, it forms a secure end node. The Software Protection Initiative created LPS under the direction of the Air Force Research Laboratory and the DoD.

It boots a thin Linux operating system but does not mount a local hard drive. It does not install anything and assigns no administrator privileges. LPS comes in three versions. LPS-Public uses Web-based applications. LPS-Public Deluxe adds OpenOffice and Adobe (Nasdaq: ADBE) Reader software. LPS-Remote Access only accesses VPN connections (Virtual Private Networks).

"The Lightweight Portable Security is nothing more than a version of Linux that can be booted from a USB drive or CD. It is primarily used in an environment where you want to make sure you have total control of a machine", said Kolodgy.

Enhanced Security Linux

Security Enhanced Linux, or SELinux, is another ultra-secure Linux option. It came out of the NSA to build in Mandatory Access Controls, according to Kolodgy.

"In that way everything the OS does is controlled by policy, and if a person or applications don't have the proper access, they will not be able to get data and/or run programs. You generally wouldn't run this for a whole system, but restrict it to critical systems, like databases," he said.

He is not sure if LPS is more secure than SELinux or other Linux distros. But since LPS is being booted from a USB drive, the set of operations would be more limited as to not make booting take too long. It also avoids any conflicts with installed hardware, he added.
Using Ultra-Secure Linux

Does ultra-secure Linux really make Linux more secure? Ultimately, the question of which Linux version to use when the first priority is security may be a moot point.

"I don't think there is any one release that is better than the others. Most are based on the SELinux work," Kolodgy concluded.

If you narrow your choice to LPS or SEL, one may or may not be better than the other.

The Rundown

The LPS is a great project. If you need something secure, too often the inclination is to build it yourself, from scratch. The LPS folks have been very smart about taking all the excellent open source solutions that already exist, and configuring them to be used in a way that's useful for the DOD, and then sharing their work," Gunnar Hellekson, Red Hat's (NYSE: RHT) public sector chief technology strategist, told LinuxInsider.

SELinux is not its own distribution. It is a subsystem of plain-vanilla Linux. SELinux is included in all kinds of Linux distributions, including Red Hat Enterprise Linux, he said.

That said, SELinux provides mandatory access controls. That means that you have fine-grained control over what applications are permitted to do to the system, he explained.

"So if I have an SELinux policy that controls Apache, I can say that Apache may work with this network port, write to a log file, and read this Web content from disk. If someone compromises Apache, even if it's running as root, they'd still only be able to do what SELinux says they can do. So it's very useful -- and mandatory if you want to meet the Common Criteria requirements that the government needs," he concluded.

Related Posts Plugin for WordPress, Blogger...