The final version of the international Anti-counterfeiting Trade Agreement (ACTA) leaves the door open for countries to introduce the so-called three-strikes rule, which would see Internet users cut off if they download copyrighted material.
North Carolina State University engineers have created a material that can hold 1TB of data on a chip the size of a fingernail. The technology represents a 90% reduction in size compared to today's silicon-based chips.
Reflecting the growing need for automation tools in the enterprise, Quest Software has released a software package that could help Unix administrators better manage policy files that determine which users can access privileged material and programs on Unix and Linux systems.
An upcoming version of U.S. legislation designed to combat copyright infringement on the Web may include provisions that hold online services such as Twitter, Facebook and YouTube legally responsible for infringing material posted by users, according to one group opposed to the bill.
Nearly three-quarters of corporate security and IT professionals in the U.S. have found "inappropriate" pictures, videos or browser cache links on employee laptops, a survey released Wednesday shows.
A producer of pornographic video known as Max Hardcore has been sentenced to 46 months in prison after a conviction on multiple obscenity offenses, including charges he transported obscene material over the Internet.
A former student recently wrote to me with a request for suggestions on what to read in preparing for the CISSP exam. I decided to answer him by writing an essay that readers of this column who are thinking about the exam could also use. By the end of the essay, I had so much material I was forced to chop it up into smaller pieces to fit the constraints of this column, so here's part 1 of 4.
Most readers know from personal experience in school that plagiarism - the use of someone else’s words or ideas without attribution or without indicating that an exact copy the material is being quoted - is a definitely a Bad Thing.
My friend and colleague Dan Swanson (CIA, CMA, CISA, CISSP, CAP) runs a Yahoo group relating to IT and information assurance (IA) audit that readers may find useful. One can receive his postings either by receiving individual e-mail messages, by choosing daily digests, or by logging on to the group Web site to see the messages online. He posts a wealth of material of interest to auditors and IA specialists - especially educators.
What would you do if you saw sensitive or offensive material about your organization on the Web? Perhaps you would contact your corporate counsel and discuss methods for applying pressure to have the material removed; if necessary, your organization might even initiate legal proceedings for a tort under the laws of libel, protection of trade secrets, violation of copyright or misuse of trademarks.
White papers vary in quality; sometimes a vendor-written white paper can be commercial puffery devoid of substance, irritating to read, and counterproductive both for reader and sender. However, having written commercial white papers myself, I am often impressed with the work and care devoted to the subject matter in good white papers.
How to preserve content in a useful fashion is a problem that intrigues many in library and academic IT. If you are storing a copy of some presentation to the Board related to the decision to, say, open a medical school, how do you preserve that material for posterity?
The Wi-Fi security protocol WEP should not be relied on to protect sensitive material, according to three German security researchers who have discovered a faster way to crack it. They plan to demonstrate their findings at a security conference in Hamburg this weekend.
The Multi-State Information Sharing and Analysis Center (MS-ISAC) provides information from the 50 United States and the District of Columbia on a site hosted by the State of New York. There’s a great deal of material on the site that's useful for everyone interested in raising security awareness in the corporate world or in academia.
We need to build a tabbed interface framework for mastering CDs and DVDs containing HTML content. The content does not require server interaction but may contain video and/or animated presentation material. We have Java skills and a legacy Macromedia Director application we want to replace for delivering PC and Mac content on disk. What would you recommend?
A judge in the northern town of Bergamo, Italy, has ordered Italian ISPs to block access to the Swedish file-sharing Web site The Pirate Bay in a crackdown on the illegal sharing of copyright material over the Internet.
The video gaming industry must do more to protect minors from unsuitable material and cooperate better with national authorities in the European Union, the European Commission said Tuesday, after conducting a survey of measures taken at national level designed to shield children from violent, explicit and frightening video games.
A college reports that NAC is delivering a new type of cost avoidance that is helping to pay for its NAC deployment. By discovering and controlling peer-to-peer file sharing of music and video with its NAC gear, the school has also cut back on the number of subpoenas it gets from music industry groups upset about pirating copyright material. At a cost of $1,200 each just to respond, that is a savings that can add up.
Today I want to point to one of the outstanding sites for material that can serve as the basis for your next brown-bag lunch: the vast collection of research and educational lectures, documents and links available from the Center for Education and Research in Information Assurance and Security at Purdue University.
Pity the glass on the front of your smartphone. It typically gets subjected to a lot of abuse through its life and sometimes even shatters if the forces are too much. But glass manufacturers are continually pushing the boundaries of what's possible with the material, and some of the latest gadget glass is on show this week by Nippon Electric Glass at the Ceatec 2013 expo.
It's a challenge deciding what to write about each week in this newsletter - but not because it's hard to find material. Quite the opposite. Every time I turn around there's a new product launch, or a partnership, or a start-up with a new optimization angle. There's so much activity in the network optimization arena, choosing just a couple of items each week is tough.
Last week's newsletter pointing to Novell's "Bridging NetWare skills to Novell OES for Linux" training prompted reader Mike Ossing to drop me a note with his impressions of the course. Ossing had gone through it last fall when it was first announced. His impression was that Novell "...barely scratched the surface, and if I hadn't had the chance to previously play with the Novell [Linux] desktop and the SuSE 9.2 install, with my 'Dummies' book close at hand, I'd have been a little lost. Maybe a lot lost. I
A bill introduced this month in the Utah House of Representatives would give ISPs that block access to pornographic material a special designation and an official seal that they could display on their Web sites and use in their promotional materials.