Until the Tails privacy tool is patched, here's how to stay safe

Vulnerabilities in the Tails operating system could reveal your IP address, but you can avoid trouble by taking a couple of precautions.Tails, a portable operating system that employs a host of privacy-focused components, plans to patch flaws contained in I2P, a networking tool developed by the Invisible Internet Project that provides greater anonymity when browsing. It’s similar in concept to Tor.On Saturday, I2P developers released several fixes for XSS (cross-site scripting) and remote execution flaws found by Exodus Intelligence, a vulnerability broker that irked some by announcing first on Twitter it knew of flaws but didn’t immediately inform Tails.To read this article in full or to leave a comment, please click here

Posted by on 27 July 2014 | 8:35 pm

Facebook posts can land Americans on watchlists

As we’ve seen in the past, there’s nothing reasonable about supposedly suspicious activities as numerous you-might-be-a-terrorist-if lists are often filled with harmless behaviors. You know there are “hot” keywords monitored by government agencies and that anything you might say on social media could come back and bite you at a later date; those facts were again highlighted in the 166-page document issued by the National Counterterrorism Center to give “watchlisting guidance.”To read this article in full or to leave a comment, please click here

Posted by on 27 July 2014 | 2:08 pm

"The finest computers money can buy"

Get ready for another throwback TV series: WGN America next month debuts "Manhattan", the story of the atomic bomb project during World World II. In this scene from the show, which launches on Sunday, July 27, we're introduced to the whiz-bang computers of the day... RELATED: New movie "The Imitation Game" puts spotlight on Alan Turing and the Enigma code during World War IITo read this article in full or to leave a comment, please click here

Posted by on 26 July 2014 | 8:00 am

WeatherFlow Wind Meter, low cost, accurate wind speed measurement

There are many situations in which it’s necessary to have a good idea of how the wind is behaving. For example, if you’re going sailing you’ll probably want to verify the forecast and, rather more importantly, if you’re a firefighter dealing with wildfires, you’ll definitely want to know whether the wind is working for or against you; from Introduction to Wildland Fire Behavior: Wind is the most critical weather element affecting wildland fire behavior, the most difficult to predict, and the most variable in both time and location. / This variability (especially in rough terrain) can pose safety and fire control problems, which can result in firefighter fatalities. Wind direction and wind speed must be constantly monitored by all firefighters.To read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 8:20 pm

LTE network for US public safety taking it one step at a time

The organizers of the FirstNet LTE public safety network have the frequencies and standards they need to build the system, and they know where the money’s coming from. They know how to get there from here, but it won’t be a quick trip.FirstNet will realize a vision that emerged in the wake of the 9/11 terror attacks, using technology that didn’t exist until years later. It will be a single network linking all federal, state and local public-safety agencies in the U.S., based on the same radio spectrum and technology throughout. Though it won’t replace every public-safety radio system in use today, FirstNet will help to eliminate the crazy quilt of incompatible radio systems and frequencies that makes it hard for different teams to coordinate their efforts.To read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 6:35 pm

How to effectively manage the integration of IT/OT in the hyper-connected enterprise

There has been a lot of discussion lately about the Internet of Things (IoT) and how connected endpoints can help revolutionize the way businesses collect and process information from Operational Technology (OT) systems, but there are huge challenges in accessing the information and making it accessible to your other business systems, employees and business partners.While IoT is a fairly new term, businesses have been deploying systems and devices that collect information and manage processes since the early days of microprocessors and networks. These devices record everything from temperature, location, motion, status and much more. The problem with these legacy systems is they almost always send their information in a proprietary format that must be learned and re-learned for every application developer in order to use the information effectively.To read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 4:05 pm

What you should know about SDN and Wi-Fi

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Software-Defined Networking (SDN) is coming to Wi-Fi to give IT end-to-end control of the unified (wired and wireless) network. SDN will deliver numerous additional benefits, ranging from cost saving to increased productivity. Here are three of the most important things you should know about SDN-enabled Wi-Fi:1: Key benefits. One of the immediate advantages of SDN is it simplifies networks. Consolidating around a central control structure allows for greater automation. This makes rolling out new services faster. Another benefit of SDN is simpler provisioning over multi-vendor networks.To read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 3:32 pm

Phone unlocking bill clears US House, next step is president's signature

A bill that allows consumers to unlock their cellphones for use on other carriers passed its last hurdle in Congress on Friday, opening the way for it to become law once it is signed by President Barack Obama.Senate Bill 517 overturns a January 2013 decision by the Library of Congress that ruled the unlocking of phones by consumers fell afoul of the Digital Millennium Copyright Act (DMCA). It had previously been permitted under an exception to the anti-circumvention provisions of the DMCA, which are generally aimed at cracking of digital rights management technology.Cellphones and smartphones are typically supplied to consumers with a software lock that restricts their use to a single wireless carrier. Removing that lock—the process of “unlocking” the phone—means it can be used on the networks of competing carriers. In the U.S., this is most often done with handsets that work on the AT&T or T-Mobile networks, which share a common technology, but is also popular with consumers who want to take their phones overseas and use foreign networks rather than roaming services.To read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 3:00 pm

The hidden dangers of “good enough” authentication

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. While it’s human nature to make comparisons, not all comparisons are helpful or accurate. When comparing a Porsche and a Volkswagen, for example, the most you can say is that they are both vehicles. They have wheels and doors and engines, and will get you from Point A to Point B, but that is where the comparison ends.In a similar vein, not all multi-factor authentication approaches are the same. The variances can mean the difference between true security and susceptibility to phishing, between timeliness and late arrival of authentication codes, and between user-friendly and hard-to-use applications.To read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 2:54 pm

Oracle's new in-memory database option could spark unanticipated costs, expert warns

Oracle database shops that have or are planning to download the latest version of 12c take warning: The vendor’s newly launched, much-hyped in-memory processing database option is turned on by default, according to one expert.The in-memory option costs US$23,000 per processor, according to an Oracle price list updated this week. Customers who don’t realize the option has been switched on may find their next license audit “um, more entertaining,” wrote Kevin Closson, a senior director in EMC’s performance engineering group and a former Oracle architect who worked on its Exadata database machine, in a post on his personal blog this week.To read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 2:40 pm

Are you a digital business bozo? Nine red flags that will drive customers away

Building a small business is hard enough, but it is all the harder today because you have to hit the ground running with an online presence that works. Given that most businesses aren't tech-oriented and have hardly any digital literacy, they're in danger of being out-marketed by the few businesses that do have a digital clue. If you're in the former category you are; forgive me; a digital business bozo and, unless you get clued in really fast, you could pay the ultimate business price: Going broke. Here are 9 red flags that say "Digital business bozo ahead, spend your money elsewhere."To read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 1:49 pm

SEC drops probe into Facebook's pre-IPO sales disclosures

The U.S. Securities and Exchange Commission has dropped its investigation into disclosures about Facebook advertising sales before the company went public in 2012.Facebook said Thursday in an SEC filing that it was notified by the agency in May that the inquiry had been terminated and no enforcement action was recommended.The SEC launched its investigation over claims that Facebook shared lowered advertising-sales projections immediately before its initial public offering with some analysts, who then shared that information with a select group of investors without disclosing it to the wider public.To read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 1:30 pm

House passes cellphone unlocking bill that now only needs Obama's signature

The U.S. House of Representatives has just passed a bill that will once again give consumers the right to unlock their cellphones, meaning the legislation is only a presidential signature away from becoming law.Sina Khanifar, whose petitioning of the White House got the ball rolling on this almost two years, says via an email: Screen shot of White House petitionTo read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 1:05 pm

NASA looking for out-of-this-world Mars communications services

NASA is exploring its communications options with Mars. NASA Artist concept of future Mars outpost The space agency this week issued a Request For Information that looks to explore options where it would buy commercial communications services to support users at Mars, including landers and rovers and, potentially, aerobots and orbiters.To read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 1:05 pm

How to make intelligent flash storage investment decisions

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Flash storage, often called solid state drives (SSDs), is a promising technology that will be deployed in nearly every data center over the next decade. The primary downside is the price, which, despite vendor claims, is 3X-10X the price of spinning media (HDDs). Here are two ways storage architects can go about analyzing their current and future requirements to understand which workloads will benefit from flash storage.One of the best ways to understand your deployment requirements is to have an accurate model that represents your current storage I/O profiles. This model can be used to test new architectures, products and approaches. The goal is to enable the development of a realistic-enough workload model to enable comparisons of different technologies, devices, configurations and even software/firmware versions that would be deployed in your infrastructure.To read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 12:26 pm

13 pieces of advice for Yosemite beta testers

For the first time since the OS X beta test of 2000, Apple is allowing Mac users to test and provide feedback on a prerelease version of OS X. The first 1 million people to sign up for the beta program through Apple's Web page -- which crashed under heavy traffic on Thursday after the public beta became available -- get a redemption code to download the Yosemite beta via the Mac App Store.To read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 12:26 pm

Microsoft wants you to forget Windows 8

As talk of the next Windows begins to build and some details of what most are calling for now either Windows 9 or Threshold come into focus, it's worthwhile to take a moment to remember Windows 8.Because Microsoft will want everyone to forget it. And we will.Unless the Redmond, Wash. technology company radically changes its habits, it will throw Windows 8 down a memory hole even before the successor ships. Just like it made Vista persona non grata in its official messaging in 2009, it will shove Windows 8 so far into the background that we'll need the Hubble telescope to find it.Not that that's unusual. All companies fake amnesia to a stunning degree, even when what they want to forget -- more importantly, what they want customers to forget -- was once trumpeted with Joshua's band. Ford tossed the Edsel into the don't-mention file, Coca-Cola did the same with New Coke, Apple erased the Performa and Ping from its corporate memory, and IBM would be hard pressed to admit it ever knew the PCjr or OS/2.To read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 12:22 pm

Educator’s plagiarism only part of the story

The school superintendent in Newton, Mass. will lose a week’s pay because he lifted five sentences from a speech by the state’s governor and integrated them unattributed and nearly word for word into a graduation speech.But the plagiarism by Superintendent David Fleishman, while inexcusable, wasn’t the most interesting part of the story. Neither was the punishment decided upon the school committee, which seems light. School Superintendent David FleishmanTo read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 11:11 am

Russian government offers money for identifying Tor users

The Russian Ministry of Interior is willing to pay 3.9 million roubles, or around US$111,000, for a method to identify users on the Tor network.The Tor software anonymizes Internet traffic by encrypting it and passing it through several random relays in order to prevent potential network eavesdroppers from identifying the traffic’s source and destination. The software was originally developed as a project of the U.S. Naval Research Laboratory, but is now being maintained by a nonprofit organization called The Tor Project.The Tor network is popular with journalists, political activists and privacy-conscious users in general, but has also been used by pedophiles and other criminals to hide their tracks from law enforcement.To read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 10:30 am

11 signs you've been hacked -- and how to fight back

In today's threatscape, antivirus software provides little piece of mind, and antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. Despite modern heuristics, virtualized environments, system monitoring, and network traffic detection, hackers still reach us on a regular basis. To read this article in full or to leave a comment, please click here(Insider Story)

Posted by on 25 July 2014 | 10:19 am

Celebrating SysAdmin Day on Instagram

The world celebrates the 15th Annual SysAdmin Day on a social network that wasn't around at the start of this last Friday of July event. To read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 10:03 am

EU, Google, Microsoft, Yahoo meet on 'right to be forgotten' but questions remain

European data protection authorities still have questions after meeting with Google, Microsoft and Yahoo about the implementation of a recent ruling that gave European citizens the right to be forgotten by search engines.The search engine providers have until the end of the month to answer additional questions in writing.Google, Microsoft and Yahoo met with EU data protection authorities who are members of the EU’s Article 29 Working Party (A29WP) in Brussels on Thursday to discuss the May ruling by the Court of Justice of the European Union (CJEU). The ruling gave people the right to compel search engines to remove search results in Europe for queries that include a person’s name, if the results shown are “inadequate, irrelevant or no longer relevant, or excessive.”To read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 9:05 am

10 cool makerspaces to explore now

Ready, set, DIY! Makerspaces have recently exploded in popularity as artisans, techies and the just plain curious seek out communal access to materials and tools they're unlikely to have at home -- anything from a laser cutter to an industrial sewing machine.Makerspaces are the product of several social and tech movements -- including STEAM (science, technology, engineering, arts and math) education, skunk works, new media art and a resurgent interest in handcrafts.Read on for our take on some of the U.S.'s coolest makerspaces. If your locale didn't make our list, check out Makerspace.com's worldwide directory. Then pick your media and start creating.To read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 8:30 am

The Internet's not broken...It's SysAdmin Day!

I'm not entirely sure I want to encourage this sort of YouTube behavior, but in honor of the 15th annual SysAdmin Day, here's the new karaoke version of Spiceworks' SysAdmin Day Song for you to sing along with. (I'm kind of surprised Weird Al Yankovic hasn't hit this subject yet...) RELATED: Here's one way to make sure you're appreciated on SysAdmin DayTo read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 8:22 am

Netgear Nighthawk X6 Wi-Fi router review: The best router for a crowded house

Is it ever the perfect time to buy a new product? I'd say no, because there's never a perfect time to review a new product, either. There's always something right around the corner that promises to be faster, better, cheaper. But you won't know if those claims are true until someone tests them. Case in point: I spent the first half of this week benchmarking Netgear's Nighthawk X6 Wi-Fi router (aka the Netgear R8000), so that I could publish this review today. Benchmarking takes time, as does analysis and writing. Asus decided to ship its all-new RT-AC87U Wi-Fi router on Wednesday, and my eval unit showed up today. Is it better, faster, cheaper than the Nighthawk X6? Right now, all I know is that it costs $20 less than Netgear's router despite its status as the first "Wave 2" 802.11ac router (that means it supports multi-user MIMO, which you can read all about in this story). To read this article in full or to leave a comment, please click here

Posted by on 25 July 2014 | 8:15 am