Friday, 27 January 2012

5 Storage Predictions for 2012

2011 was quite a year for the storage industry. From the billion dollar acquisitions to the disruptive flooding in Thailand, it was a year to remember. As we look forward, here are 5 storage predictions for the new year.

1. Users continue to generate piles of unstructured dataBack in 2009, Gartner estimated that data growth would happen at a rate of 650% over the next 5 years with 80% of this growth coming from unstructured data. We can get lost in the weeds with facts and figures but most IT managers I’ve spoken with have all said the same thing: their users are storing more and deleting less. The cloud will play an important role in offering an easy to deploy tier for this growing primary data. Deduplication will also help curb some of this data growth as will the perpetual move of core applications to the “datacenter in the sky”. Ultimately, strategies involving multiple technologies will help IT relieve the pressure felt by skyrocketing data growth.

2. Consumerization of IT generates massive headaches for ITThe use of smartphones, tablets, and consumer cloud storage services will cause even bigger headaches for IT. Employees are using more technology and cloud services at home than ever before – and now they expect them to work on the corporate network. Not only does this introduce headaches in trying to support these rogue devices, but major security challenges as well. IT will spend much of this year trying to determine how best to handle this onslaught of personal devices and consumer cloud services.

3. Flash, flash and more flashFlash production in the consumer market has been ramping up since the first iPhone rolled off the assembly line. However, over the past 18 months it has been gaining significant traction in the enterprise storage space, and for good reason. The SSD brings a unique component to the enterprise storage controller and with it IOPS that were previously unthinkable. Like the traditional hard disk drive and the cloud, SSD fills another piece of the puzzle toward creating the most effective enterprise storage controller. Costs will continue to fall, endurance/reliability will improve, and the proliferation of the SSD in the enterprise will spiral upward.

4. The cloud is used as a component inside the storage controllerSending off data directly to a public or private cloud has never been a practical solution for primary storage. Issues with latency, eventual consistency and overall access speeds have held the cloud back from all but the smallest of backups. However, put the cloud inside the storage controller and you have something special. Functioning alongside traditional enterprise hard disk drives, the cloud brings unique functionality to the storage controller and makes storage as a service possible. The hassle of backups is rendered a non-issue, consistent, pain-free access to data across multiple locations is made possible and the ability to recover from a complete disaster in less than 15-minutes becomes a reality.

5. Cloud SLAs get seriousCloud providers have been backing their services with service level agreements since the very beginning. But did they even matter? The actual numbers associated with downtime are astronomical. Let’s say 100 of your users lose access to their data for a mere 5 minutes - you’ve just lost an entire days worth of productivity. A few pennies from a service provider aren’t going to begin to make up for that loss. In order for the enterprise to take cloud services seriously (and sell the decision makers) the service level agreements will shed their meaningless penalties and grow some teeth.

Thursday, 26 January 2012

Google and Bing accused of directing users to illegal copies of music

Josh Halliday

Entertainment groups want Google to 'effectively screen' mobile apps on Android smartphones in an effort to combat illicit sharing. Photograph: Robert Galbraith/Reuters

Google and other search engines "overwhelmingly" direct music fans to illegal copies of copyrighted tracks online, a coalition of entertainment industry groups has told the government.

In a confidential document obtained under the Freedom of Information Act, lobbying groups for the major rights holders claimed Google and Microsoft's Bing are making it "much more difficult" for people to find legal music and films online.

The private document, obtained by the free speech campaigners Open Rights Group and shared with the Guardian, urges the government to introduce a voluntary body that would remove rogue websites from internet search results.

The proposals were made to the culture minister Ed Vaizey as part of a series of consultations on internet piracy between rights holders, search giants and the government in November last year. The nine-page document was submitted on behalf of the British Phonographic Industry (BPI), the UK body for the music majors, the Motion Picture Association (MPA), the Premier League, the Publishers Association and the Pact, the film and TV independent producers' trade body.

Privately, rights holders said there is a "spirit of optimism" between the entertainment groups and search engines as they attempt to usher in more legal media sites, including Google's own fledgling music service.
Google has in the past year stepped up efforts to remove copyright-infringing content, launching a fast-track removal requests form and filtering terms "associated with infringement". However, the rights holders claim in the document that "as time goes on, the situation is getting worse rather than better".

"Consumers rely on search engines to find and access entertainment content and they play a vital role in the UK digital economy," the rights holders state.

"At present, consumer searching for digital copies of copyright entertainment content are directed overwhelmingly to illegal sites and services."

The entertainment groups want Google to "continuously review key search words" and "effectively screen" mobile apps on Android smartphones in an effort to combat illicit sharing.

The document claims that 16 of the first 20 Google search results for chart singles link to "known illegal sites", according to searches by the BPI in September. In an attempt to persuade the government to clamp down on search engines, the groups claim that 41% of Google's first-page results for bestselling books in April last year were "non-legal links" to websites.

"Much of the illegal activity in the digital economy is facilitated and encouraged by money-making rogue sites," the document claimed.

"Intermediaries, unwittingly or by wilfully turning a blind eye (or in some cases, by encouraging such activity), play a key role in enabling content theft and often even profit from it. Only a comprehensive approach can address this issue."

The entertainment bodies call for search engines to:

• Assign lower rankings to sites that "repeatedly" make available copyright-infringing material
• Prioritise sites that "obtain certification as a licensed site" for music and film downloading
• Stop indexing sites that are subject to court orders
• Stop indexing "substantially infringing websites"
• Improve "notice and takedown" system
• Ensure that users are not directed to illicit filesharing sites through suggested search
• Ensure search engines do not advertise around unlawful sites or sell keywords associated with piracy or sell mobile apps "which facilitate infringement"

The chief executive of BPI, Geoff Taylor, said on Thursday: "The vast majority of consumers want search engines to direct them to legal sources of entertainment rather than the online black market.
"As search engines roll out high-quality content services, like Google Music, we want to build a constructive partnership that supports a legal online economy. We hope that Google and other search engines will respond positively."

A spokeswoman for the Motion Picture Association added: "If you look for film or music via a search engine you usually find websites providing access to pirated films or music at the top of the list of results.

"This is confusing for consumers, damages the legal market and legitimises copyright theft. We are in dialogue with search engines, ISPs [internet service providers], advertising networks and payment processors about a code to deal with the escalating problem of online copyright theft which threatens the growth of the entire creative industries sector. This paper is a result of that dialogue and we appreciate government's continuing efforts to help bring about a more responsible internet".

A spokesman for Google said: "Google takes the fight against online piracy very seriously. Last year, we removed over five million infringing items from Google Search. We have made industry-leading efforts in this field, investing over $50m (£32m) in fighting bad advertisements and over $30m on Content ID software, giving rights holders control over their YouTube content.

"We continue to work in close partnership with rights holders to help them combat piracy and protect their property."

Peter Bradwell, campaigner for the Open Rights Group, said the proposal contained "some dangerous ideas". He said: "It's another plan to take on far too much power over what we're allowed to look at and do online."

Major rights holders claim search engines make it 'difficult' for people to find legal music and films online

The major rights holders' document obtained under the Freedom of Information Act

Wednesday, 25 January 2012

IBM partners with NEC for OpenFlow switch, software-defined networking

Shamus McGillicuddy, News Director

IBM announced a new OpenFlow switch that it is co-marketing with NEC’s OpenFlow controller. The combined products represent the first end-to-end software-defined networking solution from a leading North American IT vendor and could establish IBM  as a major competitor to Cisco Systems, Juniper Networks and other vendors in the hotly contested data center networking market.

To date, OpenFlow and software-defined networking have been the provenance of startups and smaller vendors like NEC, which released its ProgrammableFlow OpenFlow products last summer. The major networking vendors have dabbled in OpenFlow, making it available on some select switches, but none have stepped forward and embraced the technology fully. While IBM is not a dominant networking vendor, but it is one of the largest IT vendors in the world and has a long networking history.

“With the brand and marketing of IBM and NEC, it’s going to make customers take a second look at OpenFlow and say, ‘Hey if IBM is behind this, then I can almost take the leap.’ You know IBM isn’t going to leave you stranded,” said Lucinda Borovick, program vice president for enterprise and data center networks at IDC.

The IBM/NEC solution consists of NEC’s ProgrammableFlow controller and IBM’s 1.28 Tbps RackSwitch G8264 top-of-rack switch. The switch features 48 SFP/SFP+ 10 GbE ports and four QSFP 40 GbE ports that can be split out to an additional 16 10 GbE ports. It supports OpenFlow 1.0.0 and it can handle a maximum of 97,000 flow entries.

Theoretically an enterprise can build an entire data center network with IBM’s OpenFlow switches and NEC’s controllers.

“With OpenFlow you don’t need core and aggregation equipment anymore,” said Jon Oltsik, principal analyst with Enterprise Strategy Group. “You can create a fabric out of access switches.”

With OpenFlow switches will hype turn into reality?

Network engineers remain intrigued by OpenFlow and software-defined networking, but the technology is still emerging from its “science project” status.

OpenFlow is an open source protocol that allows enterprises to transform their networks from a distributed system where switches and routers make individual forwarding decisions to a centrally controlled system where an OpenFlow controller makes forwarding decisions.

OpenFlow controllers can also host applications that make networks more programmable. By using the centralized view of the network, developers can write applications that replace  functionality on advanced switches and routers or specialized network appliances like firewalls and load balancers.

Enterprises can also use the OpenFlow controller to make rapid configuration changes to their networks and to provision and dedicate network resources quickly for specific applications and services. This is especially important as enterprises consolidate into larger data centers and start to build private and hyrbid clouds.

IBM’s OpenFlow switch intrigues engineers, but not for rip and replace

Selerity, a provider of low-latency, real-time financial data to financial services companies, has been trialing the IBM/NEC OpenFlow network, according to Andrew Brook, Selerity’s CTO. His company uses proprietary algorithms to extract financial information from unstructured data, such as press releases, and send that data to its clients via a dedicated networks collocated with trading venues in Chicago, New Jersey and Frankfurt.

“Competition in this space is measured at the sub-microsecond level. Our clients are making trading decisions on a scale of 1 to 10 microseconds after getting data delivered by us.”

What's more, Selerity’s customers don’t receive uniform sets of data. Based on the services they pay for, Selerity customers are entitled to receive certain subsets of the data. The best way to meet these dual requirements is by multicasting over a low-latency switch. But in a multicast environment , Selerity struggles to send selective data sets to customers in real time. The programmability and rapid configurability of an OpenFlow network offers some promising solutions to this problem. Brook has determined that the IBM OpenFlow switches and the NEC controllers enable low-latency and real-time policy-driven content distribution.

“I don’t want to send that data out in separately addressed datagrams because it has to be sequenced and someone gets it first and someone gets it last,” he said. “I want to send it out as multicast, but what I want to change is which of the outgoing switch ports are going to participate in a particular multicast.”

Engineers can direct the forwarding on traditional switches but not in real time.

“There are some things we can do with OpenFlow to change the rules implemented on the switches in close to real time and get very nice, deterministic behavior by the switch. Right now, we are looking to do that functionality in the controller, but the speed at which we can do that is an open question. For what we’re doing today it’s acceptable.”

Brook is still evaluating IBM’s OpenFlow switch and NEC’s controller and if he adopts them, it won’t be a wholesale replacement of his existing network.

“In the short-term, it would be us identifying specific applications,” he said. “For example the edge switch that sits between our content delivery network and our clients.”

Tervela Corp., a provider of distributed data fabric appliances for global trading, risk analysis and ecommerce, is also evaluating the technology. Tervela customers typically deploy the company’s products on their own local network; however, Tervela engineers often consult with customers on the best network configurations to support its technology.

Michael Matatia, director of Software Engineering for Tervela, said his engineers are trialing the IBM/NEC OpenFlow network because he anticipates that customers will start using OpenFlow as an alternative to their traditional Layer 2 and Layer 3 networks.
“As OpenFlow has more traction, I anticipate that our customers will have OpenFlow deployments,” he said. “We need to be up and ready with the technology so we can talk intelligently about the advantages of OpenFlow and when to use it.”

Despite IBM’s involvement, OpenFlow doubts remain

IBM's involvement in OpenFlow has its appeal, but some question whether OpenFlow will really change networking

An ecosystem of developers will need to emerge to offer enterprises that programmability. OpenFlow startup Big Switch Networks recently made its OpenFlow controller available as an open source project expressly to promote the growth of such a developer community.

Selerity’s Brook is mindful of OpenFlow’s place on the adoption curve.

“It’s still not clear to me that pure OpenFlow allows them to do anything differently. Most of the things you can do with software-defined networking, there are other ways to do it. Cisco lets you do it [with FabricPath], Arista lets you do it. I haven’t been convinced that OpenFlow is the right way to solve this problem,” said Zeus Kerravala, principal analyst of ZK Research.

Brook said his company has specific niche needs or “severe technical requirements” that require the adoption of emerging technologies like OpenFlow, but in other parts of his infrastructure he still prefers to use established industry standards.

“OpenFlow seems to have some mindshare and some motion behind it. We’ll have to watch and see how rapidly it gets adopted before we assess how much we deploy it. This particular solution that IBM and NEC have put forward is nice, because the actual switching devices from IBM, even if you ignore the OpenFlow capabilities, are very nice switches. I’m not too worried about making investments because even if OpenFlow doesn’t catch on, it’s still very capable switch,” he said.

Sunday, 22 January 2012

T-Mobile's 'secret menu': Extra goodies you need to ask for

T-Mobile USA's stores may not offer the Double-Double burger, but they do have their own secret menu a la In-N-Out.

Starting January 25, existing and new customers who sign up for a T-Mobile premium data plan--which consists of signing up for 5 gigabytes to 10GB of data each month--can get the mobile hot-spot capability for free--as long as they ask for it. TMoNews first reported the news, noting that customers could also ask for a mobile album feature, which provides 10GB of cloud storage for media.

That's $19.98 in additional value for signing up for the higher end plans. The features, however, won't be widely promoted in the store, so customers will need to ask for them, just as customers have had to learn from word of mouth about the items on In-N-Out's now not-so-secret menu. The offer is only available for a limited time.

The promotions are just the latest move for T-Mobile, which is attempting to win back customers and re-establish itself as an independent competitor after its deal with AT&T fell through. At the Consumer Electronics Show, T-Mobile USA CEO Philipp Humm struck a defiant tone, gleefully pointing out the "gifts" that AT&T had left it ($3 billion in a break-up fee, plus roaming agreements and spectrum), and declaring that it was back on course as the industry's disruptive force.

Indeed, the window appears to be opening for T-Mobile to potentially nab some market share from the bigger players. AT&T, despite its push for more affordable service, decided to hike the prices for its data plans, which some believe could lead to a defection to lower priced options. Over the past few months, the company has stepped up its aggressive offers in an effort to win over new customers. It is also offering more affordable phones such as the well-reviewed Nokia Lumia 710 for $50.

T-Mobile still has an uphill battle. It's now the only major carrier without the iPhone, a gap it hopes to fill eventually, but hasn't had much luck with yet. The carrier said recently, however, that it could technically happen with the next version of Apple's smartphone. It's also the only major carrier not yet moving to LTE, instead relying on its HSPA+ network, which it calls 4G.

Still, these special discounts and promotions help. A T-Mobile representative said the carrier will offer such promotions from time to time without any national advertising, but will get the word out through digital advertising, its Web site, or in-store posters or brochures. Many are available when you call into customer care lines too.

T-Mobile's mobile hot spot and album offer comes with the purchase of a 5GB plan, which costs $89.99 a month, or a 10GB plan, which costs $119.99 a month.

For prepaid customers, T-Mobile plans to offer a $50 mail-in rebate card for the Samsung Exhibit II or the Sidekick with the purchase of two months on a $50 Monthly4G plan. The offer starts on February 1.
A T-Mobile representative said the company plans to offer more promotions throughout the year.

Thursday, 19 January 2012

Windows revenue falls 6%

Microsoft Q2 2012 by the numbers: Windows revenue falls 6%
By
Late this afternoon, Microsoft answered a question oft-asked by investors this month: What about Windows?   Near the end of his Consumer Electronics Show keynote last week, Microsoft CEO Steve Ballmer boomed: "There's nothing more important at Microsoft than Windows".  But at the same event, Tami Reller, Windows & Windows Live  CFO,  warned that the division's fourth-quarter results could fall below analysts' estimates, because of weak PC sales. Today's fiscal second quarter 2012 earnings results answered by just how much.

For Q2, ended December 31, Microsoft revenue was $20.89 billion, up 5 percent year over year. Operating income: $7.99 billion, a 2 percent decrease. Net income was $6.62 billion, or 78 cents a share. Both were flat year over year.

Average analyst consensus was $20.93 billion revenue and 76 cents earnings per share, for the quarter. Revenue estimates ranged from $20.20 billion to $21.35 billion, with estimated year-over-year growth of 4.9 percent -- modest for a holiday quarter.

"We delivered solid financial results, even as we prepare for a launch year that will accelerate many of our key products and services", Ballmer contends. "Coming out of the Consumer Electronics Show, we’re seeing very positive reviews for our new phones and PCs, and a strong response to our new Metro style design that will unify consumer experiences across our phones, PCs, tablets and television in 2012".

Microsoft's PC Problem
Because Windows is so important to Microsoft -- it's not just Ballmer boasting -- slowing PC sales's effects reach far beyond the operating system. But nowhere are they more apparent than the Windows & Windows Live division, which dragged down Microsoft operating and net profits. The division's revenue fell 6 percent year over year.

Last week, Gartner and IDC released preliminary calendar fourth-quarter and all-2011 PC shipments; growth was tepid globally and retracted in the United States. IDC called 2011 the "second worst year in history" for US PC shipments - with 2001 claiming the unwanted crown. Despite a global, temporary hard drive shortage, Gartner and IDC say the declines they observed -- 1.4 percent and 0.2 percent globally, respectively -- were in line with their forecasts. US declines were substantially greater, 5.9 percent by Gartner's reckoning and 6.71 percent by IDC's.

Besides the hard drive shortage, several troubling trends have emerged. Simply put: Consumers aren't buying Windows PCs like they used to. Their spending goes to other stuff, with tablets -- and that really means iPad -- ripping away sales. We just finished the holiday quarter, one of the two seasons of typically strong sales (back to school is the other). "Continuously low consumer PC demand resulted in weak holiday PC shipments", Mikako Kitagawa, Gartner principal analyst, says.

This consumer infection -- infatuation with iPad, some other tablets and smartphones -- is spreading. According to an IDG Connect study released this week, IT and business professionals are rapidly adopting iPads as partial or complement laptop replacements; remember these people make technology purchase decisions for entire corporations -- Microsoft's core market. Sixteen percent have replaced their laptop with an iPad and 54 percent supplement it. The data suggests that iPads are significantly starting to cannibalize PC sales -- and not just among consumers -- and it's consistent with recent global PC buying trends.

Earth to Windows & Windows Live president Steven Sinofksy: You can't ship Windows 8 soon enough. The new operating system, which runs on ARM as well as x86 processors, is optimized for tablets as well as PCs. Microsoft can fill an important niche in the PC sales-cannibalizing tablet marketing -- offer a truly desktop operating system that runs the same applications and supports enterprise services as those on PCs. Windows 8 public beta is currently slated to be available late next month, which, based on previous versions, puts public availability around October.

Q2 2012 Revenue by Division
 •Windows & Windows Live: $4.74 billion, down 6 percent from $5.06 billion a year earlier.
 •Server & Tools: $4.77 billion, up 11 percent from $4.29  billion a year earlier.
 •Business: $6.28 billion, up 3 percent from $6.11 billion a year earlier.
 •Online Services Business: $784 million, up 10 percent from $713 million a year earlier.
 •Entertainment & Devices: $4.24 billion, up 15 percent from $3.7 billion a year earlier.

Q2 2012 Income by Division •Windows & Windows Live: $2.85 billion, down 11 percent from $3.21 billion a year earlier.
 •Server & Tools: $1.97 billion, up 17 percent from $1.7 billion a year earlier.
 •Business: $4.15 billion, up 2 percent from $4.09 billion a year earlier.
 •Online Services Business: Loss of $458 million, up 18 percent from $559 million loss a year earlier.
 •Entertainment & Devices: $528 million, down 21 percent from $666 million a year earlier.

Division Highlights

Microsoft reports revenue and earnings results for five divisons: Windows & Windows Live, Server & Tools, Business, Online Services and Entertainment & Devices.

Windows & Windows Live. Weaker than-expected PC demand hurt the division during fiscal second quarter. Revenue fell 6 percent year over year, which is simply stunning during the holiday quarter. Worse: Operating income declined by 11 percent.

Microsoft estimates that global PC sales fell between 2 percent and 4 percent, greatly contributing to Windows revenue decline. Consumer PC sales fell by 6 percent, while those to businesses actually rose -- by 2 percent. Netbooks fell 2 percent.

OEM revenue fell by 7 percent, which reflects weakness in PC shipments identified by Gartner and IDC. Three-quarters of Windows divisional revenues comes from OEM sales.

To date, Microsoft has sold 525 million Windows 7 licenses. One-third of enterprise desktops run Windows 7, the company claims.

Server & Tools. Revenue rose 11 percent year over year and operating income by 17 percent. The division is insulated against economic maladies, because about 50 percent of revenues come from contractual volume-licensing agreements.

"Product revenue increased $328 million or 10%, driven primarily by growth in SQL Server, Windows Server, Enterprise CAL Suites, and System Center, reflecting continued adoption of Windows platform applications", according to the company.

Business. The division was the quarter's big overall performer (again), but grew modestly, with revenue up 3 percent and income each up 2 percent year over year. However, adjusting for the tech-revenue guarantee a year earlier, related to the Office 2010 launch, revenue grew by 7 percent. Revenue topped a whopping $6.2 billion.

Annuity licensing grew a stunning 12 percent. Lync revenue grew by 30 percent.  "Microsoft Office system. Business revenue increased $420 million or 9 percent, primarily reflecting growth in multi-year volume licensing revenue, licensing of the 2010 Microsoft Office system to transactional business customers, and an 11 percent increase in Microsoft Dynamics revenue", according to the company.

Like Server & Tools, Business division is largely insulated against sluggish PC sales. Sixty percent of revenue comes from annuity licensing to businesses.

Online Services Business. Online services revenue rose by 10 percent. Search and display ads drove up online advertising revenue by 13 percent -- $81 million to $713 million. "OSD operating loss decreased due primarily to higher revenue and lower sales and marketing expenses, offset in part by increased cost of revenue", according to Microsoft's financial release. The change: 18 percent.

Entertainment & Devices.  Revenue rose by 15 percent, but losses increased by 21 percent year over year. Microsoft shipped 8.2 million Xboxes during the quarter. Xbox Live subscriptions rose 33 percent to 40 million. Kinect install base: 18 million.

"Xbox 360 platform revenue grew $322 million or 9%, led by increased volumes of Xbox 360 consoles sold and higher Xbox Live revenue, offset in part by lower volumes of standalone Kinect sensors sold", according to the company.

Microsoft now reports on Skype, which has 200 million active users globally.

Wednesday, 18 January 2012

Cooking tablet

Some 70 companies were selected to take part in the "sneak peek" preview ahead of the show's official launch.

Among them is Qooq - a French company that has designed a tablet computer for the kitchen.
The Linux-based device is splash-proof, is held off the ground by feet that allow spilled liquids to run underneath, and can shrug off temperatures of up to 60C (140F).

Qooq - pronounced like cook - is designed to be messy kitchen-friendly
For a subscription fee users are offered access to a multimedia library of thousands of recipes by French chefs which can be customised to suit the user's kitchen skills and dietary habits.

The device is already on sale in France and the firm is at CES to announce an English language version due for release in September.

"We know that people bring hi-tech devices to the kitchen - with ours there is no risk," says Hubert Bloch, the firm's chief marketing officer.

"In the future we think people will have multiple tablets. The Qooq can be splashed, used with dirty hands and it's not a problem - just sponge it and it's clean again."

Tuesday, 17 January 2012

Physical Security of Digital Equipment

When we talk about human security basically we are talking about physical security. Human security is not firewall not patches and software. Physical security means to secure environment around your computer installations, your networks your information technology facilities.

First impact of the physical security on our brains is gun, gates and guards. Yes, off course it is also part of that physical security which we are going to discus. Physical security protects systems and people from various threats, including natural threats and man made threats.
First we talk about natural threats; we have many examples of natural disasters happen in last decade which make billion of physical installation of computers. For example in Haiti last year earthquake and that earthquake destroy government data centers. Second example is flood in Australia which destroy billion if physical network installations. Fire, tornadoes, hurricanes, earthquake and floods could destroy Information
Technology setups on large scales. Man made threats are common but can’t cause of big scale disasters like terrorist attacks, hackers, and car or plane crash. Power failure by a person also is threat.

Physical security includes visitor’s log file which manage all information about the people who visit your premises, Fence will protect and keep away unauthorized person far from your building, we can see fences in government agencies building where high protected data stored, badges can allow only the authorized persons into building. Badges are normally with pictures, name and department, now a day RF identity cards also use on digital door locks, guards are very important for physical security because they are trained for terrorist attacks and can keep safe from unauthorized persons. Closed Circuit Television (CCTV) is very popular for physical security. Normally they installed with recording option and can be playback if any problem found in security.

Alarm systems are also part of security systems and are very effective in some situations. Door locks off course primary level security. Door locks are in different kinds and access methods like proximity cards, door combinations and radio frequency door openers. Physical security equipments installed on the base of value of computers and data. If it is high level security required the equipment must be high cost and dedicated.

With security it is also required some other controls like administrative and managerial controls, technical and logical controls. Security should be applied as appropriate to degree of sensitivity of assets you are protecting. Must be a proper physical security policy and that policy applies to confidentially and available aspects of systems and data.

Monday, 16 January 2012

Keep Your Kids Safe Online

Internet is the widest term we use in last 2 decades. It connects people and organizations and you can easily spread and access information you like. Internet can provide you almost all kind of information and contents like text, pictures and videos from religion to science but biggest internet contribution from various people and organizations is sexual explicit content. In whole world people spend 3765$ per hour to see sexual contents on internet. You can imagine it is a multimillion dollar industry and that also affect all kind of users. 78% of kids age 8-15 have internet access in developed countries.

Internet access to user under age of 18 for academic purposes is necessary but threat of child abuse and explicit sexual material is also there. Not only sexual material there is a world of explicit material of religion, politics, critical science material is also open for your kids. For a safer internet children interaction we have to check and balance internet usage. I think the most necessary is the awareness and training of parents. Because of a generation gap 60-70% parents did not know how to control and audit child access for internet. Even if you are not an IT guy you can read following guidelines and manage your home PC for a restricted and parental locked internet.

Let’s have look on method that how we can control the access of internet for kids. Here we are talking about the most popular operating systems like Windows vista and Windows 7.

Physical Placement of your Computer

Always place computer for your kids in main lobby or living room and you can keep an eye of usage of that computer. Placement of computers in personal rooms of kids under 18 years can change their sleeping habits because you cannot restrict their usage timings.

Parental Control in Windows Vista and Windows 7

You can found parental control in both Microsoft Windows Vista and Windows 7. Enable it and read the option carefully, you can easily setup parental controls. Make a user name for your kid with less permissions and privileges and you can track that user name easily. Never give admin account to kid under age of 18.

Time limits for Internet and Computer Usage

You can easily restrict timing of your child for using computer and internet. Option for time management for a specific user name is available in user menu in control panel.

Online Game Freak

Online gaming is very significant issue for parents these days. Kids spend hours online and that can be harmful for studies. You can restrict games and online hours of your children. In control panel –user menu option you can easily set which game runs and which not.

Application and Programs Restriction

You can restrict user from installing and uninstalling and use any application or program. This can keep safe your computer from viruses and Trojans. In user option you have application allow and block option.

Activity Reporting and Audit

This is very important for parents to activity report and audit user account, this may be effect the privacy of your kid but it is better than an abuse of your kid. Activity report can give an idea that what kind of websites your kid likes to visit and what kind of content downloaded and explored. Keep eye on your child online friends and never allow your kid to be a friend of stranger who is with age difference. If you found any problem in chat logs or websites explored by your kid be calm and friendly with kid and take your kid to a consular for safe internet for kids. Don’t be rigid with your kids in this matter.

Sunday, 15 January 2012

How You Can Secure a Wi-Fi Network

Wi-Fi is the latest technology and the ease of Wi-Fi networks make it very popular among people in no time. In last decade Wi-Fi become most popular term for who uses computers. Wireless Networks rapidly marketed, adopted and deployed by organizations and individuals

Wireless Network allows freedom from cables and you can roam round in house and your office and especially in big work spaces you can easily use wireless network. As far as wireless security concerns, wireless does not offer protection of wired network by default. In wire network you can easily trace out any kind of interference but in wireless network you did not know who is in your network paradigm and is very easy for hacker to access networks because wireless radio wave signals are all over your premises and can easily tap, a person tap your signal of your wireless device nearby your building or car parking lot or in any hidden building part.

This technology popular very rapidly so no one thinks about security issue because people think functionality first and security second. Awareness and installation expertise are not very high and this is the main cause of un-secured networks. People buy a wireless router and establish a network, did not use encryption and make their network an un-secured network.

Wireless network device signal are easily identified by any mobile or computer device and if your network have no encryption, your network is on stake. Without encryption every one can see and get the data you are sending and receiving.

Biggest reasons of hacking wireless networks are the default setting and physical installation of wireless routers. Default settings can easily accessible by any person, people left same user name and passwords as like company default. If your network router is physically accessible by any person, it is possible any one could reset its setting to default and can access your network. Never left your Identifiers (SSID’s) left as default device settings and allow it to broadcast signals. Lack of implemented security means easy network access by unauthorized persons.

Let’s see how we can fix un-secured network access.

1. If you are new to wireless networking then go for WEP security settings and these setting your can found in your wireless router setup. You can easily access router setup by typing default IP address of router. Mostly router uses IP address “192.168.0.1”, after router shall ask you a user name and password. Write default username and password and now you are in security settings. First of all change your user name and password and keep write them on a safe place. Now you can setup your WEP setting and write a phrase in WEP setting. Make it 128bit and save your settings and logout. Restart your router and now your router is ready and secured. When you access your network it will ask you the WEP key or phrase, enter key or phrase you have given in router setup and your PC/Laptop/Mobile shall connect your wireless router. Keep save your phrase and key don’t share it with other people.

2. WEP is a primary level security and be break easily by any expert wireless hacker but it is better than nothing. If you are implementing wireless network in your professional environment you must choose WPA/WPA2 network encryption. These are much better encryption algorithms and not easy to break and sniff.

3. SSID rename and hiding is good for network security. If you hide your SSID it will not discoverable by ordinary discovering devices. If you rename and hide your SSID it will need to configure manually and that will be difficult for hack by unknown person.

4. Mac Address filtering is good if you have not guests in your networks. You can add Mac Addresses of your all network devices which are part of network and then you can block any other Mac address.

5. Advance Measures include 802.1X and device authentication also can make possible network security.
All of the above security measure did not guarantee you a 100% hack proof wireless network but it is always better than nothing.

P2P Networks and Security Issues

If you are a computer guy or not you probably heard about P2P software or P2P networks. P2P is general term for a Peer to Peer network or software and I guaranty you if you have teenager at your house then your home PC must have Peer 2 Peer software on it.

With this software you can share your files on Peers to other people around the world. Not only share your files you can download files which are available on other people computers. Files can be music files, movies, documents files or any kinds of software.

The biggest reason of popularity of peer to peer software and network is the possibility to get music, movies and other software free. For example a song cost you around 99 cents on iTune online store and a movie DVD cost you around 22 $ but here on peer to peer network you can easily download free. More dangerous is for software industry, for example a person download Adobe Photoshop which worth about 600$ but on peer to peer it is free.
But problem of peer to peer not end here, a user can face many problems from p2p network.

1. Spyware and Malware

Most of software people uses for p2p network are themselves loaded with spyware and malwares. They can throw your data and password out of your system and that can be very harmful for your personal and internet social life. Worms love to travel on peer to peer networks. If you are online your computer could be defenseless.

2. Inappropriate Material

Peer to peer networks are a sea of pornography and misname pornography. Like you might be thinking you are downloading a movie name toy story but when you finish download and run it on your computer you found inappropriate material and if you have young children in your house you never want to be in this area. Because the inappropriate material is misnamed so before download you have no idea what is going to be downloading. Truly is this the movie you are looking for on peer to peer network can be really offensive material for you and your kids. Socially and ethically I recommend that never use a peer 2 peer network.

3. Security Issue

Another main issue is the security issue because when you install a peer to peer it makes a hole in your security system and provides a direct access to peer 2 peer software. Software can easily bypass all security fire walls and barriers.

4. Privacy Issue

As we know peer to peer network bypass all security barriers and if you install application it can share your personal information on net to other users and that can harmful for your social internet life.

5. Legal Consequences

A very critical issue in developed countries. There are two organizations Recording Association of America and Motion Picture of America going after people who are using peer to peer software. State Department prosecuting them and they could be punished 5 years in jail and USD 2,50,000 for share copyrighted data on peer to peer network. State Department also fining people about USD 1,500 for one MP3 song so if a person sharing 1000 MP3 so you can imagine the fining amount.

Remove Peer to Peer Software from home PCTo remove peer to peer software from your home computer, sit with your family and talk with them who is sharing illegal data and educate your family how dangerous is the peer 2 peer software and networks. Do not only uninstall software because next day your kid will install again. Try your maximum to educate your family and give them awareness about legal consequences this kind of sharing.

Saturday, 14 January 2012

Linux Basic User Security

An Open Source Operating System, which is most popular these days is Linux, Linux have more than 50 different distributions from different organization targeting different kind of users and communities and some time for specific usage like Red Hat Linux for Oracle users. This Linux distribution is specifically developed for Oracle users.

If we consider the market share of Open Source Operating system we have to realize the ground reality and ground reality is different. Open Source Operating systems have less than 10% share in common user category. Microsoft has a big share in common user category due to user-friendly and graphics. This thing make it is most popular operating system among people.

Today Linux users are very few than windows users but in future it will get a big market share. Currently Linux is using for high profile like servers and the setup’s where failure can’t be afforded. Biggest reason of using Linux is the security features of Linux. Linux also have no or less virus threat and it is a biggest edge for Linux setups.

So let’s start with some Linux, I am not making you expert of Linux but I want to tell you something interesting. You can found a wide variety of Linux tutorials on Internet. Here we are just going to discuss only the security features of Linux. Linux has Graphical User Interface and also has command line for user commands.

In security section of Linux we can found Novel App Armor which is application security program and basically dictates what an application can and cannot do.  In user security we can found user management, where you can make users and groups same like windows. Best thing we can see in security of user is the password policy. I always advice people about passwords, never use ordinary words and numbers use as your passwords because they can be crack easily. In Linux you can restrict your user for password selection with password policy.

You can off and on your fire wall same as windows and even if you have Ethernet cards more than one you can easily manage your Ethernet cards with your file wall. In Linux user restriction and directory access is very out class, that’s why you can see 80% of internet based on Linux. In Linux we have directory permission (Read, write and Execute or rwx) and we can restrict our user with these permissions, for example an administrator has all permissions = rwx mean admin can read, write and execute. Other user like a power user has permissions = rw- means power user can Read, write but cannot execute some application. For public permission can be like this = r- – means user can only read, no write and no execute. Directory permission also showed with numbers too like following

Permissions                      owner – group – user
777  is the same as              rwx         rwx       rwx
755   is the same as             rwx         r-x         r-x
666    is the same as            rw-         rw-        rw-
744    is the same as            rwx         r–          r–

Thursday, 12 January 2012

Pro HTML5 Programming, 2nd Edition

Book Description


HTML5 is here, and with it, web applications have acquired power, ease, scalability, and responsiveness like never before. With this book, developers will learn how to use the latest cutting-edge HTML5 web technology—available in the most recent versions of modern browsers—to build web applications with unparalleled functionality, speed, and responsiveness.
This new edition includes major revisions for WebSockets functionality, reflecting the new W3C specification. It also features new chapters covering the drag-and-drop API as well as SVG.
Explains how to create real-time HTML5 applications that tap the full potential of modern browsers
Provides practical, real-world examples of HTML5 features in action
Covers all the new HTML5 APIs to get you up-to-speed quickly with HTML5
Fully updated to include the latest revisions of the WebSocket API, and much more.
What you’ll learn
How the HTML5 specification has evolved
How to develop cutting-edge web applications using new HTML5 features like WebSockets, geolocation, web storage, Canvas, and audio/video
Which features are available in modern browsers
Who this book is for
Web designers and developers who want to use the latest cutting-edge technology available in current browsers
Developers who want to create dynamic, HTML5 web applications
Developers who want to know which HTML5 features are supported by modern browsers
Table of Contents
1.Overview of HTML5
2.Using the Canvas API
3.Working With Scalable Vector Graphics
4.Working with Audio and Video
5.Using the Geolocation API
6.Using the Communication APIs
7.Using the WebSocket API
8.Using the Forms API
9.Working with Drag-and-Drop
10.Using the Web Workers API
11.Using the Storage APIs
12.Creating Offline Web Applications
13.The Future of HTML5

Book DetailsPaperback: 352 pages
Publisher: Apress; 2nd Edition (November 2011)
Language: English
ISBN-10: 143023864X
ISBN-13: 978-1430238645
File Size: 10.9 MiB

Wednesday, 11 January 2012

Email Security and Threats

We are going to talk about internet email security in this article. So be attentive and read more carefully because it is very important if you are a businessman, housewife or even a student. Internet email probably most widely used application on computers and networks. We use them in home. We use them in our businesses so very important for us.

We send and receive dozens of emails every day not like the older snail mail the actual paper letters because response time of email is very quick and now you can even receive your emails on your mobile like Blackberry or other professional mobile internet services.

Unfortunately email is a product which is using widely in world and almost all kind of people using this facility and with a wide usage it also has wide threats. Hackers attack on our computers and networks. Here we shall discus some of the email threats we can face.

1. Phishing

Phishing is essentially a scam where a fake email sends to an unsuspecting recipient. Email look like a genuine email from a reputable company or organization. Usually the victims of these emails are clients of banks and e-commerce website’s clients. Because they look like an email from a trusted organization so the client of that organization open and see it these emails normally have a link inside which refer you to another website which is same like your trusted website’s counterfeit and for example they require a logon from you and when you logon enter your user name and password and after that they give you some kind message like server is down try after some time but on the back end they secretly record your password and use it immediately to steal your money.

How I can save from Phishing?
Yes you can save yourself from phishing not with technology just with a little common sense. When you receive this kind of email and you open that email never click any link if they insist you to update your information.

Check sender email, because the sender email name showing you the name of your trusted organization but when you inspect it, it is not the email of your trusted organization.
If you still confuse on sender’s email. Simple call your trusted bank or other shopping site for confirmation of this email. Tell them date and everything about email and you will find your answer. If you found it bogus don’t safe it, just delete it and mark the email as spam.

2. Chain Emails/Hoaxes

Next threat is the chain email or hoaxes. Like someone email you that X person sad story and ask you to send this email to X number of people. Like campaign of anything on email that can take up valuable bandwidth, waste your time and can also forward malware or any virus. Sometimes these are feel good emails but you don’t know what is behind that and you can be a part of malware victim and also motivator for spread malware.

How can I protect from Chain emails and Hoaxes?
Off course you can save from chain emails, never be a part of chain email because once you all your email in chain email then you always receive chain emails. Some of chain email sender maintains emails record and you will in that record. Make your proper email spam setting. Keep you contacts up-to-date and that make your inbox happy. After that you only receive your contacts email and useful emails.


3. Virus/Malware threats

Virus/Malware attachment emails, yes 80% people open an email attachment to check what is inside because it is human nature and nature insist him to open the email and check what is inside may be some interesting inside and that give you collateral damage in 90% cases. It also can come from your trusted computer if it is infected.

How I can protect my computer from email virus/malware threats?

For this you have to make inflexible yourself for email check. Only open email with attachments from your trusted email and always scan your email even it is from your trusted computer or email. Update your email scanner in your antivirus. Always use antivirus which have an email scanner built-in. One thing in last “use email smartly”

Tuesday, 10 January 2012

Information Technology Ethics

Information Technology Ethics are very important for computer users and computer professionals. As a computer security Investigator this thing governs our conduct when we deal with computers systems data. When you are finding evidences on crime scenes or finding facts from any public or private computers. The thing required in this process is the knowledge and pass through laws and regulation and something we must follow that is ethics because it can disclose and sabotage some one’s privacy.

These days when we talk about human rights, computer privacy is also included in this campaign and this topic is getting lot of attention in computer security world. When we talk about ethics in information technology there is couple of guideline available for this.

Privacy is probably very complex issue especially when we talk about the different definition of privacy in different countries, what consider private and what consider not private. Privacy policy can be differ on social and culture bases and also base of religion but when we talk about international internet privacy policy almost all conscience are same.

When we talk about Ethics in Information Technology, Ethics mean to take the “RIGHT” course of action, whether it’s the law or not. For example law did not tell you to feed hungry people but ethically you perform this task because we all think this is right. Law did not tell you to kind with animals but ethically you have to kind with animals. Ethics don’t come from laws but laws support ethics. Ethics are depend upon our values and these values come from variety of sources like parents how they raise us, peers and friends, religion and practice of religion etc.

Information Technology has its own ethics. In Information Technology the ethics means to act responsibly. Let’s see some points of ethics in Information Technology. Ethics in Information Technology mean to act responsibly with regards to storage, transmission, access and protection of data. Several professional organizations on international standards have code of ethics that computer professional agree to abide.

You can found a document name RFC 1087 on internet and it covers internet ethics. Some of main points of RFC 1087 are following here.

Unethical and unacceptable any activity which purposely:
      1. Seeks to gain unauthorized access to the resource of the internet.
2. Disrupts the indented use of the internet.
3. Waste resources like people, capacity, computer, data though any action
4. Destroy the integrity of computer based information
5. Compromises the privacy of users
Both individual and companies must practice ethical behavior in order to

·  Maintain reputation
·  Lower risk of liability
·  Avoid breaking the law

Monday, 9 January 2012

IPv6 Address Syntax, Address Types and Headers

The most attractive and distinguishing feature of IPv6 is its use of much larger addresses.IPv6 is based on 128 bits, IPv6 is four times longer than the 32-bit IPv4 address. A 32-bit address space allows for 232, or 4,294,967,296, possible addresses. A 128-bit address space allows for 2128, or 340,282,366,920,938,463,463,374,607,431,768,211,456 (or 3.4 x 1038), possible addresses. IPv4 was developed and implemented in 1970′s it was 32bit and due to recent change in technology and rapidly growth of devices which are interacting with internet and few years back internet technology stack holder decided to replace the IPv4 with IPv6. Looking at future, technology developer says With IPv6, it is even harder to conceive that the IPv6 address space will ever be consumed. To help put this number in perspective, a 128-bit address space provides 665,570,793,348,866,943,898,599 (6.65 x 1023) addresses for every square meter of the Earth’s surface. Remember that the decision to make the IPv6 address 128 bits in length was not so that every square meter of the Earth could have 6.65 x 1023 addresses. IPv6 Address Syntax IPv4 addresses are delineated in dotted-decimal format. The 32-bit IPv4 address is separated along 8-bit boundaries. 8 bits is converted to its decimal equivalent and separated by periods. For IPv6, the 128-bit address is divided along 16-bit boundaries, and each 16-bit block is converted to a 4-digit hexadecimal number and separated by colons. The resulting representation is called colon hexadecimal.

The following is an IPv6 address in binary form:
0000001010101010000000001111000000111110001010001001110001010101

The 128-bit address is divided along 16-bit boundaries:
0010000111011010 0000000011010011 0000000000000000 0010111100111011

Each 16-bit block is converted to hexadecimal and delimited with colons. The result is:
21DA:00D3:0000:2F3B:02AA:00FF:FE28:9C5A

IPv6 address representation is further simplified by suppressing the leading zeros within each 16-bit block.

However, each block must have at least a single digit. With leading zero suppression, the result is:
21DA:D3:0:2F3B:2AA:FF:FE28:9C5A

There are three types of IPv6 addresses:

1.Unicast

A unicast address associates a single interface within the scope of the type of address. The scope of an address is the region of the IPv6 network over which the address is unique. With the appropriate unicast routing topology, packets addressed to a unicast address are delivered to a single interface. To accommodate load-balancing systems, RFC 2373 allows for multiple interfaces to use the same address as long as they appear as a single interface to the IPv6 implementation on the host.

2.Multicast

A multicast address identifies zero or more interfaces. With the appropriate multicast routing topology, packets addressed to a multicast address are delivered to all interfaces identified by the address.

3.Anycast

An anycast address identifies multiple interfaces. With the appropriate unicast routing topology, packets addressed to an anycast address are delivered to a single interface-the nearest interface that is identified by the address. The nearest interface is defined as being the closest in terms of routing distance. A multicast address is used for one-to-many communication, with delivery to multiple interfaces. An anycast address is used for one-to-one-of-many communication, with delivery to a single interface. In all cases, IPv6 addresses identify interfaces, not nodes. A node is identified by any unicast address assigned to any one of its interfaces. IPv6 header As you know that IPv6 Is a streamlined version of the IPv4 header. Developers wipe out fields that are either unneeded or rarely used, and adds a field that provides better support for real-time traffic. we can see here all headers details

IPv6 header

As you know that IPv6 Is a streamlined version of the IPv4 header. Developers wipe out fields that are either unneeded or rarely used, and adds a field that provides better support for real-time traffic. we can see here all headers details

Version Version field points the version of IP and is set to 6. The size of this field is 4 bits. While the purpose of the Version field is defined in the same way for both IPv4 and IPv6, its value is not used to pass the packet to an IPv4 or IPv6 protocol layer. Version identification is performed through a protocol identification field in the link-layer header.

Traffic Class Traffic Class field points the IPv6 packet’s class or priority. The size of this field is 8 bits. This field provides functionality similar to the IPv4 Type of Service field. In RFC 2460, the values of the Traffic Class field are not defined. However, an IPv6 implementation is required to provide a means for an application layer protocol to specify the value of the Traffic Class field for experimentation. Like the Type of Service field in the IPv4 header, RFC 2474 provides an alternate definition of the Traffic Class field in the form of the Differentiated Services (DS) field.

Flow Label The Flow Label field indicates that this packet belongs to a specific sequence of packets between a source and destination, requiring special handling by intermediate IPv6 routers. The size of this field is 20 bits. The flow label is used for non-default quality-of-service (QoS) connections, such as those needed by real-time data (voice and video). For default router handling, the Flow Label field is set to 0. There can be multiple flows between a source and destination, as distinguished by separate non-zero flow labels. Like the Traffic Class field, exact details of the Flow Label field’s use are not yet defined.

Payload Length The Payload Length field indicates the length of the IPv6 payload. The size of this field is 16 bits. The Payload Length field includes the extension headers and the upper-layer PDU. With 16 bits, an IPv6 payload of up to 65,535 bytes can be indicated. For payload lengths greater than 65,535 bytes, the Payload Length field is set to 0 and the Jumbo Payload option is used in the Hop-by-Hop Options extension header, which is covered later in this chapter.

Next Header The Next Header field indicates either the type of the first extension header (if present) or the protocol in the upper-layer PDU (such as TCP, UDP, or ICMPv6). The size of this field is 8 bits. When indicating an upper-layer protocol, the Next Header field uses the same values that are used in the IPv4 Protocol field.

Hop Limit The Hop Limit field indicates the maximum number of links over which the IPv6 packet can travel before being discarded. The size of this field is 8 bits. The Hop Limit field is similar to the IPv4 TTL field, except that there is no historical relation to the amount of time (in seconds) that the packet is queued at the router. When Hop Limit equals 0 at a router, the router sends an ICMPv6 Time Exceeded-Hop Limit Exceeded in Transit message to the source and discards the packet.
Source Address The Source Address field indicates the IPv6 address of the originating host. The size of this field is 128 bits.

Destination Address The Destination Address field indicates the IPv6 address of the current destination node. The size of this field is 128 bits. In most cases the Destination Address field is set to the final destination address. However, if a Routing extension header is present, the Destination Address field might be set to the address of the next intermediate destination.