Sponsors

Thursday, December 29, 2011

What's All The Fuss About HTML5? And Why You Should Care

HTML5 is the hot new programming language that is quickly becoming a new standard in web development. HTML5 matters because it will allow developers to develop code once and then distribute that same code on desktops, tablets and smartphones; the OS platform or hardware won't matter anymore. Below is a graphic describing built-in functionality that HTLM5 has which will free up developers from finding work arounds to previous problems with compatibility depending on what platform they were building on:

  • Audio
  • Video
  • 3D
  • Motion
  • Type/ Fonts
  • Storage

Whato Does HTLM5 Do?

 

HTML5 development will also allow developers bypass Apple's App Store and Google's App Market. Native app stores have many standards and restrictions where many developers feel hinder their creative designs or their clients needs.

Below is a great video from PineheadTV describing all of the major components of HTLM5

 

EnJoy,

Julius

Sunday, December 18, 2011

Cadillac's Re-Invention of the Car Instrument Panel

I am speechless...

 

Introducing CUE = Cadillac User Experience technology | CUE

 

Friday, August 12, 2011

Unprecedented: Police Shut Down Cell Phone Service To Stop Peaceful Protest

 

 

Never in the history of the United States has law enforcement stopped free flowing channel of communication of American citizens.

But in the Bay Area of California, BART (Bay Area Rapid Transit) police disrupted cell phone service for all cell phone carriers on their underground transit system to stop coordination of a scheduled protest regarding a police shooting.

The Federal communication law spells it out explicitly and prohibits cell phone jamming, but BART police officials went around the Federal Communication law by turning off the power to the cell phone antennas.

The protest was peaceful so its bewildering why BART would take such measures. Americans recently have witnessed dictators on TV in Middle Eastern countries disrupt their citizens communications; but now in America?

Above ground cell phone service was not interrupted, but this was a very bad idea and one that is probably unconstitutional; even though BART did not jam cell phone signals, they deliberately killed cell phone signals to keep protesters from organizing their event. A BART director said that he did not feel comfortable with the decision, but they wanted to keep people from possibly getting pushed in front of trains if many people showed up for the protest.

It makes me say what the heck is going on in California, because on January 3, 2011, the California State Supreme Court ruled that police can seize and search your cell phone without a warrant. See link One can password protect their cell phone and the police have the right to ask for it; and you have the right to refuse. 

A BART transit spokesperson stated the following: "Free speech happens outside the fare gates. That is the free speech zone," 

This is another situation where laws have to catch up to technology.

It’s interesting that 30 years ago this week, IBM marketed the personal computer. Since the inception of the original idea of the personal computer, Handheld Smartphones which are much many times more powerful than the first IBM PC, and is in the hands of billions of people all over the world. This year we have seen Smartphones help oust dictators in real-time.

Cost to own the first IBM PC: Under $3,000.

Cost to own a much more powerful smartphone: under $100; with a 2 year wireless contract of course :-).

I wonder what technology will be like in another 30 years to make the iPad look so ancient like the first personal computer does.

All I can say is that technology evolution and innovation by mankind is relentless and breathtaking.

Reference:

BART: 'We Were Within Our Legal Right' to Shut Down Cell Service

http://www.1up.com/news/ibm-personal-computer-thirty-years-old

 

 

Tuesday, June 7, 2011

12 Dumb User Mistakes That Will Get You Hacked

Ok, I had to write this blog for those people who just won’t learn until its too late and one day they get hacked.
  1. Not having Anti-Virus Software installed which does not get automatically updated.
  2. Not having your computer automatically downloading and installing operating system patch updates.
  3. Turning off your computer’s firewall.
  4. Not using a strong password at least 8 characters or longer that uses upper & lower case alpha, numeric and special characters.
  5. Clicking on unfamiliar email and web site links.
  6. Allowing other people to use your computer; especially little kids who visit game sites.
  7. Installing unfamiliar applications, games and utilities that you have not researched.
  8. Being tricked to enter your login and ID into an email or website that says they need your login credentials.
  9. Using a public computer and not logging off after you finish using it.
  10. Doing on-line financial transactions on a public computer; you can still use a phone you know to do this with much less risk.
  11. Sharing your login ID and Passwords with other people.
  12. Installing a new device and software and not changing the default out of the box or install login information. Example: login ID: Administrator, admin, 0000 and password.
If you have done any of the above, stop it immediately!
Enjoy and be safe!

Julius Clark, MBA, CISSP, CISA
Information Security Professional

Sunday, May 29, 2011

How Google Increased Your Gmail Security

 

 

In January of 2010, Google made HTTPS encryption a default security setting for Gmail users email session via a webpage. (See Link Below)

This was a positive move, because it greatly reduces the risk of someone eavesdropping on your communications with Gmail. Gmail users privacy was increased significantly, which will cause a reduction in personal information breaches.
Note: Now this enhanced security can be defeated if you are using a computer that has malware that can steal your keystrokes or clicking on unfamiliar links on websites and in email that can hijack your computer and use the HTTPS security to protect their misdeeds.

Google's decision to make HTTPS the default setting was due to criticism from a  group of computer scientists, law professors and security experts, who voiced their concerns in an open letter to their CEO Eric Schmitt. The group, claimed that the default unencrypted settings put customer and information at risk unnecessarily. (See Link Below)

An open letter to Google's CEO, Eric Schmidt

What is HTTPS? See Link Below

How to Disable and Enable Gmail's HTTPS security setting

Gmail is set to use the 'Always use https' setting by default, but you can change this setting anytime. Here's some background on why we default to this option: If you sign in to Gmail via a non-secure Internet connection, like a public wireless or non-encrypted network, your Google account may be more vulnerable to hijacking. Non-secure networks make it easier for someone to impersonate you and gain full access to your Google account, including any sensitive data it may contain like bank statements or online log-in credentials. HTTPS, or Hypertext Transfer Protocol Secure, is a secure protocol that provides authenticated and encrypted communication.
To disable or re-enable this feature in Gmail:

  1. Sign in to Gmail.
  2. Click the gear icon in the upper-right corner, and select Mail settings.
  3. In the General tab, set 'Browser Connection' to 'Always use https' or 'Don't always use https.'
  4. Click Save Changes.
  5. Manually change the URL to http://mail.google.com to start accessing Gmail via http.

Please note that selecting 'Always use https' will prevent you from accessing Gmail via HTTP (Hypertext Transfer Protocol). If you trust the security of your network, you can turn this feature off at any time.
If you use a public computer to check your email, it's also important to sign out at the end each of your Gmail sessions. Just click the down-arrow next to your name in the upper right corner, and select Sign out. Also, make sure you close all Gmail browser windows.

Google's decision to make HTTPS a default security setting prompted Twitter and Facebook to follow suit and turn it on be default at well. (See Link Below)

If you use Gmail, Facebook or Twitter, enjoy the enhanced privacy protection.

Enjoy,
Julius Clark, MBA, CISSP, CISA

Saturday, March 19, 2011

How to Export Your Facebook Contacts To an Email Address Book.

Export Your Facebook Contacts

Have you ever wished you had your Facebook Contacts in an easy to use email address book?

 

Well your wait is over! Follow my simple steps with ease and simplicity using Yahoo's email service.

 

 

1. First thing to do is go to www.yahoo.com

.

2. It is best to create a new Yahoo email account to perform the export and to manage your contacts in the future.

3. Log into your new Yahoo email account and click on Contacts.

 

.

4. Click on Tools from the pull down menu and select Import.

5.Click on the Facebook icon.

6. Click OK to share contacts with Yahoo.

 

7.Yahoo will start retrieving the contacts from Facebook and display the number of contacts found.

8. When Yahoo finishes importing your Facebook contacts it will display the number of countacts imported. Click View Contacts.

Note: You can only download those contacts of Facebook users who do not block their contact information from being shared.

9.  From the Tools menue choose Export.

10. Choose the export format you would like to download your Facebook contacts in.

 

Thats it! You now have exported your Facebook contacts into your Yahoo email account.

Note: After you complete the final step to export your Facebook contacts from Yahoo, you may get an error message of page not found. If that happens a work around would be for you to go to the top of your browser menue and choose Edit, Select All, Click Edit again and choose copy. Open Notepad or Word and paste the contacts. You will then need to manually remove other items that got copied during the cut and paste step. Arrange your contacts in a manner that will work for you. Additionally, I recommend that you only use this yahoo account to manage your exported facebook contacts; this will make life easier for you.

If this becomes too much work then just use your new Yahoo email account to send your messages to your Facebook contact.

Enjoy,

Julius

Saturday, March 5, 2011

Improve Yourself; Increase Your Value



Improve yourself; increase your value. I grew up with the most loving parents, but my parents did not possess certain types of knowledge to teach me how to really get ahead in life. I gained access to that knowledge by associating myself with positve individuals and groups who had that knowledge and a history of success themselves; which provided proof that with hard work, I too could attain what my heart desired; even though at the time I did not have those compentecies that I would eventually learn.


In closing, anyone working on improving themselves benefit even more when they help others who have these gaps in their circule of incluence.



Peace,

Julius.

Sunday, January 9, 2011

12 Global Business Practices for Information Security Professionals



I am very happy to announce that 12 Tenants by the premier Global Information Security professional organizations have been developed to advance the profession of Information Security. This is huge! Collaboration of this effort requires egos to be left at the door; We have some huge egos in IT Security, this demonstrates that they can all get along and work together to globally practice the tenants of IT Security, which are Confidentiality, Integrity and Availability.

Objective

These 12 principles were developed as a framework for IT Security professionals to influence and guide them in their career; they are a welcome sight for individuals new to the field. The principles are intended to affect behaviors, objectives, approaches and activities, which in return will lead to more success safeguarding privacy and technology infrastructure in organizations across the globe.





Target audience

The principles for information security practitioners are aimed at all individuals working in the information security community, including
those who:
  • are employed as part of a security function
  • provide security services in local environments (eg local security co-ordinators)
  • are responsible for developing systems securely
  • supply security products and services (eg vendors and consultants)
  • influence legal / regulatory requirements for information security
  • are aspiring to become security practitioners (eg students).

Benefits to Business

Organizations that have not had a real security framework for their IT Security professionals to follow will see an immediate benefit, which can add value and become a marketable asset.
  • A - Support the Business
  • B - Defend the Business
  • C - Promote Responsible Security Behavior

Background


Information security practitioners need to respond to the changing requirements of organisations in today’s complex, interconnected world.
For example,
  • corporate, IT and information security governance have promoted information security higher up on the board’s agenda
  • the information security profession is not fully mature, traditionally has a bias towards technology and needs to be more risk focused
  • rapidly evolving threats require information security practitioners to stay ahead of the game
  • co-ordinated efforts are needed to maintain the adaptability of information security practitioners, particularly in changing business environments. Over the years there have been a number of offerings related to individual information security practitioners that cover behaviour, actions or ethics. However, there is a requirement for an independent, non-proprietary set of principles, which are:
  • more generic and complete, with less focus on professional qualifications
  • relevant to the business world – and kept up to date
  • agreed throughout the security profession, rather than being proprietary to one organization
  • able to map easily to different security standards and guidelines.
The principles for information security practitioners have been designed to meet these needs. They have been jointly developed by three
of the worlds leading global security organizations, the ISF, ISACA and (ISC)².

A. Support the business
  • A1. Focus on the business: The business is the reason that you have your job! Your goal is to help your organization make money or meet your organizations mission or vision statement.
  • A2. Deliver quality and value to stakeholders: The solutions you implement as an IT security professional in the form of technology, process and people can add value and become a marketable asset for your organization.
  • A3. Comply with relevant legal and regulatory requirements: The law and Information Security go hand and hand. The IT security professional must adhere and comply to all laws and help your organization meet or exceed required compliance objectives.
  • A4. Provide timely and accurate information on security performance: You won't know if your IT Security objectives are working if you have no way to measure the outcome of your IT security implementations; are you receiving the desired results?
  • A5. Evaluate current and future information threats: Information Security threats are forever changing and criminals are always ahead, so the IT security professional must be proactive by studying trends and defending the business from threats before they become a problem.
  • A6. Promote continuous improvement in information security: Once you implement your security solutions go back and review to see if there are opportunities to improve your security solutions currently in production.
B. Defend the business
  • B1 Adopt a risk-based approach: Protect the most critical business applications and information.
  • B2. Protect classified information: Always limit access on a need to know basis to information like the following: social security numbers, customer account information, health records, credit card numbers and proprietary business information; and don't let unauthorized individuals to access your network.
  • B3. Concentrate on critical business applications: Information or systems that are VITAL for the business to stay up and running need the most security; think defense in layers; defense in depth; Confidentiality, Integrity and Availability (CIA).
  • B4. Develop systems securely: Implement security at the beginning of your Information Technology projects. It much easier and cost effective to do so, than try to fit in after a system or data base has been implemented.
C. Promote responsible security behaviour
  • C1. Act in a professional and ethical manner: You are held to a high standard as one appointed to safeguard an organizations system and data assets. Read ethics/ code of conduct from the premier IT Security organizations: ISF, (ISC)2, and ISACA,
  • C2. Foster a security-positive culture:
Download the 12 Principles Poster

I applaud the premier IT Security organizations for working together to create the 12 principles, which will be of great value to new IT Security professionals entering the field.

Enjoy,

Julius Clark, MBA, CISSP, CISA

References:

ISF, (ISC)2 and ISACA Release Information Security Principles

http://blog.isc2.org/isc2_blog/2011/01/isf-isc2-and-isaca-release-information-security-principles.html

12 Principles
https://www.isc2.org/uploadedFiles/(ISC)2_Public_Content/About_ISC2/Industry_Initiatives/Principles%20for%20Info%20Sec%20Practitioners_overview.pdf

12 Principles Poster Download

https://www.isc2.org/uploadedFiles/(ISC)2_Public_Content/About_ISC2/Industry_Initiatives/Principles%20for%20Info%20Sec%20Practitioners_poster.pdf






Friday, January 7, 2011

Google Releases a Preview of its Honeycomb Android 3.0 Tablet Operating System




Yesterday Google Released a Preview of its Honeycomb Android 3.0 tablet operating system designed specifically for tablets.



I love tablets that run on the Android platform! I bought a very cheap one generic from China just to play with over the holidays; the potential with Android tablets is amazing. The biggest reason for me liking Android tablets over Apple iPads is the cost. Tablets running the Android OS will be in the price range of $100 - $400 dollars. Compared to iPads in the range of $500 - $650 dollars.

Additionally, Android tablets will allow the owner to configure it more to their liking, so you won't have to worry about being locked into the default options as with the iPad. The Android version of Apples App store is the App Market that has thousands of application, which developers say is more developer friendly that Apple is.

The future is here with Android tablets and I predict that these devices will be the hottest item on many peoples Christmas list this year.

Enjoy,

Julius



Get Expert Advice!