Skip to main content

Posts

Showing posts from May, 2011

IBM Tivoli Endpoint Manager for Core Protection

A cutting-edge cloud-based endpoint anti-malware solution integrated with Tivoli Endpoint Manager (TEM).IBM announced a major update to Tivoli Endpoint Manager for Core Protection (TEM-CP), an integrated anti-malware and firewall product for Windows and Mac computers.Note that TEM for Core Protection is the updated name for what was formerly referred to as the BigFix Core Protection Module (CPM). IBM Tivoli Endpoint Manager for Core Protection V10.5 delivers real-time protection from malware and other vulnerabilities via capabilities such as file and web reputation, virtualization awareness, and behavior monitoring. It protects physical and virtual endpoints from damage caused by malware and other vulnerabilities and reduces the business disruptions resulting from endpoint attacks. TEM-CP represents a close collaboration between IBM and Trend Micro that has enabled IBM to deliver a deep integration of Trend's anti-malware engine which is completely managed by the TEM Console.Tivoli

Efficient Power Management with Shavlik

Computers which are idle or not in use but are "Switched ON" are wasting energy which an organization has to pay for. That not fair ... According to stats, in United States alone , more than 3.2 billion dollars worth of energy is wasted annually by not shutting down or reducing the power state of computers when not in use. How to save this money ? Few countries and many US states have implemented energy savings rebate programs to encourage corporations to adopt Greener IT practices. Some of the Greener IT practices include shutting down computers when not in use , using power profiles to track and optimize energy utilization , keeping computers powered off on weekends (if idle).One of the best ways to save energy from computers in an organization,  is to provide employees with laptops which they can carry it home.However this leads to possibilities of confidential data being leaked or stolen. Shavlik Technologies is a global leader in simplifying IT management.NetChk Prote

A Go Green Logo

Creativity at its Best !

Things to Consider for Desktop Power Management

PC Power Management is critical for every IT organization as it helps minimize the environmental impacts and save money. The real goal is use computer on-demand , which means they should consume power only when some work is being done by the end-user and save energy when not it use. The scenario is just like our daily usage of room lights and fans - use them when you are in the room , turn them off while leaving the room.Now the question is how can we do this for computers ?  Computer power management can be done using special software that can monitor the hardware and take them to lowest power demand state when idle or not in use.This is the fundamental concept for Green Computing . Lets consider how much power does a PC use ? Here's an analysis by Microsoft : So if your PC is using 100 W of energy , 43 W is being used by your monitor. Considering this an organization first needs to think about the monitors being used or to be purchased. If CRT monitors exist , get rid of them as

PC LifeCycle Clock for Enhanced Power Management

An excellent diagram by Adaptiva explaining how power management for computers / endpoints  can help save a lot of Green Dollars ... Related Article : Endpoint Power Management

Endpoint Power Management as a Go Green Initiative

Power management for desktops , laptops or servers reduces the overall IT power consumption and helps is saving energy and reduce IT costs without any loss in productivity.Considering the rising costs of electricity power management has been on radar for an IT organization. Power management for endpoints involves deploying power conservation policies and track the total energy saved.At a high level, management prefers that machines be powered down as frequently as possible to maximize energy savings. However, IT requires machines to be ON at night, when it is easiest to apply patches and updates. But again keeping the computers ON the full night is not an efficient solution.We can use "Wake-On-Lan" to power-on the computer as and when needed , in an On-Demand way. Most computers (Windows & Mac) already have built-in power management features, and many end users are familiar with controls to automatically shut off the monitor or hard drive and put the computer into a low-p

Steganography in depth

Steganography is the practice of hiding confidential or sensitive information within something that appears to be nothing out of the usual.Steganography is often confused with cryptography because the two are similar in the way that they both are used to protect important information. If a someone views the object that the information is hidden inside of  , he or she will have no clue that there is any hidden information in it. As a result the person will not try to decrypt the information/object .That is the beauty of Steganography. Steganography comes from the Greek words Steganós (Covered) and Graptos (Writing). How Does It Work? There are number of ways to hide information in pictures,audio and video using Steganography.Some the most common methods include are LSB and Injection . LSB Method of bit substitution Some files usually have some bytes which are of no use or least importance. These bytes of the file can be filled with information to be hidden. Replacing these bytes doesn&

Steganography Detection Hardware Appliance

The art of detecting hidden messages in digital media like images , audio or video is known as Steganalysis.The goal of Steganalysis is to identify / detect suspected files and determine any secret or confidential information is hidden in them and if possible recover the information. There are hundreds of stego applications available on Internet free of cost or as trial softwares. Most  of these applications take advantage of "image noise" in an image file, such as a typical JPG.Image noise is most apparent in image regions with low signal level, such as shadow regions. Application like JPGHide can be used to store information in these low bit regions of the image that are undetectable to the human eye. For example, picture of a sunset is not very clear but has lots of shadow regions. This suspects that it could easily contain store a secret message or another image entirely. Most Data Leakage Prevention (DLP) solutions in the market provide a wide range of security

Tools for Steganography

A steganography software tool implements digital steganography process, allowing users to insert and extract hidden data into images , audio , video and documents. List of tools for hiding information using Steganography are : MP3Stego MP3Stego will hide information in MP3 files during the compression process. The data is first compressed, encrypted and then hidden in the MP3 bit stream. Information on MP3Stego MP3Stego 1.1.18 for Windows MP3Stego with Graphic Interface JPHide and JPSeek JPHIDE and JPSEEK are programs which allow you to hide a file in a jpeg visual image. There are lots of versions of similar programs available on the internet but JPHIDE and JPSEEK are rather special. Download JPHide and JPSeek BlindSide Cryptographic Tool BlindSide is an example of the art of Steganography - the passing of secret messages in a form such that one would not suspect the message is being passed. This is an area of cryptography that is attracting considerable interest of late. The Blin

The Art of Hiding Information in the Digital World

Steganography is the art and science of hiding information by embedding messages within media like images.The main purpose of digital steganography is often to create a message that defies detection. There are number of file formats in which data is redundant or some data is of little importance.Digital steganography exploits this fact and the hidden message does not cause noticeable changes to the file.It is used in graphics files, HTML, sound files, video, and text files, for example, but image files are favored and referred to as stego-images. What is steganography ? Most common goal of steganography is to hide a file/data inside another file/data. Consider the below case : An example showing how terrorists may use forum avatars to send hidden messages. This avatar contains the message "Boss said that we should blow up the bridge at midnight." encrypted with http://mozaiq.org/encrypt using "växjö" as password. You can try this as a real experiment. In October 2

What is Computer Crime ?

Any crime involving a computer or a network is referred to as Computer Crime - harmful act committed from or against a computer(cyber crime) or network(net crime). Practically there is no reliable data on the amount of computer crime and the physical/economic loss to victims, mainly because many of these crimes in the digital work of 1 and 0 remain undetected. Why is it dangerous than terrestrial crime ? Estimates are that computer crime costs victims in the USA at least US$ 5×10,00,00,000 / year. Computer Crime differs from terrestrial crimes because they : - Are easy to learn (hacking is fun) - Require few resources relative to the potential damage they cause (just one normal computer) - Can be committed without being physically present (virus over Internet) - Are not clearly illegal ( denial of service - DOS ) A  DOS attack occurs when an Internet server is flooded with a continuous stream of bogus/irrelative requests for web pages which may or may not exist, the

Computer Power Management with TEM

With Tivoli Endpoint Management an Oraganization can save money (operations cost) from its computers and the concept is just very simple , if a PC is idle or not being used , it should be in the low power state (consuming minimum energy) or be powered off. Yeah ... Don't worry about your work,open documents , TEM has the ability to save all your work including unsaved documents and files before shutting down or sleeping. An yes Wake-ON-LAN enables the machines to be powered on when needed on demand from a central TEM server. One of the largest educational organization in the world saved nearly 4 million dollars a year by using Tivoli Endpoint Manager's Power Management Functionality. Related Article : Greener Planet with Optimized Power Management

PXE can work on Wireless Networks

iPXE is an open source PXE implementation supporting protocols like HTTP, iSCSI , ATA over Ethernet (AoE) , Fibre Channel over Ethernet (FCoE). iPXE can also work with Wireless Network instead of the traditional wired network.It can fetch files from multiple network protocols, such as TFTP, NFS, HTTP or FTP as compared to the TFTP for data transfer in traditional PXE. Some interesting features of iPXE are : 1.      boot from a web server via HTTP 2.      boot from an iSCSI SAN 3.      boot from a Fibre Channel SAN via FCoE 4.      boot from an AoE SAN 5.      boot from a wireless network 6.      boot from a wide-area network 7.      boot from an Infiniband network 8.      control the boot process with a script iPXE can be loaded by a computer from media like floppy disk, USB flash drive, or hard disk or as a pseudo Linux kernel or as an ELF image. Booting Windows XP via iSCSI SAN  More information can be found at iPXE