
Tuesday, 24 November 2009
Windows 8 - We have just got the hold of 7

Monday, 12 October 2009
Mc Millian Coffee Morning @ BSS Belfast
Conrad Traynor (Coffee Buff) not only ground and supplied his own coffee but supplied a very shinny looking coffee machine that made the most divine roast coffee I have ever had the pleasure of drinking. Con buys and blends his own beans so anything else would just be wrong.
Paul (Walk about Watson) commissioned his mother, a semi pro baker to the local church to make and supply two of the largest pavalova I have ever seen or tasted. Mrs Watson can bake them all day long and we would find a home for them.
My daughter (Princess Megan) made a beautiful sponge cake and decorated it in the McMillian logo. Not only did it go down well but it received the most ahhhhhhhhh of the day.
As usual ‘Mrs Moss’ or mother to the BSS crew took charge of the proceedings and delivered one of the best break times I have ever attended. I say break time, cuz it lasted from than a coffee or tea break. The rest of the team, Linda, Jenny, Sandra and some of the engineers all chipped in to supply tray bakes and buns.
Oh, one can’t forget the cake Rosi made. Noted as a Jami Oliver special and filled with fresh cream and nuts, there was no one getting seconds.
Dean had the best seat in the house as all the kit was served from his table.
As a follow up to this and to raise more funds for Rosi’s chosen charity, Chris Birt (Dancing Boy) is organising a cycle from the University of Ulster to the Bar in Cutters Warf. Now there’s a surprise.
Tuesday, 6 October 2009
Phishing attack targets Hotmail
Thousands of accounts on web-based e-mail system Hotmail have been compromised in a phishing attack, software giant Microsoft has confirmed.
BBC News has seen a list of more than 10,000 e-mail accounts, predominantly originating from Europe, and passwords which were posted online.
Microsoft said it had launched an investigation.
Phishing involves using fake websites to lure people into revealing details such as bank accounts or login names.
"We are aware that some Windows Live Hotmail customers' credentials were acquired illegally and exposed on a website," said a Microsoft spokesperson.
"Upon learning of the issue, we immediately requested that the credentials be removed and launched an investigation to determine the impact to customers."
Quick change
Graham Cluley, consultant at security firm Sophos, told BBC News the published list may just be a subset of a longer list of compromised accounts.
"We still don't know the scale of the problem," he told BBC News.
Technology blog neowin.net was the first to publish details of the attack. It said the accounts were posted on 1 October to pastebin.com, a website commonly used by developers to share code.
Although the details have since been removed, BBC News and Neowin has seen a list of 10,028 names beginning with the letters A and B.
BBC News has confirmed that the accounts are genuine and predominantly originate in Europe.
The list included details of Microsoft's Windows Live Hotmail accounts with email addresses ending hotmail.com, msn.com and live.com.
Mr Cluley advised Hotmail users to change their password as soon as possible.
"I'd also recommend that people change the password on any other site where they use it," he said.
Around 40% of people use the same password for every website they use, he added. With Ironkey's Password Manager, you need not worry about managing multiple log on details as the platform does it all for you.
Well worth the investment - www.ironkey.com
Friday, 28 August 2009
Windows 7 in Business
"I think they have a really good product at a really bad time," Directions on Microsoft analyst Michael Cherry said in a telephone interview this week.
Among Windows 7's business-oriented features is "XP Mode"--a downloadable add-on that lets applications that won't work natively in Vista or Windows 7 run in a free, virtualized copy of Windows XP.(Credit: Microsoft)
While Cherry says that there is definitely a lot to like about Windows 7, the release comes at a time when IT budgets are shrinking and companies are trying to limit new technology projects, even ones as badly needed as updating aging stables of desktop and notebook PCs.
"Even if they like it, I don't know how fast it is going to go when it is ranked against all the things IT has to do against a shrinking budget," Cherry said.
Among the things that should appeal to businesses about Windows 7, Cherry said, are its improved compatibility and performance, Windows XP Mode and a DirectAccess feature that allows for automatic virtual private network-like connections to a corporate network anytime a PC is connected to the Internet. (See chart below.)
Windows 7 goes on sale to consumers and small businesses on October 22. However, large businesses with volume licensing deals can get access even earlier, although most will wait before putting it on anything other than test machines. Gartner analyst Michael Silver said that, as with other releases, most businesses will take a year or 18 months before starting to deploy Windows 7. However, he added that "we've had a surprising number of calls with organizations, some very large, planning to move fairly early."
With little appetite for widespread spending to beef up old machines, Cherry said that many businesses may just upgrade to Windows 7 as they buy new machines. "I'm not sure that isn't going to be the majority way that this is handled," Cherry said, pointing out that would still be an improvement from Vista, where most companies wiped the operating system off of new PCs and instead installed Windows XP.
One quibble that Cherry has is with the way that Microsoft bills Windows 7 as a major upgrade even though so little has changed under the hood.
"I think they confuse major with important," Cherry said. "It's an important update. It's one you want to take advantage of."
Windows 7, Cherry said, is noteworthy simply because it addresses many of Vista's shortcomings and makes the key improvements that Vista brought now accessible and attractive to businesses.
In many ways, he considers Windows 7 to be the "R2" release of Vista, borrowing the nomenclature Microsoft uses to describe updates to its server products. That's not a bad thing, he said, noting that server customers have rather liked the way Microsoft alternates between minor and major releases.
"R2 has been a very solid approach for (Windows Server)," Cherry said, "and people know what they are getting."
As an indication of just how close Windows 7 is to the border between minor and major, the server version that was developed simultaneously is being designated as Windows Server 2008 R2--a minor upgrade.
Cherry said that perhaps Microsoft should just embrace Windows 7's "minorness."
"You really don't want two major releases in a row," he said, arguing that the major architectural changes made with Vista are akin to pouring new concrete. "It needs time to cure. It needs time to settle in," he said. "It doesn't mean that, as an interim release, Windows 7 isn't important."
Just Back
I've attned WPC 09 andhv loads off feedbak on some of te key topics discussed.
Thursday, 5 February 2009
IronKey Anti-Malware Protection

Monday, 2 February 2009


Working direct with the development team in Ironkey, the Envisioning Team in conjunction with Business & Scientific Services (BSS) developed a very special Ironkey that would benefit and secure Microsoft Vista machines across the entire Northern Ireland Civil Service and beyond. A Senior official within Microsoft commented 'Microsoft see huge benefit in this solution and believe it could be taken used within the Global Service Market'.
Building on the secure Ironkey platform, the NICS and the Envisioning Team believe Ironkey can address the required security needed for a modern day Government.
The Northern Ireland Envisioning Team are leading the way for our UK counterparts. A recent statement from Gordon Brown states 'Government cannot promise the safety of personal data entrusted by the public'. What a statement - Way to go Gordon

Monday, 19 January 2009
Cloud Computing with Pano Virtual Desktop

Not only has this little device no CPU, no memory, no operating system, no drivers, no software and no moving parts it's footprint is less than a tea coaster.
Pano connects keyboard, mouse, display, audio and USB peripherals over an existing IP network to an instance of Windows XP or Vista running on a virtualised server. Pano is power friendly, consuming only 3% of the energy consumed by a traditional desktop computer. For those organisations considering reducing their carbon footprint and driving a clear desk policy, this is the device of choice.
For the Enterprise user it is clear that in a virtual world, pano alongside Microsofts, Application & Server Virtualisation makes for a very strong solution offering. To deploy a Pano device, simply connect it to peripherals, network and power. There is no configuration to perform, no firmware to update, and no software to download. As soon as a Pano is connected to a network, a logon screen appears. Users enter their Windows credentials and are automatically connected to their virtual machines. From there on, it's the same Windows experience.

From a security point, the Pano is secure because it does not run an operating system or any other software. Because there is nothing in a Pano that can be infected by a virus or have malicious code installed, it doesn't need to be scanned for vulnerabilities or exploits.
Even when a peripheral such as a USB thumb drive is connected, Pano remains secure. Peripherals work only when the user is authorised via policies enforced by the Pano Management Server. If the user isn't authorised, Windows doesn't even see the peripheral that is connected to the Pano. If a user is authorised, the peripheral is connected directly to Windows. Pano enforces fine-grained access policies based on Active Directory user group membership, USB device class, and operation. As an example, a user may be authorised to read from a CD, but not write to it. This policy allows users to copy files or load software onto their virtual desktop, but prevents data from leaking out. Even when users are authorised, Pano can record USB operations so that the business can keep track of all its information assets. This is a great move for those organisations considering 'Rights Management'.
I believe this is one product worth watching
Saturday, 17 January 2009
Government Security - Miss Security Target
Only 27 percent of these systems are fully security accredited and are being operated within the ministry's "senior information risk owner (SIRO)'s risk appetite", according to Ainsworth, which balances security risk against operational reward. The other 31 percent have conditional or interim accreditation, "with constraints placed on the operation of the system to ensure that identified risks are adequately managed within SIRO's risk appetite". The guidelines in question were instituted after an MoD laptop, containing the details of 600,000 people, was stolen. They cover issues such as the ability of staff to put sensitive or personal information onto flash drives or laptops — which may be mislaid — and the need to encrypt information. Forty-two percent of systems are not accredited at all. "This represents the significant workload undertaken to plan and develop solutions for new equipment systems or platforms," wrote Ainsworth. "This also includes applications from legacy systems, many of which will be migrated onto the developing defence information infrastructure."
Ainsworth's breakdown covered systems whose accreditation is controlled centrally by Defence Security and Standards Assurance (DSSA). These number in the hundreds. In addition to systems connected to Ministry of Defence networks, the total includes systems not connected but which contain sensitive or personal data — those given a rating of "stand alone above Secret" or "contain significant value to the MoD".
Platforms and systems that are not security-checked by the DSSA are not included.
On the same day, Ainsworth also provided a written answer to a question from the Tory MP Patrick Mercer, who had asked how many mislaid desktop computers, laptops, hard drives and USB flash drives had been lost then recovered by the MoD and its agencies in each year since 2003.
According to Ainsworth, a total of 43 such devices were recovered in 2008 by the MoD (up from 11 in 2007). This figure includes one desktop PC, 26 laptops, five hard drives and 11 USB flash drives. The answer did not state whether 2008 saw a jump in recorded recoveries because of improved recovery processes, or because more data-bearing devices were lost that year.

Microsoft SideSight -"Look out Apple"

The SideSight technology is contained in yet another paper that company executives are presenting at the User Interface Software and Technology conference this week. (See Microsoft's take on new ways that cell phones could "talk" as well as guided tours of images.), The paper in question is titled "SideSight: Multi-"touch" Interaction Around Small Devices," and is authored by Alex Butler, Shahram Izadi, and Steve Hodges, all with Microsoft Research UK.
Touch was a revolutionary concept when it debuted with the iPhone, in part because it was implemented so well with gestures. Pinching, sliding and tapping the iPhone and iPod touch all directly impact the interface.
SideSight removes "touch" from the device and makes it a function of the paper, tabletop, or even the air that's next to the device. What does this mean? According to Microsoft, it opens up the possibility for "touch" functions to be built into tiny devices that don't actually need a touchscreen.
"Despite the flexibility of touchscreens, using such an input mode carries a number of tradeoffs," the paper's authors wrote. "For many mobile devices, e.g. wristwatches and music players, a touchscreen can be impractical because there simply isn't enough screen real estate. With a continued trend for ever-smaller devices, this problem is being exacerbated. Even when a touch-screen is practical, interacting fingers will occlude parts of the display, covering up valuable screen pixels and making it harder to see the results of an interface action."
So what can you actually do with SideSight? Quite a bit, as it turns out. By twisting one's hands appropriately on either side of the phone, objects could be rotated in place. Pages could be panned and scrolled by moving a hand up and down, and Microsoft also proved that text could be entered and edited on the main screen through a stylus while the other hand scrolled the page -- a movement that would be akin to the motions a user's hands would make if he or she were writing on a sheet of paper.
A quick motion toward the device could also be interpreted as a "click," according to Microsoft.
The key is a row of tiny optical sensors that look "outside" the device. In a prototype Microsoft built for the paper, the researchers took a HTC Touch mobile phone, and augmented it with two linear arrays of discrete infrared (IR) proximity sensors, specifically ten Avago HSDL-9100-021 940nm IR proximity sensors spaced 10 millimeters apart. Although only the sides of the phone were enhanced, the entire periphery of a device could include these sensors, the researchers said. The sensors can read inputs up to 10 centimeters away, just through reflected infrared light.
We were pleasantly surprised by the performance of the SideSight sensors in the typical office environments we tried given that we took no special precautions to reject ambient light," the paper's authors wrote. "We attribute this in part to the fact that the sensors are looking horizontally rather than vertically upwards towards overhead lighting."
Individual fingers are sensed as a "blob" by the sensor array. One problem: users tend to drift one or more fingers into the area covered by the sensor field, the authors noted. Because they were unable to consistent determine which fingers were actively controlling the device and which were simply incidental, Microsoft decided to only look for a single finger, and use that to control the phone.
(The authors noted as well that the sensors weren't directly connected to the phone. Instead, they were connected via USB to a PC, and then to the phone via Bluetooth. The convoluted interface reduced the effective sensing capability to 11 frames per second, a limitation of the test rig and not the circuits.)
What does the future of SideSight look like? Improved power consumption, improved sensor range, and an enhanced prototype: "In the future we believe that it may be possible to print or-ganic electronic versions of such sensors, and so we are also interested in exploring a SideSight configuration that has the entire casing covered in this type of proximity sensing material," the Microsoft Research employees wrote.
See the Microsoft Research paper:
http://research.microsoft.com/en-us/um/people/shodges/papers/sidesight_crv3.pdf
Malware on Unsecure Flash Drives - The IronKey Response Part I

IronKey have announced a comprehensive initiative to protect portable and mobile media from viruses, worms, trojans, botnets, crimeware and other malware threats. IronKey’s initial research was partially funded by the Department of Homeland Security’s (DHS) Science and Technology Directorate.
The IronKey Anti-Malware Initiative information can be found here.
Key points of the initiative include:- Always-on Milirary Grade hardware encryption.- Malware-protected software and firmware updates.- Secure manufacturing processes.- Secure provisioning and quality assurance processes.- Real-time anti-malware scanning.

Three Million Users hit by Windows Worm - Part 1

Although Microsoft released a patch, it has gone on to infect 3.5m machines. Experts warn this figure could be far higher and say users should have up-to-date anti-virus software and install Microsoft's MS08-067 patch.
Thursday, 15 January 2009
Cisco Security Data Leakage White Paper

In the hands of uninformed, careless, or disgruntled employees, every device that accesses the network or stores data is a potential risk to intellectual property or sensitive customer data. Magnifying this problem is a disconnect between the beliefs of IT professionals and the realities of the current security environment for countless businesses. The new findings show that "insider threats" have the potential to cause greater financial losses than attacks that originate outside the company.
• 33 percent of IT professionals were most concerned about data being lost or stolen through USB devices.
• 39 percent of IT professionals worldwide were more concerned about the threat from their own employees than the threat from outside hackers.
• 27 percent of IT professionals admitted that they did not know the trends of data loss incidents over the past few years.
Mitigating data leakage from insider threats is a difficult challenge. Businesses must take advantage of every opportunity to better understand how employee behavior and intent relates to security issues, and to make security a priority in every aspect of business operations
Could Computing on Steriods
Service Cloud will offer software bundles that will start at $995 (£680) per month and will include options to build online communities where customers can communicate with each other.
Introducing Service Cloud, Marc Benioff, chairman and chief executive of Salesforce.com, said: "This has been made possible through the emergence of native cloud-computing platforms like Force.com that are built to harness the power of other clouds like Facebook, Google, and Amazon.com."
According to Gartner analyst Michael Maoz, consumer demand will drive models such as Force.com. "[There is] consumer expectation that they can create answers and content as part of a community that will lead businesses and other organisations to adopt similar techniques to succeed."
These communities can be built by applications that gather information from websites such as Facebook, then feed that information into databases for use by a company's customer-service staff and partners. The communities build up and can then be used to improve relationships between companies and their customers.
Users of Salesforce software for these purposes include Dell and Starbucks.
Microsoft Seadragon

Microsoft Seadragon was profiled to a live audience of more than eleven thousand people in WPC Denver 2007. Every one present was blown away by the functionality of the platform and how the partner community could utilise the software in a solutions offering. In addition to this and keeping with the same theme, Blaise Aguera y Arcas demoed Photosynth along with Seadragon to show how the developer community could greatly enhance the end user experience and drive so much functionality into their web offering. You can see Blaise Aguera y Arcas live demo on Ted - http://www.ted.com/index.php/talks/blaise_aguera_y_arcas_demos_photosynth.html.
Microsoft Live Mesh - Cool Tool

Live Mesh, enables you to synchronize and access information and files across your different PCs and it also lets you remotely control your PC through your web browser if you’re away from it.
Future releases will be adding support for more devices including Windows Mobile phones and Macs amongst others.
Live Mesh takes the best elements of the desktop and integrating them with the Internet to create a really valuable solution to keeping and sharing information and files.
Wednesday, 14 January 2009
Windows 7 Beta

Another of Windows 7's Mac OS-like UI tweaks is the ability to float gadgets anywhere on the desktop — just drag them out from the Gadgets dialogue box
USB drive containing details of over 6,000 prisoners has been lost by Lancashire Primary Care Trust.
While the data on the USB stick was encrypted, the password to access the data was attached to the drive on a Post-it note, a spokesperson from NHS Central Lancashire told ZDNet UK on Monday.
The drive went missing at HMP Preston on 30 December, and contained the details of up to 6,360 prisoners. The stick went missing as it was being taken from one area of the prison to another — from the medical clinic to the administration department — to be backed up. The clinic used a legacy, standalone computer to work with information on prisoners, and this was backed up using the data stick.
"We don't believe [transferring data on a USB drive within the prison confines] had been recognised as a security risk — it hadn't been highlighted as a potential issue," said the spokesperson.
The NHS Central Lancashirewas already in the process of developing a way to securely transfer medical data from the prison's healthcare system to an NHS server via a network connection, the spokesperson added. Three prisons served by the NHS Central Lancashire are currently being connected to NHS servers.
The prisoner details lost at Preston included surnames, age range, prison number, cell location, prison-clinic appointment times and review dates, said a PCT statement. In some cases, there was reference to clinics attended, medical condition and treatment offered. Conditions specified included asthma, diabetes and mental health, as well as "a very small number of sexual-health references", according to a statement from the PCT on Friday.
NHS Central Lancashire apologised for the loss of the USB drive. "We are deeply sorry — this never should have happened," NHS Central Lancashire chief executive Joe Rafferty said in the statement. "We have launched a full and thorough investigation, and we are taking all necessary steps to ensure it cannot happen again."
Rafferty said that the lost data relates to patients who have accessed HMP Preston's health clinic since the year 2000. Lancashire PCT will contact people affected, and a helpline has been set up for anyone concerned about the loss, details of which appear on the statement.
NHS North West, the Department of Health, the Home Office, the Information Commissioner and the Healthcare Commission have all been informed of the loss of the data stick.
The staff involved have been suspended pending the conclusion of an investigation, said the Lancashire PCT spokesperson, who declined to say how many staff had been suspended.
In addition, all of the PCT's USB drives, which are encrypted, have been recalled. They will be re-issued on a named basis. "People that have a data stick will have to understand how to use it, and use it within policy," the spokesperson said
Sunday, 11 January 2009
Blogg Security
Here are some links to the various incidents:
http://blog.twitter.com/2009/01/monday-morning-madness.html
http://bits.blogs.nytimes.com/2009/01/05/twitter-hit-by-hacker-phishers/
http://www.readwriteweb.com/archives/twitter_security_collapses_oba.phphttp://www.eweek.com/c/a/Security/Twitter-Phishing-Scam-Takes-New-Turn-With-Promises-of-iPhone/