Keeping PCs Safe on the Internet

PC Security Journal

Subscribe to PC Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get PC Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

Cloud Computing on Ulitzer With just a few clicks you, too, can create a cloud computing environment. But if you’re like a lot of organizations, you may not know what to do with it after that. The latest version of Ubuntu Server (9.10) includes the Ubuntu Enterprise Cloud (UEC), which is actually powered by Eucalyptus. The ability to deploy a “cloud” on any server running Ubuntu is really quite amazing, especially given the compatibility of Eucalyptus with Amazon and the plethora of application images available for nearly immediate deployment. It supports both a public and private option, and a hybrid model, and comes replete with management tools designed to make building, deploying, and managing your own personal, private cloud a breeze. Private clouds offer immediacy and elasticity in your own IT infrastructure. Using Ubuntu Enterprise Cloud, you can experience ... (more)

A Cloudy Future for Networks and Data Centers in 2010

Hosting Pavillion at Cloud Expo The message from the VC community is clear – “don’t waste our seed money on network and server equipment.” The message from the US Government CIO was clear – the US Government will consolidate data centers and start moving towards cloud computing. The message from the software and hardware vendors is clear – there is an enormous investment in cloud computing technologies and services. If nothing else, the economic woes of the past two years have taught us we need to be a lot smarter on how we allocate limited CAPEX and OPEX budgets. Whether we choose to implement our IT architecture in a public cloud, enterprise cloud, or not at all – we still must consider the alternatives. Those alternatives must include careful consideration of cloud computing. Cloud 101 teaches us that virtualization efficiently uses compute and storage resources i... (more)

The Corollary to Hoff's Law

“Security” concerns continue to top every cloud computing related survey. This could be because, well, CIOs and organizations in general are concerned about security. It could be because the broader question of control over the infrastructure – including security – is never proffered as a reason for reluctance to jump into the fray known as cloud computing. Forty-nine percent of survey respondents from enterprises and 51 percent from small and medium-size businesses cited security and privacy concerns as their top reason for not using cloud computing. – Survey: Security Concerns Hinder Cloud Computing Adoption, NetCentric Security, December 2009 In a survey of 312 IT professionals, Unisys found that just over half of them cited security and data privacy as the key concerns around cloud computing. – Security Key Concern in Cloud Computing, Unisys Survey Finds According ... (more)

Code from the Cloud: Are You Getting More Than You Bargained For?

It was at my very first job as a developer that I learned about code reviews (and that I intuitively hated them, a characteristic I share with many developers I've then since learned). We wrote and maintained software that automated tax preparation (yes, you may in fact be using services that contain code I touched long ago - caveat emptor ;-)) and going over code was an important part of the process. In addition to making sure we were following coding standards with respect to source formatting there was also the opportunity for improvements and to find potential mistakes that might be disastrous given the nature of the software we developed. Fast forward a number of years (right, like I was going to tell you how many) and code reviews are still a part of the development process. The thing is that the reasons for reviewing source code have expanded, primarily thanks... (more)

Comodo Adds Revolutionary SafeDelete to Comodo System-Cleaner

Purging a pc of old, unwanted files is an essential but nerve-wracking part of computer maintenance. When cleaning a computer system some files are hard to identify. A miscellaneous-looking file that appears superfluous may actually be supporting necessary operations. Comodo's new system cleaner enables computer users to store a back-up copy of their computer system just in case they make a mistake. Comodo System-Cleaner is the world's first file and registry cleaner to harness the power of 100% safe cleaning. It utilizes the revolutionary innovation of SafeDelete™, a feature that allows users to safely recover any files deleted in error. This advancement eliminates risk from the process of PC cleaning. Because the system cleaner is entirely risk-free, it can clean deeper, more thoroughly, and more completely than any other cleaner available. "PC users are afraid ... (more)

No Charge for One-Click Backup Encryption with Comodo BackUp

Jersey City, NJ, September 22, 2009 - Windows Server 2008-compatible Comodo Backup protects network files with scheduled backups, at no charge. Comodo Backup 2.0 provides convenient one–click backup of email accounts, Windows registries and system partitions. Comodo Backup allows administrators to schedule backups to fit work timetables, create customized backup routines with a range of filters and macros, and configure the backup protocol with Comodo’s intuitive interface in minutes. Backups can be scheduled daily, weekly or synchronously. In its synchronization mode, Comodo Backup will conduct rolling backups a pre-specified intervals, ensuring that files are always current. Comodo Backup logs all backup information, and sends information to team members about the status of backup jobs. Once backed-up the files can be password-protected and encrypted using multipl... (more)

Show Report: Reality Check at 4th Cloud Expo

Cloud Computing Expo on Ulitzer The talk at the 4th Cloud Expo this week in Santa Clara was all about enterprise cloud adoption. Is it real? Is it already happening? If so, who’s doing it, which applications are they running and which clouds are being tested? To a large extent, cloud computing is a victim of its own somewhat out-of-control hype cycle. Since so much has been written and discussed about the cloud in 2009, there is now a growing impatience for actual results. The fact that 2000 people showed up at the Cloud Expo in Santa Clara this week (double the number from last year’s show) suggests that at the very least, interest in enterprise cloud computing remains very real, and the need for practical solutions and use cases is growing more urgent. There was a growing concensus about a number of issues: 1. The hybrid model of on-prem data centers combined wit... (more)

Comodo Backup Exports Commands to Executable Script Files

Free Comodo Backup 2.2 Exports to Script Files Jersey City, NJ, January 20, 2010 - Not only do network administrators need to back up the information on their systems regularly, they also need to test the backed-up information. A scrupulous administrator may diligently and regularly preserve a valuable database. Yet, after a disaster, the administrator may learn with chagrin that a crucial file such as the part number table has been overlooked, and that has not been backed up since before the annual inventory. Comodo Backup offers new features to make network backups easier and more precise than ever. Users can automate their backup procedures by saving their commands into executable script files. Moreover, after testing, network administrators must be sure that they can repeat the steps that collected and saved the successful backup. Inexpensive backup software pac... (more)

Blog Summary for Week of February 6

1. Working With Microsoft Security Tools Security as one of the most important concerns of an IT department. This post covers four popular Microsoft security products: Forefront Family, Microsoft Security Essentials,Windows Intune / Windows Update / Microsoft System Center Family, and Windows Firewall (with Advanced Security). Each of these products is thoroughly described and compared with competitors. Also discussed are two less popular products, Microsoft Security Compliance Manager and Microsoft Security Assessment Tool. 2. Network Bandwidth Monitoring Made Easy This article shows how to monitor one of the most important sets of metrics: network bandwidth or throughput. First it covers performance counters used for this custom monitor and the information each metric provides, such as BytesReceivedPerSec, BytesSentPerSec, etc. Sample code is provided that collects... (more)

Bromium, The New Malware Cure

Please, God, let this work - even if it's not completely impenetrable, it sounds better than what we've got as we know from the Chinese. "It" is widgetry called vSentry from a UK start-up called Bromium that promises to put an end to malware - at least in the enterprise. Bromium is too young to deal with consumers yet. It will work initially on (presumably clean) 64-bit Windows 7 PCs using Internet Explorer 8 and 9. Later it will be moved to Intel-based Macs and other browsers. Presumably Bromium will prioritize ARM devices somehow and Windows 8 boxes will likely be supported when the enterprise actually starts deploying them. What is does is use a lightweight second-generation species of virtualization the Bromium boys call a Microvisor to create a disposable virtual machine around every task you do on a PC - click on a URL, open a document or e-mail attachment, ... (more)

What Customers expect in a new generation APM (2.0) solution

In the last blog, I discussed the challenges with an APM 1.0 solution.    As an application owner or application support personnel, you want to Exceed service levels and avoid costly, reputation-damaging application failures through improved visibility into the end-user experienceEnsure reliable, high-performing applications by detecting problems faster and prioritizing issues based on service levels and impacted usersImprove time to market with new applications, features, and technologies, such as virtualization, acceleration, and cloud-based services   The APM 2.0 products enable you manage application performance leading with real user activity monitoring. Following are some of the top functionalities they provide that help you achieve your business objectives. Visibility to real users and end-user driven diagnostics APM 2.0 solutions provide visibility to end-to-... (more)