From the article:
The desktop OS is besieged from all sides: More and more of our applications now run on the Web, and the idea of running huge, complex, and expensive personal systems will, in time, seem strange.
Does this remark seem strange to anyone else ? I, honestly, am not seeing this trend at all, but I've seen it talked about. What's the reality here ?
A co-worker of mine recently had his service terminated because he had exceeded 1TB of downloading in a month. I'm not sure if this is a regional thing, but that seems like a really high cap. Ultimately, he called them and the solution was to upgrade to a business class connection. It ended up costing him an additional $20 (iirc) a month, but he now has a higher upstream and a static IP. He was cool with that as it seems this works out better for him anyway, but any sort of cap for an advertised unlimited service is a bit ridiculous.
Paying people to make these calls can be pretty costly. The article also states that by automating the process, they'll be able to reach out to more customers. I assume this means they will lessen the existing threshold for "evil traffic" notification.
If they are running some sort of IDS, and they are able to help people become aware of infections/backdoors/etc., they can probably salvage a good deal of bandwidth from garbage/unwanted traffic.
There are plenty of security concerns with an unencrypted network.>While FON looks like it may be interesting to some people, I need all my bandwidth for my porn.
On a more serious note, many providers in the US will cancel or severely cripple your service if you use so much bandwidth in a month or other predefined timespan. There are other factors to consider.
While some malware/botnet clients may escape anti-virus detection, the common trait is that they all have to connect to a command and control server. Many IDS products have signatures to detect this type of traffic.
For example, many "botnet-kits" will connect using IRC on a random high port. IRC usage audit signatures are good for detecting the more common botnet c&c traffic.
Prevention is key, but it's still not easy - trying to keep Joe User from playing that Michael Jackson video he got in his email from an unknown sender is quite a challenge.
He has not acquired a fortune; the fortune has acquired him. -- Bion