Forgot your password?
typodupeerror
Security

+ - WikiLeaks Lessons For Security Managers->

Submitted by nickh01uk
nickh01uk (749576) writes "Rarely does a story with a strong information security thread garner so much attention in the press. When the leaking of secret state information is combined with pent-up public interest in the subject matter, demand meets supply and column inches result. Putting to one side the virtues or vices of making this particular information public, what lessons can we learn from it as Information Security professionals?"
Link to Original Source

+ - HBGary Federal hacked and exposed by Anonymous->

Submitted by Anonymous Coward
An anonymous reader writes "As the coin was tossed to kick off Superbowl XLV, Anonymous unleashed their anger at a security firm who had been investigating their membership.

HBGary Federal had been working on unmasking their identities in cooperation with an FBI investigation into the attacks against companies who were cutting off WikiLeaks access and financing.

Unlike the DDoS attacks for which Anonymous has made headlines in recent months, this incident involved true hacking"

Link to Original Source
Cellphones

iPhone Game Piracy "the Rule Rather Than the Exception" 268

Posted by Soulskill
from the hey-some-people-can't-afford-that-99-cents dept.
An anonymous reader writes "Many game developers don't think of the iPhone as being a system which has extensive game piracy. But recent comments by developers and analysts have shown otherwise, and Gamasutra speaks to multiple parties to evaluate the size of the problem and whether there's anything that can be done about it. Quoting: 'Greg Yardley confirms that getting ripped off by pirates is the rule rather than the exception. Yardley is co-founder and CEO of Manhattan-based Pinch Media, a company that provides analytic software for iPhone games. ... "What we've determined is that over 60% of iPhone applications have definitively been pirated based on our checks," he reveals, "and the number is probably higher than that." While it's impossible to estimate how much money developers are losing, it involves more than the price of the game, he says. "What developers lose is not necessarily the sale," he explains, "because I don't believe pirates would have bought the game if they hadn't stolen it. But when there is a back-end infrastructure associated with a game, that is an ongoing incremental cost that becomes a straight loss for the developer."'"

Comment: There can be huge differences in performance (Score 1) 361

by nickh01uk (#28178619) Attached to: When VMware Performance Fails, Try BSD Jails
Theres a nice little article here (basic reg. required) contrasting VMware and Citrix XenServer, where the end user was forced to abandon VMware (their default choice) after suffering performance problems and after 6 months of back and forth with tech support and engineering at the vendor. In the end XenServer delivered 2x the real world performance on identical hardware with a default install. Not all workloads are equally well virtualized! N.

Comment: Re:I'm guessing VMWare isn't that worried (Score 1) 259

by nickh01uk (#26962637) Attached to: Citrix XenServer Virtualization Platform Now Free
Re: unsupported trials.

If you'd dropped my company a line we'd have offered a supported trial with an allocated engineer (okay, time spent would depend partly on potential size of a deployment...) but you'd certainly have spent nothing finding out what the product could and could not do in a supported way. We'd probably both have learnt something, I love real-life tests :-) Sometimes there are benefits in NOT buying direct off the vendor's web store :-) End of outrageous plug! Oh, we also do VMware, I guess what Im saying is that deployment is about more than just the upfront sticker price of the product.
PK

Comment: Has to be good news for the customer because.... (Score 1) 259

by nickh01uk (#26962373) Attached to: Citrix XenServer Virtualization Platform Now Free
it will provide free access to competitive technology, keep the established vendor(s) straight, and (eventually) will give rise to cross-platform management tools and frameworks.

At last it looks like there will be a free, supported, commercial-grade virtualization solution for those of us who dont have the budget for VMware and have been disappointed with Hyper-V and its predecessors.

I can only imagine this is unhappy news for VMware who surely must now take a reality check on their pricing. I sincerely hope they do not go the same way as Netscape, having 3 strong vendors in the market stops a lot of the kind of bad behavior you see from ERP, CRM, and BI vendors (you know who you are guys!). There was a balanced 2 minute comparison of Hyper-v, XenServer, and VMware over at the 360 blog here.

For the VMware, Xen, and Hyper-V fanboys (are there any Hyper-V fanboys yet?), calm down and take a tip from that blog:

"Providers of the core hypervisor technology will continue to play a game of technical leapfrog with one another for at least a couple of years, while those with a management, enterprise framework, or suite will claim more strategic long-term positions around "liquid infrastructure" or something else suitably bendy. What is most important right now is that you have the right information processing architecture, not any one particular product within it."

Security

+ - 7 Wonders of the Security Software World->

Submitted by
nickh01uk
nickh01uk writes "The guys over at Three Sixty Information Security have published the results of their annual analysis on 7 of the most popular security tools in common use by systems administrators. The articles examines the tools on their merits and attempts to pull together common threads running through each. Finally they put forward their answer to the question "What makes this software so uncommonly good?" If only all software was written like this..."
Link to Original Source
Security

+ - The Characteristics of Secure Software->

Submitted by
nickh01uk
nickh01uk writes "Particularly topical in light of the widely reported Cisco IOS software vulnerability, Three Sixty Information Security have analysed 7 of their most frequently recommended tools for network and system administrators. Among the regulars like ssh and nmap are some tools less commonly known for their security admin credentials. The article examines each on its merits and uses the results to build a screen for evaluating the robustness of future software. Finally it attempts to answer the question; "What makes this software so uncommonly good?""
Link to Original Source
Security

+ - Web under attack by Al Qaeda

Submitted by shanen
shanen (462549) writes "Don't put my name on it, and I'm not going to provide any evidence, but if you dig around a bit, maybe you can find it. Just a tip to let you know the Internet is under attack by Al Qaeda sympathizers."
Security

+ - The Secret Sauce In Secure Software->

Submitted by
An anonymous reader writes "Researchers at independent Three Sixty Information Security have analysed 7 of their most frequently recommended tools for network and system administrators. Among the regulars like ssh and nmap are some tools less commonly known for their security admin credentials. The article examines each on its merits and uses the results to build a screen for evaluating future projects. Finally it attempts to answer the question; "What makes this software so uncommonly good?"

The results may surprise you."

Link to Original Source
Programming

+ - What makes for secure software?->

Submitted by
An anonymous reader writes "Three Sixty Information Security have analysed 7 of their most frequently recommended tools for network and system administrators. Among the regulars like ssh and nmap are some tools less commonly known for their security admin credentials. The article examines each on its merits and uses the results to build a screen for evaluating future projects. Finally it attempts to answer the question; "What makes this software so uncommonly good?"""
Link to Original Source

Mathemeticians stand on each other's shoulders while computer scientists stand on each other's toes. -- Richard Hamming

Working...