computers

Wed
16
Jun
Dennis Faas's picture

Centralized Computing

Centralized computing is computing done at a central location, using terminals that are attached to a central computer. The computer itself may control all the peripherals directly (if they are physically connected to the central computer), or they ... may be attached via a terminal server. Alternatively, if the terminals have the capability, they may be able to connect to the central computer over the network. The terminals may be text terminals or thin clients, for example. A modern day form of centralized computing is the cloud computing model . Centralized computing offers greater security ... (view more)

Tue
27
Apr
Dennis Faas's picture

Apple CEO Refutes Apps Store for Mac PCs, Macbooks

Apple chief Steve Jobs has quashed speculation that the company might switch Mac computers to an App Store system. It comes as a relief to software developers who won't have to go through the same approval process as with portable Apple devices. A ... report published by programmers Rixstep last week claimed that Apple was to end the current system by which, as with most computing platforms, any compatible software can run on a Mac computer and can be installed at will by the user. Rixstep claimed that software developers would have to pay $99 for membership in an Apple program, that they'd have ... (view more)

Tue
20
Apr
Dennis Faas's picture

7 Million Chinese IPs Infected with Conficker Worm: Report

In a recent annual security report posted on the web site of China's National Computer Network Emergency Response Technical Team (CNCERT), it was reported that almost 7 million Internet Protocol (IP) addresses were infected with the "Conficker B" ... worm at the end of 2009. While the number of infections fluctuated on a week-to-week basis, all but one week had at least 5 million IP infections in the country. Statistically, China represents 28 per cent of the total number of compromised computers infected with the Conficker B worm, the largest percentage world-wide. (Source: pcworld.com ) ... (view more)

Thu
08
Apr
Dennis Faas's picture

Decentralized Computing

Decentralized computing is a trend in modern day business environments. This is the opposite of centralized computing, which was prevalent during the early days of computers. Decentralized computing is the allocation of resources, both hardware and ... software, to each individual workstation, or office location. In contrast, centralized computing exists when the majority of functions are carried out, or obtained from a remote centralized location. Benefits of Decentralized Computing A decentralized computer system has many benefits over a conventional centralized network. For example, desktop ... (view more)

Fri
05
Mar
Dennis Faas's picture

Spanish Police Arrest Hacker Trio, 13M PCs Infected

Spanish police have arrested three individuals for what is believed to be one of the biggest computer crimes in history. At a news conference delivered this past Wednesday, police revealed that malicious programs created by the accused were used to ... steal bank details from computers all over the world, and that these programs had the potential to cripple the computer systems of an entire country. The accused men are said to be between the ages of 25 and 31, each from a small town in Spain. 13 Million Infected PCs in Control Their transition into hacking came after the acquisition of a virus ... (view more)

Tue
01
Dec
Dennis Faas's picture

Sketchy Firm Promises Mac Clones, Loses Humiliating Court Battle

A sketchy firm based out of Miami Florida which falsely claimed it could sell cloned Macintosh machines has already suffered the wrath of Apple in the courtroom. Now it's suffering embarrassment as the truth emerges about its poor sales record. ... Psystar has been in long-running legal battles with Apple after selling computers which were made with PC parts but ran the Mac "Leopard" operating system. As Apple doesn't license its software to other manufacturers -- and you'd think that would made for a clear-cut court ruling, but the process was somewhat extended by Psystar (unsuccessfully) ... (view more)

Wed
18
Nov
Dennis Faas's picture

Wpad.cn: Experts Fear Hackers Will Buy Important Domain

There is some fear circulating among industry insiders over a domain name on sale right now. While wpad.cn might be of little significance to the average end-user, cybercriminals would rejoice over its acquisition. Duane Wessels, the president of ... Measurement Factory, knows how important the wpad namesake is. Wessels is the owner of five wpad domains: wpad.com, wpad.net, wpad.org, wpad.biz and wpad.us. While not a popular domain for Google searches, the sites are frequented by Windows computers erroneously searching for network configuration information, due to a decade-old Windows bug that ... (view more)

Mon
09
Nov
Dennis Faas's picture

MS Report: Worms Outpace Rogue Software Infections

A recently released security report from Microsoft warns that cyber crooks are digging deeper into computers in order to steal and control data. The Security Intelligence Report reveals that rogue security software ("scareware") was the biggest ... threat during the first half of this year. Worm Activity on the Rise In a recent report, Jeff Williams, Microsoft's Malware Protection Center principal architect noted that rogue security software is no longer the primary tool for hackers and that worm activity, particularly the Conficker and Taterf worm, are on the rise. Scareware usually ... (view more)

Thu
09
Jul
Dennis Faas's picture

North Korea Suspected of Cyber Attacks on U.S.

Just in time for the announcement that the National Security Agency (NSA) will be pervasively monitoring private networks comes news that cyber attacks attributed to North Korea paralyzed major South Korean and U.S. government web sites. Eleven ... South Korean organizations, including the presidential Blue House, the Defense Ministry, the National Assembly, Shinhan Bank, Korea Exchange Bank and top Internet portal Naver, and coincidentally, eleven U.S. sites including the U.S. Treasury Department, Secret Service, Federal Trade Commission and Transportation Department, went down or experienced ... (view more)

Wed
20
May
Dennis Faas's picture

FAA's Air Traffic Control Apps Highly Vulnerable

A government audit has found more than 3,800 vulnerabilities were reportedly found in the Federal Aviation Administration's (FAA's) web-based air traffic control system applications. 763 of the vulnerabilities are high-risk and some could put air ... travelers at risk. Congress requested the audit of air traffic control (ATC) computer systems in order to ensure air travelers were safe. (Source: cgisecurity.com ) The FAA has been using commercial software and Internet Protocol-based technologies in order to modernize ATC systems, moving away from the proprietary software the systems were ... (view more)

Pages

Subscribe to RSS - computers