The historic content found here will remain on this site. We will not be posting any new content of this site. All new content can be found on our Uniquely Toronto site.
We are prevented from making duplicate posts on our sites.
Posted by: Vincent Banial
Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice.
Kaspersky Lab, IMHO produces Top Rated Security Software. Their Cybersecurity Experts are often called upon to investigate major Security Breaches in Hacker Attacks.
Every Year Kaspersky Lab hold it’s Security Analyst Summit. It is a by invitation event, where many of the world’s Top Cybersecurity Experts meet over three days. This year’s Summit is being held in Cancun Mexico.
If you are not known to Kaspersky’s Security Experts, then you will not have gotten an invite. That is why I am here in Toronto with the Extreme Cold Temperature of “Minus” 20 degrees Celcius, while the temperature in Cancun is 23 (will rise to 26 in the afternoon) degrees Celcius. Yes, life at times in rather unfair….
Anyhow the Security Analysts Summit starts in about one hour (on Feb 16 2015). From the official web page:
“Follow SAS 2015 on Twitter with the hashtag #TheSAS2015. We’ll also be live tweeting many of the talks during SAS.
Some of the speakers who will make presentations at this year’s 2015 Security Analysts Summit are: Dan Kaminsky – formerly with Cisco Systems and Avaya. He is a Co-founder and Chief Scientist with White Ops.
Christofer Hoff – he is the Vice President and Security CTO of the Security, Switching & Solutions Business Unit (S3BU) at Juniper Networks.
Staffan Truvé – formererly he was the the CEO of SICS, the Swedish Institute of Computer Science. He is a Co-founder and CTO of Recorded Future.
Katie Moussouris – former senior security strategist lead at Microsoft. She is now the Chief Policy Officer for HackerOne.
Stefan Tanase – he is the Senior Security Researcher, with Kaspersky Lab.
157
Posted by: Vincent Banial
Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice.
Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice.
Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice.
It started the other day when someone told me that they were informed by a Computer Science instructor that Microsoft’s Windows Defender was the best security package for MS Windows 8.1.
I knew that was not to be true and I can easily prove it. Rather surprising that someone teaching a University level course would put their student’s computers at risk. Sure Windows Defender is better than nothing, but far better computer security software is readily available.
“Members of the Anti-Malware Testing Standards Organization (AMTSO) have published guidelines that, for the first time, set recognized standards for testing security software. The standards have been developed and agreed to by more than 40 security experts, product testers and members of the media from around the world. The creation and publication of these standards is a critical first step in fulfilling AMTSO‘s mission to improve the testing of anti-malware products!to visit the test page to “
Along with educational material and a forum, the AMTSO site also has links to a AMTSO Standards based web based Testing site,where you can safely test the security software running on your computer. A side bonus are tests for Android based Tablets and Smartphones.
Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice.
The discussion includes info about Attack Scenarios such as how cross-site request forgery which can be used to steal money from victim Bank Accounts. Also discussed are cross-site script inclusion and SQL Injection Attacks. How the bad guys leverage such techniques to fool victims is detailed.
Along with outlines of Security Vulnerabilities, Neil Daswani also discusses Prevention Techniques such as using Web Application Firewalls. There are ways to stop or counter many Attack Scenarios.
You might also be interested in a book co-authored by Neil Daswani. Click on the following link to visit Amazon to learn more about:
Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice
Sorry for only providing the link above, but we are not permitted by Google to have duplicate posts on both sites.
Posted by: Vincent Banial
Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice. Any offers mentioned in this post are also subject to change without notice.
It is usually a plastic pad which contains one or more fans. Your laptop sits on top of the Laptop Cooling Pad. The Cooling Pad fans are most often powered by the laptop via a USB port, although some come with their own AC Power adapter.
The better Cooling Pads will include a speed control, which can increase the RPM (speed) of the fans.
I prefer Cooling Pads which have at least two fans.
Why?
If one fan fails then you still have cooling from the other fan(s). By having two (or more) fans, the Cooling Pad can offer great cooling when both fans are running at a lower RPM (speed). The fans are quiet, but running at a lower RPM they are even closer to being silent.
Video is courtesy of the Hardware Canucks YouTubce Channel
You should pick a Cooling Pad to fit the size of laptop. If your laptop features a 17.3 inch screen, then you need a cooling pad that is larger and not say one designed for a 14 inch Ultrabook.
For my ASUS I7 Gaming Laptop, I purchased a Cooler Master CM Storm model SF-19. It has cooled my ASUS Gaming laptop for a few years. It’s big and has Lamborghini Aventador styling, which matches well with the styling of the 2nd gen ASUS I7 17.3 inch Gaming Laptop.
I use my ASUS laptop to emulate a rack of Cisco Routers. Without the cooling pad the ASUS runs “hot”, even with its two massive cooling vents pumping out lots of heat.
Heat is something which I believe is not a good thing where computer hardware is concerned. IMHO, the cooler that the equipment can run, then the longer it should perform trouble free.
Video is courtesy of the sinectocl YouTube channel
Posted by: Vincent Banial
Disclaimer: Any Trademarks mentioned in this post are owned by the respective Trademark owner. There could be unintentional errors or omissions in this post. Always refer to the official sites to confirm details and any ongoing changes or updates. This post is subject to change without notice.