Youry's Blog

Youry's Blog

Archive for the ‘Cloud Computing’ Category

Security and again Security, now for emails and web-browsers

leave a comment »

As I already mentioned in the past, all these posts are for myself only. But if my posts could help with something to somebody else, I’ll be happy as well.

In this post I’m starting to collect information how to improve security for everything on personal computers, smart phones and in other digital devices. My laptop was stolen in December 2011 from someone, who should not leave it in a store cell. Nobody is protected from such stupid situations. I had encrypted hdd, but not emails and as you probably know, a microsoft windows can be opened easily. I still keep my emails on my smartphones, but again emails are not encrypted on any smartphone. We should do something to increase our privacy protection. I’ll add to this post new links and new my thoughts in time.

1. Emails:

  • Six Tips for Protecting Your Email Privacy:  “Sending an email message is certainly more private than posting on a social networking site, but email has its own dangers. Here are six tips to help you communicate without risking your privacy” By Neil J. Rubenking.
    Good paper, but nothing really new. Good to read for the general understanding of the email problems. But has couple good links for encryption product like PrivateSky or Enlocked.
  • U.K. Police Capturing Suspects’ Cell Phone Data” – good to know. Don’t keep very personal emails in your smartphones, or encrypt each message if you want to keep them in your email archive.
  • will be added later

2. Browsers (see some in emails), but later will be added specifically for browsers as well, when I have a time or see something new.

Advertisements

Written by youryblog

May 21, 2012 at 4:15 PM

A new paper about Cloud security (not technical :) ) : Hacked!

leave a comment »

I really enjoyed this paper and probably will use some recommendations/suggestions from this paper in my possible research about Cloud. I agree with the author James Fallows , that we should not relay or believe to such monsters as Google, Microsoft, Yahoo and all others. They make money on us, but they don’t want to provide any real good service. I was in such situations personally for many times. “Free cheese in a mouse trap only”. Enjoy his reading here: http://www.theatlantic.com/magazine/archive/2011/11/hacked/8673/2/?single_page=true

Youry

Written by youryblog

March 17, 2012 at 3:13 PM

I like this paper: “Berkeley Explains Exactly Why It Chose Google Over Microsoft”

leave a comment »

I like this paper: “Berkeley Explains Exactly Why It Chose Google Over Microsoft” published here: http://articles.businessinsider.com/2011-12-23/tech/30547371_1_google-apps-google-products-migration

In my last paper about Cloud Computing I already mentioned several other cases, when educational institutions migrated from MS email system to the Google products. I don’t think that Google is a very good solution either, but from two evils is better to chose Google. This is my personal opinion. I was a director of IT Services for 6 years and my experience with the MS products was not I can say “a very positive”.

Youry

Written by youryblog

December 28, 2011 at 7:22 AM

Application Development: Skype, NYSE Error Top List of 13 Big Programming Failures of 2010

leave a comment »

Application Development: Skype, NYSE Error Top List of 13 Big Programming Failures of 2010
http://www.eweek.com/c/a/Application-Development/Skype-NYSE-Error-Top-List-of-13-Big-Programming-Failures-of-2010-119831/?kc=EWKNLBOE01072011STR1
By Darryl K. Taft on 2011-01-03

Thank you very to Darryl K. Taft for very interesting information about bugs. The excerpt from his information is below, but I recommend to watch his slideshow on the original website. I did this excerpt for my research purposes only, don’t watch his slideshow for several times.

“… New York Stock Exchange (NYSE) systems, a Skype crash, problems with Chase online banking, faulty automobile systems at Toyota and privacy breaches… The Skype outage, which affected a large number of Skype’s 560 million users, resulted from a bug in the Windows version of the software.
Software application defects are inevitable, but developers have a better chance of catching them if they use enhanced debugging and code analysis platforms and employ Agile methods.”

and some others:
# McAfee’s Glitch: a software update to protect computers against a list of malicious files causing affected computers to shut down and start on a continuous reboot cycle.
# Russian Satellite: In December after the successful launch of the final three GLONASS navigation satellites a programming error caused the carrier rocket to veer off course and lose the Proton-M booster rocket carrying the satellites in the Pacific Ocean north of Hawaii.
# NYSE Timing Error: A timing error on a software update at NYSE Euronext’s electronic Arca exchange prompted an exchange-traded fund tracking the Standard & Poor’s 500 index to drop nearly 10 percent.
# Android Kernel Bug: In November, an analysis of the kernel used in Google’s Android smartphone software turned up 88 high-risk security flaws that could be used to expose users’ personal information.
# Facebook Privacy CSRF: It was discovered, that Facebook has a cross-site request forgery flaw that could have allowed hackers to alter profile information and change privacy settings for individual pages.
# Chase Online Banking: Software from a third-party database company corrupted information in Chase systems and prevented users from logging on. The service was down for two days and had an impact on millions of customers.
# Toyota Electronic Data Recorder: A software bug in electronic data recorders for Toyota (the black box that records the speed of the automobile) was found to have created incorrect readouts. \
# AT&T: exposed a flaw in the software for Alcatel-Lucent’s 3G network equipment, causing users of iPhone4G to experience abnormally slow upload speeds.
# Google Street View: Early in 2010, Google admitted that for the last three years it had been inadvertently collecting private data from WiFi networks as part of its Street View data collection activities.
# German Credit Cards Get Hit with the 2010 Bug: At the beginning of the year, 30 million German credit and debit cards were affected by a software bug that prevented the microchips in the cards from recognizing the year change.
# Windows vs. Linux Supercomputing Flaw: Windows and Linux went head-to-head in a contest for supercomputing speed, but a software bug in the package designed to run the Microsoft test seems to have kept Windows from beating (or at least matching) Linux.
# Medical-Device Recalls: In mid-2010, there were a number of emergency-response systems in the Midwest that malfunctioned around the times of tornadoes and other natural disasters that were software-related. We also saw a number of medical-device-related recalls, like the CareFusion electronic drug-infusion pumps and software issues related to recalled Baxter dialysis machines.

Written by youryblog

January 7, 2011 at 3:45 PM

Why Are Health Data Leaking Online? Bad Software, Study Says

leave a comment »

http://blogs.wsj.com/digits/2011/01/03/why-are-health-data-leaking-online-bad-software-study-says/?KEYWORDS=security
By Jennifer Valentino-DeVries

They say, that “Health documents with sensitive patient information can be found in “peer-to-peer” networks, which people typically use to share music files and the like. The issue can arise when health workers transfer data from firms’ proprietary software to their home computers. If they or someone in their family uses file-sharing software, files can be picked up.”

“Johnson says the biggest culprit for data leakage is hard-to-use software… poorly designed programs force health care industry employees to download files onto their home computers, where they are often forgotten. Johnson says that switching to cloud computing technology would make it possible for smaller businesses to have access to software that is easier to use. However, he notes that cloud computing also opens data up to other threats, including large-scale hackers.”

Written by youryblog

January 7, 2011 at 3:16 PM

11 Expert Predictions for Cloud IT in 2011 by Chris Preimesberger

leave a comment »

11 Expert Predictions for Cloud IT in 2011 by Chris Preimesberger
“… During the last couple of years, most of the research, testing, re-testing and quality assurance work on this new phase of IT has been completed at the high-performance computing and large enterprise level, and midrange and smaller enterprises are now following suit. … In this slide show, eWEEK, with the assistance of data management software provider Aprigo, brings you a collection of predictions from known and respected authorities, including company founders, chief technical people and a systems administrator or two.” Chris Preimesberger see more here: http://www.eweek.com/c/a/Cloud-Computing/11-Expert-Predictions-for-Cloud-IT-in-2011-564092/?kc=EWKNLEDP12312010D

Written by youryblog

December 31, 2010 at 12:00 PM

Posted in Cloud Computing, IT

Oracle grid computing and cloud computing

leave a comment »

Oracle grid computing and cloud computing: Special report
By Shayna Garlick, Associate Editor
25 Mar 2010 | SearchOracle.com
http://searchoracle.techtarget.com/news/2240017004/Oracle-grid-computing-and-cloud-computing-Special-report?
As cloud computing soars in popularity, it leaves us with the questions — where does grid computing fit in? How are they different? While there isn’t always an obvious answer, and each technology may have different meanings for different people, having a clear understanding of grid computing and cloud computing in Oracle is important. In this special report, we take a look at the definition of grid computing and cloud computing, how they compare to other technologies such as clustered computing, how grid computing and cloud computing are used in Oracle and the future of their adoption.

Written by youryblog

May 13, 2010 at 9:37 AM