Thursday, November 19, 2009

The future of computing

Imagine, one day in the future.... You buy a computer, bring it home, plug it to the network and switch it on. No need to install Windows or any operating system, just buy the hardware with minimum storage and processing power...

There will be no hassle of install or uninstall. When connected, you will be greeted with a setup configuration assistant that will help you setup the following:

Storage: you will be given some options of storage package with the price list. You select the storage requirement you need, made payments and the storage is yours. You can upgrade or downgrade the storage whenever you want according to the conditions you have agreed before making the payments

Programs and Applications: A list of the applications will be shown to you. Just as the storage, you will be given their package options and select the package you want. The package may consist of word processors, graphic tools, video tools, etc that can be used upon agreeing on a payment agreement. Just click on the package you want, make payments and use whenever you want bounded by the usage agreement.

What else? Antvirus? Firewalls? Oh all that will be taken care of by the provider... no need to worry about plugging in your USB and getting viruses or trojans spawning your PC.

PC konked? Just buy new hardware, connect to the internet, enter your ID code and you are back to using your PC again. No need to reinstall and no data loss.

Of course, there is always two sides of a coin. Contrary to the benefits mentioned, there are issues that need to be concerned about such as information privacy. We will never know how our information is being dealt with as our data and files are being kept at a storage not of our own. What if the data center is being hacked successfully?

Something to think about....

numly esn 99521-091118-912346-70 Rate content:


© 2009 All Rights Reserved.

Tuesday, January 6, 2009

Virus over Friendster

Just recently, I was talking about malicious software intruding computer systems, but I forgot to mention about viruses spreading through social web sites. As most of you may have checked your Friendster account, you could have been a victim of the comment with a girl and a webcam. For those who are interested, they may have clicked the link, and probably downloaded more nasty, evil, malicious scripts or executables without them knowing it!


This is an example of how viruses, trojans and spywares can get into your computer... scary eh? There's Facebook, Tag, Multiply... (and what else??)... and it is up to the operators of these social websites to ensure the security and 'cleanliness' of their servers.

Will the antivirus and antispyware and antitrojan software suffice? This is hard to say, as my PC is currently being invaded by an advertising malware. It is not so serious, only popping up an ad occasionally, and my antivirus would have detected and eliminated it after that. But makes me wonder, is the virus still residing in my PC, or did it come from Facebook, my company webmail server, or a drive-by-download by one of the websites that I have visited?

Monday, January 5, 2009

Food for thought, points to ponder...

2008, as I see it, is a time when cyber security has improved. Attacks of malware still continue, but controllable. I discovered that, searching of hackers tools and websites for malicious methods of attacks has not returned any results. I assume that the relevant parties has taken the steps to eliminate these threats.

What to expect during 2009? With the economic downturn, electronic manufacturers has been adversely affected. Companies are cutting down their expenses, and my guess is that the IT dept will be one the first. This, in turn, with the lack of security in Information Systems in the top management, may trigger the beginning of another wave
of attack in the near future, due to the lack of control and measurement that should be in place. These loopholes in the organization will be discovered, and will be a source for malicious activities.

The Internet has advanced in technology and methods. Web 2.0 (involving social networking and knowledge and resource sharing) and application sharing such as GoogleDocs - will it cause another virus outbreak, or another attack? Would the cyber space be another method of terrorism? hmm... a food for thought....

numly esn 66614-090104-583275-37 Rate content:


© 2009 All Rights Reserved.