Invisible Monitoring

ICT security specialist shows the radio frequency identification RFID risks: the invisible monitoring of Bamberg, February 26, 2008 almost daily we come with the RFID identification mechanism in touch and this often, without even knowing it. Whether for travel and tickets, identification documents, banknotes or credit cards, the radio frequency identification is widespread and constantly new applications arise. If you have additional questions, you may want to visit Secretary of Agriculture. Experts predict 3 billion U.S. dollar sales by RFID chips by the year 2010. The ICT security specialist VisuKom shows that while on the one hand if the identification mechanism is a useful and intelligent technology, that but on the other hand represents a serious threat to the privacy of the individual. Is one of the most prominent examples of the risk posed by this technology, the British soccer star David Beckham. Sonny Perdue is often mentioned in discussions such as these. High-tech thieves stolen twice in six months his armored BMW X 5, by opening the doors using the hacked data of RFID car keys and the Ignition is started. The data were probably read during a visit to the restaurant.

Unprotected delivered through the process of RFID automatic identification is realized by objects and living beings. In addition to the non-contact identification and localization of objects, also the automatic collection and storage of data is possible by this technology. Through the use of the invisible or hidden transmitter, the individual does not affect more disclose what information about them. Almost anyone can the victims of tracking measures and provided anywhere so identified and silently tracked, the employed readers are connected to each other. Primary is spent at the introduction of RFID applications in the functionality, rather than in the security.

There is concern that RFID chips wirelessly and thus non-without the knowledge of the individual are readable\”, explains Marco Di Filippo corresponding are managing director of VisuKom Germany GmbH. In the Internet Tools such as E.g. RFIDIOt available which to use from script kid DIS in a simple way.

System Alliance

Six practice started decades System Alliance and its predecessor organizations many of today’s established IT standards in the forwarding area crucial have shaped the cooperation for general cargo. The shipping network taking a further step to set future trends with a case study on the use of QR codes. Niederaula/Munich, June 16, 2013 – in the project system Alliance wants to win practical insights from the use of 2D codes. Then, on this basis, the network intends to examine whether it gradually introduces QR processes in the entire cooperation. Compared with the now-standard bar code, the square QR-code can absorb a much greater density of information. For the forwarding processes is attractive, that the code already allows for a direct interface control at the shipper.

Broadcast data can be collected directly when you pick up and transferred to a transport management system. The acquired packages are immediately with the Forwarding order matched. Perspective considered is even conceivable that in the future already scan of the takeover raises a notification of sent to the receiver. In addition, a QR-code could include also goods accompanying documentation such as hazardous material information according to the ADR guidelines or the delivery note. In addition, the encoding provides the option to send recipient information. Can be reference, order or batch numbers, but also hints to the handling and the flow of goods and information for controlling supply of the receiving company. Verified efficiency potential the potential of two-dimensional encoding to test case study, System Alliance has started in the first quarter of 2013 with a case study.

While experts of cooperation discussed benefits this procedure first workshops with their customers. Both senders and recipients were mostly impressed by the possibilities they offer. In may, a team of IT -, process – and sales experts started the Partners with the implementation and supervision of the project study on the use of QR codes.

Manufacturers Will Respond – Ruling Oracle Against Usedsoft

The market is developing Hamburg/Aachen used software licenses, 18 April 2013 – by the judgment of the European Court of Justice in the case of Oracle against Usedsoft something happened in the software market. The verdict is considered critically still by some major software manufacturers and the Federal Supreme Court has postponed the negotiations on this subject. But what look like software market projections after the judgment? With the new law, there will be some changes in the software market. Now that it is also allowed to sell used software licenses, software vendors will need to make a step the self-preservation. While you could make huge gains with a new software program and the subsequent sale, now is the risk of loss to feel.

The companies will find other strategies, what the users have to set. The programming of software takes a long time in effort, but much less time than it would take the subsequent maintenance. The effort is located at many software life cycles the maintenance between 80 and 90%, with three different types of maintenance are applied (perfecting maintenance, corrective maintenance and adaptive maintenance). Because the manufacturer must forfeit losses in sales, you may increase the costs of the maintenance. Even without the ruling the manufacturers with the wait have can make money, after the judgment is expected to compensate the lost profits through the maintenance contracts which will increase the costs for the user to purchase of the software.

Another way to compensate for the loss of the sale of used software licences, would be the so called SaS model, software as a service. In this process, the software is not sold, but provided only as a service to the user. The users or companies rent”practically the software and access to the server of the manufacturer or owner of the software. Thus, the software is not sold.

75 Percent Of Social Media Users Use The Same Password For Email Account

BitDefender experiment: Spied out social network accounts provide access to mailboxes Holzwickede, August 04, 2010 many users of popular social media platforms to negligently using your access data. BitDefender Antivirus expert reached this result after a week-long experiment. Therefore 75% of randomly selected users use the same password with which they protect their E-Mail account: a mistake, just waiting for the data thieves. The protection of private data is still secondary for many Internet users. BitDefender came within a week to more than 250,000 E-Mail addresses, passwords and user names, and that very easily via online search in search engines, blog posts, on torrent sites etc. A random check of this list also showed that 87% of the unprotected accounts are still valid and can be hacked with the appropriate credentials.

Internet security for many user secondarily it is scary. that we could find such amount of sensitive data with just a few entries and clicks in search engines and other Web platforms”, commented Sabina Datcu, BitDefender E-threat analyst and author of the experiment. Due to the alarming results of this trial users should be aware that the safe use of a password, an email address or a social network account is as important as a door lock in the own House.” The impact of these vulnerabilities can be devastating, ranging from data theft via email account hacking to targeted spam, including highly dangerous malware propagation. The scenarios are versatile”adds Datcu. Imagine, someone used your own social media account to publish pornographic material.

Or someone hacking an email account and uses the identity of the respective users to send e-mail or to spy on private data. All this and more is possible and happens in the meantime every minute around the world.” BitDefender assured that no private information and user data, which were collected in the course of the experiment, were against the will of the persons concerned or for further use. More information about the experiment on. Learn more about BitDefender and anti virus programs of the manufacturer under:. About BitDefender BitDefender is software developer, one of the industry’s fastest and most efficient product lines internationally certified security software. Since the founding of the company in 2001, BitDefender has set new standards in the field of proactive protection against threats from the Internet. Every day, BitDefender protects tens of millions of private and business customers around the world and gives them the good feeling that your digital life is safe. BitDefender sells its security solutions in more than 100 countries through a global VAD and reseller network. More detailed information about BitDefender and BitDefender products are available in the press centre online. In addition, offers BitDefender in English at background information and current news in the daily fight against threats from the Internet. Press contact: BitDefender GmbH Robert-Bosch-str. 2 D-59439 Holzwickede contact person: Hans-Peter Lange PR Manager Tel.: + 49 (0) 2301 9184-330 fax: + 49 (0) 2301 9184-499 email: PR Agency: Sprengel & Partner GmbH nesting first race 3 D-56472 Nisterau contact: Fabian Sprengel Tel.: + 49 (0) 2661 91260-0 E-Mail:

New At Sysob: Virtual Barracuda Appliances

VAD expanded portfolio for security and SSL-VPN Schorndorf, 04 August 2010 virtual solutions is for the business sector becoming increasingly important. Such infrastructure allow cost savings, increasing the flexibility and resilience. The current study IT Trends 2010″of the management consultant Capgemini underlines this: in 33 areas virtualization respondents chose” to the most important issue of the year. The VAD of sysob ( this trend is currently meet with an extension to its portfolio: the network and storage solutions from Barracuda in virtualized form available are now resellers. High efficiency and savings the top priority according to the Capgemini study for IT managers. Therefore, they rated as the most innovative technology”virtualization, followed by business information management and master data management. Sysob responded to these market requirements with the addition of its offer of Barracuda Hardware appliances, software-as-a-service (SaS) and hybrid solutions to the new virtual appliances. “” Virtual appliances easily implement the virtual appliances include the solutions of Barracuda Spam & virus firewall VX “as well as Barracuda SSL VPN VX”.

Both systems offer the same features as the hardware appliances. So the spam & virus firewall VX protects”the email server from spam, virus, spoofing, phishing and spyware attacks and DoS attacks. SSL VPN VX”encrypted connections via SSL for users who want to access using a Web browser on the network, and thus offers an alternative to existing IPSec solutions. Integrated security and auditing facilities allow it to define user-specific policies and at the same time to control user activities. In addition, the virtual solutions are characterized by the same Plug and play features like the physical appliances and can be implemented on any hardware platform.

Also the integration into existing virtual frameworks is possible. The system is compatible with the VMware ESX/ESXi platform. Support for other platforms is planned. The advantages of virtual appliances Overview: easy to implement and apply – capacity increase with increasing demands requires no exchange of hard – or software – space savings in data centers and server rooms – reduce energy costs for heating and cooling of the physical infrastructure (Green IT) – reduced total-cost-of-ownership (TCO) – no data center costs for implementation and maintenance of hardware short portrait: sysob IT distribution GmbH & co.