ETC Blog, The Tech Resource
Iphone 4S drains battery like a vampire – Turns users into Zombies | TechEye
The design geniuses at Apple, who are yet to come up with an iPhone 4 which did not have some serious design flaws, are scratching their heads about the latest problem which has hit the cargo cults latest toy.Apple recently released the iPhone 4S which was an iPhone 4...
Google Moves to Secure Searches….and Also Starts Freezing Out the SEO Games…
I have a client that is constantly being pushed to engage is SEO games to try to raise his Google pagerank. Hopefully this is the first nail in the coffin of the hideous Google Ranks manipulators. On October 18, Google announced that it would begin pushing...
If You Have a Siri Enabled Phone It is NOT Able to be Locked….Yet
Whoopsie. Apple's new "Siri" feature, the voice-activated personal assistant built into the iPhone 4S, leaves owners' spanking new smartphones partially unguarded. Those of us who work in the security arena have often banged on about the importance of securing your...
A Gain for the Cloud and a Loss for a Former Client
Business consultants.....nough said. I have a client that has been scammed into going all cloud. This consultant believe in no servers, no central logins and no local storage of anything. I know this "practice management" company is totally based in the cloud....
External Editorial: 5 Reasons Why I Think The iPhone 4S Is The Least Competitive iPhone Yet
There's one thing he is leaving out. Andriod is not a closed, one vendor only operating system. IOS is apple and pp-le only. I’d like to start by stating I am not a rabid Android “fanboy.” In fact, I heavily considered the iPhone 3GS back in the day (er, last...
Massive Security Breach for HTC Smarthpones – This is Caused by HTC’s Customized Sense UI NOT a Problem With Android Itself
HTC screwed up big time here. If you are using the stock HTC Sense UI(and most folks are) they have enabled a backdoor into the phones base operating system that essentially allows any app with simple permissions to sniff everything on or about the phone and send it...
Vista and Windows 7 Won’t Be Allowed to Hang Around Like XP Did.
Microsoft is pushing Windows 8 and the new Metro UI extremely hard. If you want to see Metro look at a Windows phone 7 equipped phone. Anybody developing for Windows xp-Win7 you best take Microsoft serious...MS wants Metro to be the new standard and they aren't...
Addicted to IT: The Tale of an IT Lifer
Oh how I can identify with This entire article...here's the highly relevant part. So when I look out that window and see a robin perched on a tree gently swaying in a warm breeze, I begin to wonder just what life would be like if I wasn't in the IT game any...
The cloud hazard no one talks about | Data Center – InfoWorld
The upside of using a public cloud service is easy to understand. No need for expensive local storage, no need for local servers, a reduction in power and cooling expenses ... and a reduction in IT staffing. When all you need to do is click around on a self-service...
When Your Car Spys on You…Even When You Tell it Not to
Cars with OnStar’s built-in technology will begin having their where-abouts monitored in December, even if their owners opt-out of the service, according to a new privacy statement issued by the vehicle navigation and emergency notification service this week. via...
Black Hat: SSL and the Future of Authenticity | threatpost
Current ssl secured traffic relies on "third Party" trust. Frankly I think it is stupid. You are going to put your trust in security in a central location and tell others that that third party is better at your security than you are? NO thanks. Comodo is one of...
New “Attack” Leverages An Already Compromised System…
In order to execute their attack, Rizzo and Duong use BEAST Browser Exploit Against SSL/TLS against a victim who is on a network on which they have a man-in-the-middle position. So in order to "break" the AES component of SSL 3.0...
Windows 8 Developer Preview
This isn't even a beta so if it breaks..burps..acts up..etc etc this is not the completed product. The core is basically done which is why developers are getting this. ECC's testing of this begins immediately after I finish downloading the file. Watch this space...
Watch the Bouncing Server
Ecc's site(among others hosted here) has been spontaneously rebooting randomly over the past couple of days. The server is hosted by Swift Systems in Frederick and finally ECC and Swift personnel had to swap the drives into another identically configured server to...
ECC Platform Update
Vmware is really easy but it doesn't work with machines that do not have hardware assisted RAID. Most of my clients(including myself) don't have enough I/O demands tht a hardware accelerated card is required. This is when the beauties of Linux MD(NOT DM) RAID come...
ECC’s New Platform
While "clouds" on the internet are a terrible idea they do have their place INSIDE the building. I am currently building and researching exactly this type of internal cloud. In my shop I have two servers. At idle(which is where most of them spend their time) they...
Will the Cloud Continue to Survive?
Not if this trend by just about every internet provider type continues....at least not in the United States. Frankly given the rash of security problems and the fact this is old technology wrapped up into a new term it really needs to be scaled back anyway. Carriers...
Ballmer’s breaking point: Is Windows 8 already too late? • The Register
Listen to the podcast either at the linked article or download the mp3 here. Rumor has it that Windows 8 – the first version of Windows for ARM as well as x86 and billed as Microsoft's answer for the PC to iOS and the iPad – will actually ship early: next April....
Windows 8 will run on all Windows 7 PCs and Vista PCs too | ZDNet
The Microsoft Partner Conference is always a good source of information. This makes things intriguing for Win8. If it truly runs on vista class machines then it'll run on my 5 year old notebook(which currently run win7) just fine. Worried that you’ll have to...
Be Cautious About Running Open Wifi
Unless you have a good product like Astaro protecting your edge i would highly suggest NOT running open wifi. However with the proper precautions in place it is possible to mitigate the possibility of getting tangled up in this. Under the new voluntary...
Europeans: All Your Data is Belong To US!
That's just the LEGAL way to get at it. There's very little stopping the illegal ones as well. Thanks to the Patriot Act, US spooks no longer have to waste their time having to crack into European company servers to steal their secrets. They can show up in...
NOt Only is Google’s Cloud Insecure….So Are All The Rest
It is going to come to pass that the best place to have your data is back on your own systems where you control the security. The cloud with it's high level of centralization is going to mean your data is just waiting to be stolen. Matt Johansen, a researcher...
Incorrectly Configured P2P Software Used in Third Arizona Breach
p2p software is a great thing but highly dangerous when not properly configured. By default p2p software shares files..sometimes everything on your hard drive depending on the program used. A good gateway firewall is your best bet if you don't have airtight file...
This is Why You Don’t Clean Infected Machines – A Lesson For Windows Admins
You can waste time creating a new MBR then trying to clean ALL the infected files from not just the rootkit but it's buddies as well. Save your clients time and money and their security. Backup/format/reload. An antivirus of its own Just like Sinowal, TDL-4 is a...
Alueron Rootkit Still Going Strong
I am seeing more and more infections on client computers using this rootkit. The common vector i see if either flash or IE ActiveX exploits. It is nearly time to just block flash at the firewall as well as ActiveX. 'Indestructible' rootkit enslaves 4.5m PCs...