.=

10/22/2010

Home Security Monitoring


The control of security at home does not mean that surveillance 24 hours home to ensure that your home is protected from thieves. At least that does not mean that in a literal sense, but not the security check at home gives you and your family 24 hours a day protection against thieves and, in some cases even a fire. The level of protection you receive depends on the complexity of your home security system and the ability of the deposit that you have chosen. Something in national security oversight, which is relatively the same no matter which system you choose is the sequence of events that occurred when the security system is in use. This article gives a brief summary of how the houses of security monitoring.

Almost all home security monitoring system is activated as the first step in the process. Generally homeowners press a button or a set of buttons on the keyboard to activate the security system. Send a message that the security system will be implemented as violated in any way. When this happens, the various components of an active safety system. This can include access to contacts, motion detectors, security cameras and other components of supervision in the home security system. This feature will remain active until the owner returned home and from the operating system of internal security. Again, this is usually done by typing in a string of numbers on the keyboard.

If a breach of security, home security surveillance system will begin a sequence of events. In most cases the first case, after detecting an intruder, a warning alarm tone. Generally low level alarm and the purpose of the alarm for owners to turn off the alarm when he returned home. owners usually have about 30 seconds to turn the alarm off before the home security alarm system with the next step.

If the alarm is not deactivated at the same time two things happen to go home security check. An alarm sounds and a powerful message sent to a monitoring station that a failure of the security system home security monitoring. This message came from the monitoring station staff 24 days to respond to this message. The first answer is to contact the owner to determine whether a surveillance system for homeland security is breached or is it a false alarm. If the owner does not respond to the security staff monitoring the delivery of housing and the password protection, the staff will contact the local police and send it to your address.

The control internal security services are suitable for a clear path of action have. Most home security monitoring company and continue to respond with a very similar way as a security breach on your network. Although each company home security monitoring may vary, all generally work the same way.

9/25/2010

Cyberwar Chief Calls for Secure Computer Network

FORT MEADE, Md. — The new commander of the military’s cyberwarfare operations is advocating the creation of a separate, secure computer network to protect civilian government agencies and critical industries like the nation’s power grid against attacks mounted over the Internet.

The officer, Gen. Keith B. Alexander, suggested that such a heavily restricted network would allow the government to impose greater protections for the nation’s vital, official on-line operations. General Alexander labeled the new network “a secure zone, a protected zone.” Others have nicknamed it “dot-secure.”

It would provide to essential networks like those that tie together the banking, aviation, and public utility systems the kind of protection that the military has built around secret military and diplomatic communications networks — although even these are not completely invulnerable.

For years, experts have warned of the risks of Internet attacks on civilian networks. An article published a few months ago by the National Academy of Engineering said that “cyber systems are the ‘weakest link’ in the electricity system,” and that “security must be designed into the system from the start, not glued on as an afterthought.”

General Alexander, an Army officer who leads the military’s new Cyber Command, did not explain just where the fence should be built between the conventional Internet and his proposed secure zone, or how the gates would be opened to allow appropriate access to information they need every day. General Alexander said the White House hopes to complete a policy review on cyber issues in time for Congress to debate updated or new legislation when it convenes in January.

General Alexander’s new command is responsible for defending Defense Department computer networks and, if directed by the president, carrying out computer-network attacks overseas.

But the military is broadly prohibited from engaging in law enforcement operations on American soil without a presidential order, so the command’s potential role in assisting the Department of Homeland Security, the Federal Bureau of Investigation or the Department of Energy in the event of a major attack inside the United States has not been set down in law or policy.

“There is a real probability that in the future, this country will get hit with a destructive attack, and we need to be ready for it,” General Alexander said in a roundtable with reporters at the National Cryptologic Museum here at Fort Meade in advance of his Congressional testimony on Thursday morning.

“I believe this is one of the most critical problems our country faces,” he said. “We need to get that right. I think we have to have a discussion about roles and responsibilities: What’s the role of Cyber Command? What’s the role of the ‘intel’ community? What’s the role of the rest of the Defense Department? What’s the role of D.H.S.? And how do you make that team work? That’s going to take time.”

Some critics have questioned whether the Defense Department can step up protection of vital computer networks without crashing against the public’s ability to live and work with confidence on the Internet. General Alexander said, “We can protect civil liberties and privacy and still do our mission. We’ve got to do that.”

Speaking of the civilian networks that are at risk, he said: “If one of those destructive attacks comes right now, I’m focused on the Defense Department. What are the responsibilities — and I think this is part of the discussion — for the power grid, for financial networks, for other critical infrastructure? How do you protect the country when it comes to that kind of attack, and who is responsible for it?”

As General Alexander prepared for his testimony before the House Armed Services Committee, the ranking Republican on the panel, Howard P. McKeon of California, noted the Pentagon’s progress in expanding its cyber capabilities.

But he said that “many questions remain as to how Cyber Command will meet such a broad mandate” given the clear “vulnerabilities in cyberspace.”

The committee chairman, Rep. Ike Skelton, Democrat of Missouri, said that “cyberspace is an environment where distinctions and divisions between public and private, government and commercial, military and nonmilitary are blurred.” He said that it is important “that we engage in this discussion in a very direct way and include the public.”

Articles Sourceh : nytimes

3/21/2010

TOSHIBA Satellite L510-B400

Overview
This great value, quality laptop serves all your basic computing needs and offers you great performance packed with some astonishing features. Our passion for innovation includes introducing the best value notebooks as well the latest technologies, and the result is the combination of performance, style and ease of use with affordability. The latest innovative Toshiba entertainment and multimedia features for the smartest digital experience are also included as standard because you shouldn't have to pay extra for ease of use.

Detail Specifications

Platform
Notebook PC with Intel Centrino Duo Technology
Processor Type
Intel Pentium Dual-Core Processor
Processor Onboard
Intel® Pentium® T4400 (2.2 GHz, FSB 800, Cache 1 MB)
Chipset
Intel 45GM
Standard Memory
1 GB DDR3 SDRAM PC-8500
Max. Memory
4 GB (2 DIMMs)
Video Type
Intel® Graphics Media Accelerator 4500MHD 285 MB (shared)
Display Size
14" WXGA LED
Display Max. Resolution
1366 x 768
Display Technology
Clear SuperView LED
Audio Type
Integrated
Download Driver Audio TOSHIBA Satellite L510-B400 For All Operating System
Speakers Type
Integrated
Floppy Drive
Optional
Hard Drive Type
250 GB Serial ATA 5400 RPM
Optical Drive Type
DVD±RW
Modem
Optional
Download Driver Modem TOSHIBA Satellite L510-B400 For All Operating
Networking
Integrated
Network Speed
10 / 100 Mbps
Wireless Network Type
Integrated
Download Driver Wireless Network TOSHIBA Satellite L510-B400 For All Operating System
Wireless Network Protocol
IEEE 802.11b, IEEE 802.11g
Wireless Bluetooth
Optional
Download Driver Bluetooth TOSHIBA Satellite L510-B400 For All Operating
Keyboard Type
QWERTY 82 keys
Input Device Type
Touch Pad
Slot Provided
Optional
Card Reader Provided
SD, MMC, Memory Stick / Stick PRO
Interface Provided
2x USB 2.0, VGA, LAN, Audio, eSATA,* Webcamera
O/S Provided
Pre-sales Request Available
Battery Type
Rechargeable Lithium-ion Battery
Power Supply
External AC Adapter
Dimension (WHD)
340 x 38 x 232 mm
Weight
2.3 kg
Standard Warranty
1-year Limited Warranty by Authorized Distributor
Bundled Peripherals
Carrying Case
Download All Driver For TOSHIBA Satellite L510-B400

2/14/2010

Brother HL-2170 Laser Printer

Overview

Crisp and vibrant monochrome text and images are produced by this high-quality laser printer from Brother. The HL-2170 merges compact, easy-to-place and easy-to-use design with the quality and efficiency needed to meet the printing needs of any home office or small business. Rapid printing and cost savings combine to save your home office or small business time and money with the Brother HL-2170 monochrome printer.

Features and Functionality

With an outstanding print resolution of up to 2400 x 600 dpi, your HL-2170 printer will create precise, professional quality text and graphics. Bold and clear, your projects, spreadsheets, and other important documents will be quickly and efficiently created right in your home or office. The capacity tray holds 250 sheets of paper, allowing you the freedom to mass-produce documents, as needed.

The Brother HL-2170 toner cartridges come in black ink only, and yield up to 2,600 pages per cartridge. This printer model will use both the TN360 toner cartridge and the TN330 toner cartridge. Both toner cartridges come in both OEM branded and compatible toner cartridge versions. The DR360 drum cartridge is also required for operation. An option to use the Toner Save Mode allows you to stretch the life of your HL-2170 cartridge without compromising on quality for most of your text and graphics documents. Managing only black toner and an imaging drum with a yield of 12,000 pages allows you to save valuable time on maintenance, as well.

The HL-2170 has a USB 2.0 port for connectivity, and is compatible with Windows, Mac OS, and Linux. This printer is capable of being shared with other network computers, which contributes to the efficiency and cost savings overall. The HL-2170 is also an Energy Star qualified printer, saving your business money as well as conserving the environment.

Why Choose the Brother HL-2170 Laser Printer?

The Brother HL-2170 is a high-quality monochrome laser printer that will be a smart addition to any office, be it home or small business. The professional quality text and images it can produce, as well as the cost savings as an Energy Star printer and the ability to manage your toner use with the Toner Save Mode, combine to make the HL-2170 an easy choice.

Brother HL-2170 Toner

Search for Brother Toner Cartridges.

Article Source: http://EzineArticles.com/?expert=Anthony_Allen

Logitech Driver

Gift Ideas For the Electronic Enthusiast
By Michael Hirsch

Logitech International is a peripheral device company, specializing in items such as game controllers, webcams, keyboards, and mice. Logitech also produces home audio speakers, headphones, cellular phones and other audio devices. There is a variety of Logitech items available in stores and on the Internet which would be perfect for someone who loves electronics.

These days, the average family owns multiple home entertainment components, such as TVs, DVDs, audio systems, etc. The universal remote has become a time-saver which allows for an easier means of accessing these electronics. Logitech latest universal remote, the Harmony 700, is easy to configure and saves settings via cloud. Devices can be configured with a single key punch, which is a great improvement over the more inexpensive universal remote controllers. Although it lacks a touch screen, for the price, the Harmony 700 has great design and functionality.

Another new Logitech product in the market is the QuickCam Pro 9000. This webcam utilized a Carl Zeiss lens and proprietary technology which delivers superior image quality, even in low light situations. The software, which is bundled with the product, is both sophisticated and easy to use. The webcam also comes with a flexible and sturdy stand which can be used on top of a monitor or on a desk.

In the market of portable radio and wi-fi music players, Logitech has developed the Squeezebox Radio. This compact device is easily customizable utilizing the newly created applications gallery and Squeezebox software. The audio sound is respectable, taking into account the small size of the player, and utilizes a 7. 6 cm woofer. The device features the ability to stream radio and the option to listen to music files on PCs or a network. This gives the listeners more options and greater convenience than a regular MP3 player.

Logitech also produced a new user-friendly keyboard, the Comfort Wave 450. It was designed for heavy computer users, such as administrative staff. Three new design elements include a U shape style, a key-frame design, and a padded wrist rest. Unlike other ergonomic keyboards on the market, this particular item is intuitive and doesn't reposition the keys in a strange fashion. Users are able to adapt to this keyboard, quickly and comfortably.

Another Logitech innovation is the Digital Security System. This product allows consumers to monitor their homes, remotely. It involves an easy set up of the system which includes an indoor video camera, with mounts if necessary. All components are powered and networked via AC plugs. If the system detects motion in your house, the system alerts you by text message or email.

In order to enable computer programs to interact correctly with hardware devices, device drivers must be installed. Consumers must download the appropriate logitech driver in order to have full functionality of their device. Although a CD of the driver is usually included with Logitech, the drivers can also be downloaded for free on many internet sites. If a user happens to upgrade their computer's operating system, these drivers would have to be reinstalled into their system.

This holiday, Logitech offers an assortment of products such as computer peripherals and audio players. Logitech is a popular brand among people who enjoy receiving novel and well-made electronic products.

We have access to the worlds largest driver database. To learn more about updating all your drivers at once. Visit us at http://www.onestopdrivers.com.

Article Source: http://EzineArticles.com/?expert=Michael_Hirsch

How Secure Are Online Data Backups?

Processing DATA is what all businesses do. Protecting data is what SMART businesses do. Smart businesses understand that if they lose their data they lose their business.

If you are considering taking steps to ensure the integrity and safety of your important computer data you may be concerned about the security involved when dealing with such a task. When considering a third party such as an online secure data backup solution there are a few things to consider:

For starters, it is critical that your data be secure not only while in the possession of a third party but also while in transit to them. Most modern online secure data backup providers make there services available via the Internet and will provide you with the necessary software to back up a predefined set of your critical data, which is then encrypted (typically up to 448 bit), before it is transferred over a high speed connection to a secure data storage facility. By securing your data before transferring it over the Internet, you can be assured that your sensitive data (such as financial reports, company memos, and client databases) are safe from prying eyes. For ultra-critical, or highly sensitive applications, the data may be transferred over a completely encrypted channel (also known as an encrypted "tunnel" or virtual private network). If you will be backing up sensitive data that demands the utmost of privacy be sure to inquire about the level of encryption offered by the online secure data backup you are considering.

When considering a remote data backup vendor you should also take into consideration the facilities in which your sensitive data will be physically stored. In addition to encryption technology other things to be on the lookout for are fully secure facilities, biometric security systems, facility lockout policies, and human security. Depending on the level of security you need there are many levels of protection for your data that can be provided by remote data backup companies.

Be sure to do your research and investigate the track record and reputation of the online data backup company you are considering doing business with and never hesitate to ask questions when it comes to ensuring the security of your mission critical confidential data.

Your DATA is your LIFE. Protect it!

Harald Anderson is a freelance writer and webmaster for http://www.online-remote-data-backup.com an online backup service. Experience the Digital Peace of Mind that safe, secure, encrypted online data backups can offer. Online Backups

Article source :
http://articles.klikajadeh.com/showarticle.php?article=11113

1/01/2010

Using a Binary Patch Maker to Create Secure Software Patches

Once a software product has been released into the field, it's inevitable that software development companies will want to fix problems, add features, solve unforeseen compatibility issues, and fix security holes. That's why a binary patch maker belongs in the software development tool kit of every programmer.

Benefits of Patching
The role of patches in the software deployment life-cycle is to get already installed software up to date after it becomes outdated. Patching technology offers numerous benefits over simply redistributing new versions of the original software in whole form.

Smaller file size
Because they only contain the data that has changed from one version to another, patches can be much smaller than a full software installer needs to be. Especially in situations where large data files are involved, the savings are often dramatic-patches that are less than 1% of the original file sizes are possible.

Reduced bandwidth
Smaller file sizes translate into reduced bandwidth costs, and reducing the amount of traffic leaves more bandwidth for other services.

Faster transmission speeds
Having less data to transmit means that updates can be sent and received faster, which means less time is spent waiting for updates.

Security
The best way to protect information during transmission is to never transmit it in the first place. By only transmitting the data that has changed, patches reduce the risk of third-party interception. Even if some hypothetical future technology made it possible to "crack" the encryption methods used to package the changes, the unchanged data would remain safe.

Integrity
A patch can't update something that isn't there. If a user doesn't already have your software installed, they won't be able to apply the patch. And if someone is using a modified version of a file, that file won't be updated-unless you expressly permit it when you design your patch.

Patching Methods
There are two basic methods that can be used to update a file: binary patching, and whole-file patching.

Binary Patching
Binary patching or "delta compression" involves analyzing two versions of a file in order to extract only the data that has changed. The same changes can then be applied to any file that matches the old version, in order to "transform" it into the new version.

Creating a binary patch involves performing a byte-by-byte comparison between the original file and the new file, and then encoding the differences into a difference file. Each difference file contains the actual bytes that are different in the new file, along with a number of instructions that describe which bytes need to change, and which bytes are the same. This information is said to be encoded into the difference file.

Tip: The term "difference file" is often shortened to "diff file" or just "diff."

When the patch is applied, the difference file is decoded, and the instructions are used to build the new file by copying the "unchanged" data out of the old file, along with the "changed" data that was encoded into the difference file.

For example, given an old file "A" and a new file "B," a binary patching engine would compare A to B and then produce a difference file; let's call it "AB.diff." Once the difference file is created, you can use it to create the B file from any file that matches the A file. In fact, the binary patching engine could recreate B using A and AB.diff.

Because binary patching only stores the parts that have changed, the difference files can be very small-often less than one percent of the new file's size. The size of the difference file depends entirely on how much data has changed between the two versions.

Each difference file can update a single, specific version of a file to another single, specific version of that file. The encoded instructions in the difference file are only valid for a file that is a perfect match of the original source file. Note that binary patching cannot be used to update a file if it has been modified in any way.

For patches that need to update multiple files, the patch executable will need to contain a separate difference file for each file that needs to be updated. So, for example, to update a single file from version 1.0 or 1.1 to version 1.2, using a single patch executable, it would need to contain one difference file to go from 1.0 to 1.2, and another to go from 1.1 to 1.2.

In most cases, the difference files are so small that you can fit a lot of versions into a single patch executable and still use less space than you would by just including the whole file, as in whole-file patching (see below).

Note: An advanced patch maker like Indigo Rose's Visual Patch will automatically switch from binary to whole-file patching on a file-by-file basis whenever the total size of all the difference files surpasses the size of the whole file.

Whole-File Patching
Whole-file patching operates on a different principle. Instead of only containing the parts that have changed (as binary patches do), whole-file patches just copy the entire file. The "patch" is just a copy of the new version.

Whole-file patches can be faster to apply, because they don't have to search through the original file in order to copy the parts that haven't changed to the new version. They just overwrite the old file with the new one. The downside, of course, is that whole-file patches tend to be much larger than binary patches.

There are, however, two situations where whole-file patches can actually be smaller: when creating a single patch file that is able to update many different versions, and when the files being patched are too dissimilar.

A smart patch maker like Visual Patch chooses the patching method that produces the best results. It automatically switches between binary patching and whole-file patching on a file-by-file basis in order to produces the smallest patch possible for your project.

For more information on choosing a binary patch maker that creates compact and secure software updates, visit here and download a free trial version of Visual Patch.

By Danny Forster
Article Source: http://EzineArticles.com/?expert=Danny_Forster

Multitouch Screens Could Enliven New Devices

Multitouch screens have been a little slower to enter the electronics marketplace than consumers might have hoped. Since Jeff Han, a research scientist at New York University’s Courant Institute of Mathematical Sciences, first presented his multitouch wall at the TED Conference in 2006, we’ve seen other multitouch technologies trickle into the electronic marketplace. The cellphone has used the technology most, starting with the iPhone, and then moving into other smartphones using Google’s Android platform and Hewlett-Packard TouchSmart countertop computer. But with the exception of a few outliers and device manufacturer research demos, we haven’t really seen multitouch used in other consumer electronics yet.
That might all change soon. Ilya Rosenberg, Ken Perlin and a small team of computer scientists from New York University’s Media Research Lab hope to bring a new kind of multitouch to everything from new e-readers to musical instruments, with their new company, Touchco.

Devices like the iPhone use a technology called capacitive touch and require contact with skin to activate a touch point. These touch technologies also limit the number of simultaneous inputs (the iPhone can track up to five fingers at once). In contrast, Touchco uses a technology called interpolating force-sensitive resistance, or I.F.S.R. This technology uses force-sensitive resistors, which become more conductive as you apply different levels of pressure, and then constantly scan and detect different inputs.

This allows for very low power, unlimited simultaneous touch inputs and the possibility of fully flexible multitouch devices. The technology is also extremely inexpensive; Mr. Rosenberg hopes to sell sheets of I.F.S.R. for as little as $10 a square foot.

So where can you expect to see this technology? Mr. Perlin believes you will see a new range of multitouch e-readers in the coming year, along with new musical instruments and other laptops or notebooks. Touchco has also been working closely with Disney animators to create a true digital sketchbook replacement, utilizing extremely sensitive pressure sensors to determine pencil thickness or even use of an eraser. The software behind the sensors can easily differentiate between the palm of a hand, a brush or a pencil.

There is also the possibility that the right implementation on computer could change the way we interact with interfaces. As an example, Mr. Rosenberg showed me a long sheet of I.F.S.R., about the size of a large flat panel computer monitor, which allowed manipulation of a 3-D computer program. When I lightly dragged my hand across the touch panel I could control the cursor. When I applied more pressure, I could select objects and change their orientation, size and shape within the program. It was incredibly intuitive and simple to navigate.

As you can see from the images below, there are lots of potential applications and devices that could use inexpensive multitouch technology. You can also see some video demonstrations on Touchco’s YouTube page.

Touchco began selling developer product kits to device manufacturers this year and hopes to see new devices enter the digital marketplace by late 2010. Touchco published technical specifications here.

By NICK BILTON
Article Sourch : http://bits.blogs.nytimes.com/2009/12/30/multi-touch-screens-could-enable-many-new-devices/#more-27105

Dell Customers Fume Over Late Holiday Orders

Some of Dell’s social-networking-type Web sites have turned less social and more volatile over the holidays, as the company’s PC shipment woes have carried on past Christmas.

Customers have flocked to the Direct2Dell blog and Twitter to free their inner bah humbug. They’re chastising Dell left and right for multiple delays involving their orders – some stretching more than a month. In addition, they’re scoffing at the Dell Holiday Card the company offered as an under-the-tree replacement for missing PCs.

A couple of weeks ago, Dell picked up on the negative chatter and went to its blog for self-defense.

“The reality is that we are seeing increased demand for many of the products consumers want to buy, and it has affected our ability to fulfill the orders,” wrote Lionel Menchaca, the chief blogger at Dell. “In addition, there are also some industrywide constraints on some components (like memory and larger-capacity hard drives) that are delaying the manufacturing of certain products for customers.”

Things turned uglier as Christmas came and went and order delays were extended.

Mr. Menchaca has been working to fix some orders personally, as have some of Dell’s public relations staff members in Europe.

It’s a full-court Tweet press that seems to have placated some. For example, the Twitter user @dell_ruins_xmas appears to have shut down his account after Dell stepped in with some personalized customer service.

But many customers are still irate. People on the Direct2Dell blog talk about canceling their orders and still facing delay after delay.

“Yay, the Studio 1745 I ordered on 12/1 came with an estimated delivery date of 12/29, then 1/6, and today it changed to 1/13,” wrote HobbesGTS. “I tried calling to find out why it’s delayed and customer support is worthless.”

Another customer said his order had slipped from Nov. 14 to Jan. 29.

“I’m getting the feeling that I will get my alienware … by xmas 2010!” wrote deannzt. “Can it really take 2.5 months to build this computer?”

Dell has suffered from these types of delays in the past, particularly when it first started offering a wider choice of colors on laptops. The company ran into painting issues at a factory in Asia, and had to delay orders by many weeks.

Over all, it’s a tough situation for a company that’s spent years trying to rebuild its customer service reputation. The proactive moves on the social networking sites and blogs can offset only so much anguish.

One would think that eventually the shipment times for the major PC makers should be all just about equal. Dell has finally followed the lead of its rivals and moved more of its business to contract manufacturers, rather than trying to build its own PCs.

By ASHLEE VANCE
Article Sourch :http://bits.blogs.nytimes.com/2009/12/31/dell-customers-fume-over-late-holiday-orders/?ref=technology