8.05.2011
Outlook Blog - Your Outlook calendar: Would you exist without it?
Great tips on expanding your usage of Outlook's calendar functionality! There are tips for the calendar novice to heavy user. --Stuart
7.28.2011
June Nielsen numbers show Android atop OS heap
Android is the top operating system in the United States, according to June data just released by Nielsen. Android hold a 39 percent share of the U.S. smartphone market, with iOS coming in second with 28 percent and Blackberry in third with 20 percent. Bringing up the rear is WP7 with nine percent, and Symbian and WebOS with 2 percent each.
Though Android is the OS to beat, Apple still holds the title of top smartphone manufacturer, claiming all 28 percent of iOS's market share. Among the devices running Android, HTC holds a slim lead with 14 percent market share, followed by Motorola at 10 percent, Samsung at 8 percent, and all other manufacturers accounting for the remaining 6 percent.
5.16.2011
Report: Windows 7 almost five times more secure than XP
Important for those thinking that Windows XP is adiquate in 2011.
-Stuart
4.28.2011
How Dropbox sacrifices user privacy for cost savings
How Dropbox sacrifices user privacy for cost savings:
Summary
Dropbox, the popular cloud based backup service deduplicates the files that its users have stored online. This means that if two different users store the same file in their respective accounts, Dropbox will only actually store a single copy of the file on its servers.
The service tells users that it 'uses the same secure methods as banks and the military to send and store your data' and that '[a]ll files stored on Dropbox servers are encrypted (AES-256) and are inaccessible without your account password.' However, the company does in fact have access to the unencrypted data (if it didn't, it wouldn't be able to detect duplicate data across different accounts).
This bandwidth and disk storage design tweak creates an easily observable side channel through which a single bit of data (whether any particular file is already stored by one or more users) can be observed.
If you value your privacy or are worried about what might happen if Dropbox were compelled by a court order to disclose which of its users have stored a particular file, you should encrypt your data yourself with a tool like truecrypt or switch to one of several cloud based backup services that encrypt data with a key only known to the user.
3.17.2011
Whats thinner than a MacBook Air?
Wonderful to see some of these great versitile Windows based notebooks being released!
3.07.2011
Google Responds To Android Malware, Will Fix Infected Devices And ‘Remote Kill’ Malicious Apps
Google has now confirmed that 58 malicious applications were uploaded to Android Market, and that they were downloaded onto around 260,000 devices before Google removed the apps Tuesday evening. That number sounds alarmingly high, but Google believes that only device-specific information, namely the phone’s IMEI number, was compromised — and that no personal data or account information was ever transferred. Given that these apps were getting root access, this could have been a lot worse. Now the cleanup begins.
Something to think about as smart phones becoming common place. Be careful what you install on your phone!
-Stuart
3.03.2011
2.16.2011
IE9 and Tracking Protection: Microsoft disrupts the online ad business
Microsoft has just launched a remarkably effective tool to protect your privacy on the web. Using the IE9 RC, it takes exactly two clicks to begin blocking cookies, web beacons, and other third-party tools that track your movements and activities on the web. Here’s how it works.
"As indicated by Ed Bot in this report there are some really great features coming in the next version of Internet Explorer (IE9). If you have not done so already I encourage all our users to download the IE9 Release Client to see what improvements have been made - Download from Microsoft's Beauty of the Web HTML5 test site.
2.08.2011
How to Avoid the Most Common and Dangerous Passwords
In a recent survey conducted by ZoneAlarm, 79% of consumers were found to use risky password construction practices, such as using personal information and common words. The graphic below illustrates some of the most commonly made mistakes people make when selecting a password, as well as some tips on how to make your password more secure - read further at the Zonealarm Blog.
1.28.2011
Full Drive Encryption Now Available
Implementation will be seamless for users of our recommended Windows 7 notebook/docking station computing environment – for a full demo or to inquire about swapping your current desktop or desktop/notebook please send an email to wsmhelp@syr.edu.
Full disk encryption is a SU campus initiative and will be required for all Windows, OSX and Linux notebooks owned by the University. For details on how this may be implemented on your existing notebook please contact Stuart for more information.