The Disruptive Technology Myth

Categories Cloud Computing, Information Technology

via E-Commerce Times

Everywhere you look, the SaaS cloud is being pegged as a “disruptive” technology. Many think that if a solution is “in” the cloud, it is automatically disruptive. Providing something virtually is NOT disruptive; cloud computing is not the disruptor. The real disruptor is how you use it, why you use it and where you use it.

“Disruptive” technologies do not destroy industries — they may, however, create new ones. Whether we like it or not, we are in a constant state of flux. The technology industry, just like any industry, is incredibly dynamic and changing — and with change, comes opportunity.

PC World’s Dan Tynan gets it. He called out “The 10 Most Disruptive Technology Combinations”. … There needs to be a “two-part punch” to really disrupt the status quo. Industries evolve based on new technology, but the real test is how companies use the technology to change their delivery model and sales structure. …

Hacking Network Printers

Categories Hacking, Information Technology, Programming, Security

via ironGeek.com

Hack a printer you say, what kind of toner have you been smoking, Irongeek? Well, I’m here to tell you, there’s more that can be done with a printer to compromise network security than one might realize. In the olden days a printer may not have been much of a concern other than the threat from folks dumpster diving for hard copies of the documents that were printed from it, but many modern printers come network aware with embedded Operating Systems, storage and full IP stacks. This article will attempt to point out some of the more interesting things that can be done with a network based printer to make it reveal information about its users, owners and the network it’s part of.

Some of this article may seem a little Black-hat as it concentrates more on the breaking-in than the keeping-out. However I feel this information will be useful to system administrators and auditors so that they know what sorts of things to look out for when it comes to network printers. If you want more advice on how to lock down your network printer visit your vendors web site. A guide from HP is linked at the bottom of this article for your convenience. If nothing else, this article may get you thinking in the right direction.

For my tests I will mostly be using a Hewlett-Packard LaserJet 4100 MFP (Fax/Printer/Copier/Scanner), an HP JetDirect 170x and a HP JetDirect 300X (J3263A) but I will also touch a bit on the Ricoh Savin series of printers lest you think HPs are the only network printers with security problems.

Much of this article will read like a huge brain dump, sort of disorganized and hazy like my mind. It all started as a project for Droop’s Infonomicon TV and it snowballed from there with no specific direction. Bear with me as I clean it up and other folks send me new additions and suggestions to make this article more useful.

The most recent version of this article can be found at: http://www.irongeek.com/i.php?page=security
/networkprinterhacking

Chrome Passes Safari

Categories Browsers, Chrome, Google, Google News, Information Technology, Safari, Web Development

via Website Magazine

Web analytics provider StatCounter is reporting that Google’s Chrom browsre has overtaken Apple’s Safari in the US for the first time. Research is from the firm’s StatCounter Global Stats report for the week beginning June 21.

Chrome with 8.97% took third place in the US browser market ahead of Safari with 8.88%. Microsoft’s Internet Explorer still dominates the US Internet browser market with 52%, followed by Firefox (28.5%).

“This is quite a coup for Google as they have gone from zero to almost 10% of the US market in under two years,” commented Aodhan Cullen, CEO, StatCounter. “There is a battle royal going on between Google and Apple in the internet browser space (Chrome v Safari) as well as in the mobile market (Android v iPhone).”

The data is based on an analysis of 3.6 billion page views (874 million from the US) for the week 21 to 27 June 2010 collected from the StatCounter network of over three million websites

FTC Puts Social Nets on Notice With Twitter Smackdown

Categories Information Technology, Security, Social Media, Twitter

via E-Commerce News

The FTC has settled its beef with Twitter over the service’s security practices. Twitter will go on a probation of sorts, and some conditions of the arrangement will remain in effect for 20 years. The charges originated when hackers took advantage of weak passwords the site had been using and gained administrative privileges that enabled them to control accounts and read private messages.

Twitter has agreed to settle Federal Trade Commission charges that it deceived consumers and put their privacy at risk by failing to safeguard users’ personal information, the FTC announced Thursday.

In what was the agency’s first such case against a social networking service, the FTC charged that serious lapses in Twitter’s data security Planning for the next peak season? Ensure your website is fast, secure and available 24/7. Click here to learn how. practices allowed hackers to obtain unauthorized administrative control of Twitter, including access to nonpublic user information, tweets that users had designated as private, and the ability to send out phony message from any account — including one belonging to Barack Obama, who at the time was the U.S. President-Elect…