Tech and Computer

Tech and Computer news

 

 

Wed04032013

Last update06:42:42 PM GMT

Hacking

Cloud computing for administration

  • PDF
TechAndComputer (Feb. 11, 2011) — The emerging field of cloud computing is an interesting one, and not just for businesses. The field of public administration benefits from the technology as well. Fraunhofer Institutes are developing solutions to create such systems efficiently and to implement security concepts.

Researchers will be presenting these and other solutions on "Computing in the Cloud" at CeBIT in Hanover from March 1-5, 2011.

Cloud...

TechAndComputer (Feb. 11, 2011) — The emerging field of cloud computing is an interesting one, and not just for businesses. The field of public administration benefits from the technology as well. Fraunhofer Institutes are developing solutions to create such systems efficiently and to...

Hardware, software advances help protect operating systems from attack

  • PDF
TechAndComputer (Jan. 27, 2011) — The operating system (OS) is the backbone of your computer. If the OS is compromised, attackers can take over your computer -- or crash it. Now researchers at North Carolina State University have developed an efficient system that utilizes hardware and software to restore an OS if it is attacked.

At issue are security attacks in which an outside party successfully compromises one computer application (such as a...

TechAndComputer (Jan. 27, 2011) — The...

Unlikely there will ever be a pure 'cyber war,' study suggests

  • PDF
TechAndComputer (Jan. 23, 2011) — Heavy lobbying, lurid language and poor analysis are inhibiting government planning for cyber protection, according to a new report on Systemic Cyber Security published by the Organisation for Economic Cooperation and Development (OECD) on 17 January 2011.

The study by Dr Ian Brown of the Oxford Internet Institute (OII), University of Oxford, and Professor Peter Sommer of the London School of Economics also...

TechAndComputer (Jan. 23, 2011) — Heavy...

Thwarting attacks on cell phone mesh networks

  • PDF
TechAndComputer (Jan. 24, 2011) — A Mobile Ad hoc NETwork (MANET) or cell phone mesh network uses software to transparently hook together numerous active cell phones in a location to provide greater bandwidth and better network connections by allowing users to share "spare" resources while they use their phones, making data transfers faster and smoother.

However, the usefulness of such ad hoc networks can be offset by vulnerabilities. Like any...

TechAndComputer (Jan. 24, 2011) — A Mobile...

IPv6 guide provides path to secure deployment of next-generation Internet protocol

  • PDF
TechAndComputer (Jan. 11, 2011) — As the day draws nearer for the world to run out of the unique addresses that allow us to use the Internet -- now predicted to happen by the end of 2012 -- researchers at the National Institute of Standards and Technology (NIST) have issued a guide for managers, network engineers, transition teams and others to help them deploy the next generation Internet Protocol (IPv6) securely.

Guidelines for the Secure...

TechAndComputer (Jan. 11, 2011) — As the day...