Category Archives: business
What is a Zero day exploit?
A zero-day (or zero-hour or day zero) attack or threat is a computer threat that tries to exploit application vulnerabilities that are unknown to others or the software developer
A life cycle of the Zero-day exploit
- The developer creates software containing an unknown vulnerability
- The attacker finds the vulnerability before the developer does
- The attacker writes and distributes an exploit while the vulnerability is not known to the developer
- The developer becomes aware of the vulnerability and starts developing a fix.
The problem starts when the developer does not receive information about the exploit, while the applications are exploited. Longer the exploit remains in the hands of a few the more “valuable” and dangerous it becomes.
Economics of the Zero day exploits
A security whole can be around for a long time, unless it is known and fixed or the code causes the whole becomes obsolete. Our old understanding of using software product supported by an active community or a big organization makes you reasonably secured as long as you update the security patch as soon as they comes out. Providing our understanding that zero day exploits are publicly available and do not stay Zero-days for long.
Once upon a time (not so long ago) Red Hat Binary distribution used to free. Then they changed their business model, decided to charge for the binary and started of the fedora project where free Red Hat binary took off.
Soon after Red Hat, removed freely available Linux distribution from circulation and asked us to use and work on fedora if we want to avail a free binary and updates with short support and cutting edge stable technology. So many closes of RHEL came out. People wanted a free and stable environment to continue to run their applications in a self supported environment.
When we think about email collaboration/unified messaging the first things comes into our mind is Microsoft exchange, probably not because they pioneered email collaboration but because they have great success of with all enterprise segments, more importantly the end users to felt the impact of email collaboration. Microsoft Exchange Server 4.0 was released at 1996 something that could be integrated to directory services; it was probably the first competitor to Lotus notes released in early 90s.
Let’s not forget novel. In 1990 brought the release of WordPerfect Office 3.0, adding Macintosh and UNIX to the client mix and supporting multiple servers with cross-server email, calendaring and scheduling. The next version 3.1 even included remote sync.
Today’s email Collaboration / Unified messaging
Today when try to understand email collaborative software, we think about something more than email and address book. It is also called unified messaging. Enables us to share calendar events and task lists, update presence information, advanced email routing, global/corporate address book, sharing documents and other media without having to attach it, email auto responders; most importantly, access to all these through push notification support from of your favorite desktop collaboration application, mobile, tablet, or just any web browser. Email collaboration systems are also expected to be integrated with the directory services as well as other collaboration system running within the enterprise.
Things we take for granted, antivirus, anti spam, central authentication, high availability, monitoring, backup etc.
Password! Password!! Password!!!
What is worse then having a week password? Storing your password in clear text. Fortunately/Unfortunately It is nothing to do with you.
WP Sauce reports an attack took place yesterday, with the EvilShadow team replacing the front page to Microsoft’s online India store
with a page called evil.html. The site is still currently down.
What is a SAN?
A storage area network (SAN) is a dedicated high performance network provides access block level to Data. The in modern day data is stored in an array of hard disk drives or solid-state drive or a combination of both.
This Storage area network is usually separated from the local area network for performance and security reasons.
Over a SAN there is no access to the file systems directly; rather they are access able in a block level. The operating system will think as if the disk is attached to it directly and the access is going to be block level. A SAN can be shared across many servers.
This seems like an eco-dream come true, a car the runs on air developed in India. I've seen stories on this since 2008, but have yet to see the car hit market. Now the claim is in August 2012.
I don't think you'll see IPCC chairman Rajenda Pachauri driving one of these though, since he has been prone to booking posh 5 star hotel suites…
Moodle can be used in many types of environments such as in a learning delivery tool in educational institutes, and for business settings as a community and collaboration tool, can be used for compliance and training. The modular design of Moodle allows it to address wider range of business issues then other most closed source alternatives. Moodle is Open source and free.
The Moodle market share has seen a rapid growth over last 7 years of years. While is started from less then 100 thousand and now over 1.2 million. The reason for this with loyal user base would be Mooldes features, scalability and reliability. Open sources This eliminates the possibility of any vendor lock down. There is no requirement for per user licensing. Moodles millions of registered users who constantly share the ideas, codes, information and free support. This makes scope and possibilities enormous.
While we fight over free flow of information and technology, apple and Motorola is going back in the court room claiming their Intellectual property. Google authorized Motorola to seek an injunction against the iPhone 4S and iCloud. They are seeking an injunction against the iPhone 4S and the iCloud over a package of six patents previously asserted against older Apple products. Some patents like “receiver having concealed external antenna” and “method and apparatus for communicating summarized data”
While apple fights for its OS interface design and hardware design, father of cell phone with granddaddy of search looking over hits apple in its core.