Warning – BadUSB

bad usbI haven’t come across it yet but there’s a worrying development regarding USB devices that we all need to be aware of. It’s called BadUSB and the long and short of it is that if infected with this Trojan, USB devices can be used to hack or damage systems they are connected to. It’s described in more detail on the BBC website at http://www.bbc.co.uk/news/technology-29475566.

So what do we do? Well as you know the use of USB sticks is banned for students across the LEA but we all know we can’t really stop it. I’ll be bringing it up at the next steering group meeting and will be writing to you. In the meantime, take a moment to read the post.

Data Centres

Data centres are what will be the heart of search engines and big digital storage companies, they are composed of mass storage devices, servers and telecoms devices, to ensure that there able to keep the computers operating all of the time they have protective measures in location such as backup batteries for electricity and uninterruptible power supplies
Pollution is a chief factor for data centres, due to the quantity they create they are required by law to use special equipment, but they occasionally use as much electricity as a small town because they use so much equipment.

Data centres have a set of minimum requirements in regards to what their infrastructure is, they’ve been provided a topology which can be pertinent to any dimension data centre, there are also guidelines for data centres that are part of the telecommunications networks, such as environmental requirements for the equipment that they use.

There are definite rules as to what data centres can use their servers for, these are:

Run and manage a telephone company’s telecommunication network
Supply data centre established applications straight to the provider ‘s clients 
Provide hosted systems for a third party to offer services for their clients
Provide a blend of those and associated data centre systems

In case a data centres systems are out of date they may use what is referred to as a transformation initiative to upgrade and better their present systems, the initiative is split into four endeavours called; safety, standardisation, virtualisation and automation.
Data Centre
Data centres must keep themselves at the leading edge of technologies. They achieve this by getting all of the latest devices offering better performance and storage space. Additionally they look to improve networking abilities in the hope the amount of data centres could be managed better, and finally decrease (because there are lots of them around)

Virtualisation is where devices that are used in the data centre are united for example one device could run multiple virtual servers, this equates to less space being utilised, less operational expenses and it reduces energy usage, virtualisation additionally allows for data centres to supply virtual desktops to consumers.

Because of the fact that many data centres have problems with a deficiency of skilled IT staff, automation makes working the data centre more efficient, operations such as settings, patching, provisioning and release management are automated, automating operations may also reduce the expenses the data centre has to face.

Securing a data centre is reached both physically by implementing armed guards and utilising CCTV cameras, it can also be preserved by security of the personal computers, this is of equal, or even greater relevance for a data centre.

Here is table of each grade:

Downtime is as stringent as the rest of running a data centre. For each tier, there is a distinct allocation of time available for let downtime yearly, these are the following:

➢ No longer than 26 minutes is to be delayed for tier 4 – 99.995%
➢ No longer than 94 minutes is allowed for tier 3 – 99.982%
➢ No more than 22 and a half hours for tier 2 – 99.741%
➢ No more than 28.8 hours is allowed for a tier 1 failure – 99.671%

Data Security: McAfee vs Android Apps

Android logo John McAfee has apparently decided on his next project, an Android app security interrogator called “Cognizant”.

The Android app is a safety tool of types, inasmuch as it apparently conducts a census of all of the apps in your Android device and reports about what they have been permitted to do on it.

McAfee believes this functionality is an excellent idea because many apps ask for authorization to command just about all of a Android device’s functions, like the capability to study place data, make calls and shoot pictures. McAfee’s logic supposedly runs, if consumers know about this behavior, they’re going to either delete piquing apps or think twice before installing them.

Cognizant will seemingly appear on March 1st, with McAfee taking part in a web-based chat on February 14th to provide more depth on his new enterprise.

Computer Misuse At Work

In the UK, the Computer Misuse Act is a law that makes certain activities prohibited, including hacking into other people’s computers, installing malware, or helping a person to access protected files of somebody else’s computer. The act is made after the 1984-1985 R v. Gold case,  in 1988. The appeal was productive, inspiring parliament to build a law that will make punishable the conduct committed by Robert Schifreen and Stephen Gold. It obviously wasn’t able to be implemented retroactively, but it is aim was going to deter behaviour like theirs in the near future. In the UK, I recommend you all to the Computer Science Labs website, their specialist page on computer misuse is here.

What happened to prompt true and ultimately lead to the law was the following: Gold observed an employee of Prestel at a trade-show input his user name and password into a pc. Gold and Schifreen subsequently used this information from a home computer to get into the machine of British Telecom Prestel, and specially to enter the personal message box of Prince Philip. Prestel became aware of the access, trapped them both males, and charged them using fraud and forgery. The men were convicted and fined, yet they appealed their situation.

Some of the crucial aspects of the allure was that the two men weren’t using the data in anyway for personal or illegal gain. Since no materials obtain was associated with spying on someone else’s setup, they claimed that the charges below the special laws can’t apply to them. The Home of Lords acquitted the males, but became determined to forbid such behavior in future. This resulted in the Pc Misuse Act be-ing developed and handed into legislation in 1990, a couple of years after the effective charm.

The action is divide into three sections and makes these acts prohibited:

–Unauthorized access to computer material

–Unauthorized access to computer systems with purpose to commit another offence

Individuals also cannot change, copy, delete, or move a software. The Pc Misuse Act also outlaws any efforts to get someone else’s password. Obviously, if someone gives another man his identification and he can legally utilize the computer, these laws under entry don’t apply.

The next provision within the law is gaining access to your computer system as a way to commit or facilitate a crime. Someone can’t use somebody else’s program to deliver material that might be offensive or possibly to begin worms or viruses. He additionally can’t give someone his identification so that he is able to make use of a system for this intent. This second part ensures the individual will be easing someone else’s aim or offence.

Again, if someone puts a virus into some one else’s setup, he’d be violating the act. Generally, perpetrating unauthorized access simply is thought a crime punishable by great. Access with purpose and unauthorized modification are considered more acute and could be punished by significant fines and/or prison sentence.

Data Security and Privacy

Following on from my mention of the dom-i-nate web site I’ve found another new one that looks like it may have interesting comment and analysis on all matters data security and privacy related. Its http://raid-data-recovery50.webnode.com/, and although there’s only been 1 post so far, it’s about CCTV and DVR video technology and suveillance. It’s suggesting that in this day and age it’s more and more difficult to do anything in a public place without it being recorded (and monitored?) somewhere. Infact we all know that what we type and send across the internet gets intercepted and trawled for various keywords and phrases that might suggest a terror plot of some sort. Just by typing in words like assassinate and bomb increase the possibilities of a post like this being red flagged and interrogated further… So hello to everyone at the NSA and GCHQ who may be reading this.


Data PrivacyHere’s an up to date web site that takes a look at the erosion of personal privacy:


With all the fall out from the Edward Snowden affair it seems that our personal data is far from personal. Infact, I’d be willing to bet that the internet airwaves are being monitored for appearances of the name “Edward Snowden” by security forces around the world…. So if you’re a security service employee and you’re reading this now – Hello There !

In today’s world of e-crime I suggest that we no longer know who the bad guys are. Be careful what you put out on the net… And as for cloud based services, why would you ever use them?

Here’s an interesting article from the same site discussing what Snowden did and his motives for doing them:


CCTV Surveillance Systems – How Do They Work ?

A DVR is really a recording apparatus for digital images which originate from digital cameras. These pictures are saved on a hdd within the DVR. You may review the DVR using your browser from throughout the planet.

The security DVR is more advanced and dependable than these for the telly. The most recent video-surveillance DVR is really a component, meaning that the essential software is really a lready installed within the DVR. Also by utilising a hdd you’ll be able to return and review a record without needing to re wind. These recorders will enable you to really freeze a framework, fast-forward or reverse with no loss of monitoring or streaking.

Having the ability to remotely view your workplace or house on the web is really one of the largest benefits of video-surveillance. Using the computer controlled applications or perhaps a poor DVR you’re prone to hacking or viruses. When creating your video security setup, you should pick a top quality standalone DVR.

There are lots of advantages of the DVR Security system. You have the ability to manage cameras remotely and motion can be detected by the DVR to change cameras on and off, hence conserving energy and space. The movie info is “stamped” meaning the recoding has time plus date of every body. Lastly the security DVR is merely that, more protected because all of the software is loaded within the DVR and doesn’t depend in the computers operating-system.

Prior technologies to get a video security system utilized a time-lapse VCR. The drawbacks were small recording time (generally no more than 8 hours) and also the inconvenience of rewinding tapes. Another variable was the exposure of the tape itself, either becoming jammed or deteriorating. Advice including time stamping was generally not accessible, and also the fidelity of the movie was inferior. The top quality video from the standalone DVR may help the authorities know who to search for.

Motion can be detected by a DVR by studying the movies pixels. Because of how the DVR display is separated into cells, the camera won’t see because not only do the pixels must change things which are generally in movement like a lover, but adjoining cells should additionally possess a change in pixels. The camera doesn’t have anything related to motion since this is achieved by the DVR sensing.

The parts of the DVR Security System would be the camera or cameras, standalone digital video recorder and screen or pc with network capacity. Cameras are linked to the standalone DVR with both cables or wirelessly utilizing a transmitter in the camera plus a receiver to feed the DVR. This enables you to really use one screen to determine up to four cameras simultaneously. The security DVR could be bypassed with a device called an USB DVR that’s an extremely efficient device which connects the camera into a network capable pc. This really is helpful for tracking an area for vandalism or injury using a low cost program. The USB DVR enables you to really see your home in real time online from throughout the planet.

Modern technology has really developed a little onechannel DVR capable of being put in of the hidden camera. This little DVR records video on the storage device. If that DVR is capable of movement detection than it might cover a considerably longer period of time. The user just goes and takes the card from the concealed camera and reads the movie on the pc.

DVR and a board camera could be put in a common item like a radio, clock or mirror. That is particularly helpful to capture internal theft in a little company or for a cam possibly to use the concealed camera.

To summarize, a standalone DVR is helpful for managing several cameras, getting top quality pictures using a time stamp, and saving this info for later use in prosecution and recognition. The DVR provides an additional layer of protection by removing applications based programs which are prone to being hacked or getting a virus. A top quality DVR will enable remote managing and movement detection of the PTZ camera.

Learn More: http://www.recover-deleted-data.co.uk