Aug 05

Several Details for Enterprise Security That Should Not Be Overlooked

We can’t put too much emphasize on enterprise network security and information security, because when you read this article, in the world, many companies are experiencing incidents huge economic losses or some even close down because of information leakage. This article hereby summarizes several protect information security have to pay attention to details, I hope you gain much after reading this article and become experts in information protection.

 

First of all, printer / fax machine is indispensable business office equipment. Printer / fax machine can bring convenience to the enterprise, but also can cause a fatal blow to the enterprise – the delay of printer / fax machine may cause confidential information leakage.

 

In a company, there is always the replacement of old and new employees. As a new employee, if he/she can browse resigned employee’s computer, and it is certainly of great benefit in understanding the new company. Such as the company’s customer records, rewards and penalties regulations, payroll, and even the important data which can only be known by specific individuals can also be seen. As business executive, network management, make sure whether there is any information that should not be known by new employees in the computer before turning over it to the new employees.

 

In addition, file sharing can greatly increase the efficiency for the staff. But someone will always carelessly disclose important information to each other when sharing files. Sometimes someone even snoop into the shared information. In order to avoid irrelevant people from peeping at the shared folder on the LAN, you can password protect the shared folder and then configure the relevant access permissions to specific people.

 

E-mail is a transit point for employees to steal information. The way of transferring company information by e-mail to steal company information accounts for 80% of information theft. Many companies do not install floppy, CD-ROM drive, USB port, but still cannot prevent employees stealing information by e-mail. Fortunately, there is a variety of e-mail monitoring software that can assist enterprise executive to monitor employees to send and receive e-mail. Therefore, in order to protect information security, and motivate employees to properly use e-mail, corporate should deploy e-mail monitoring software.

 

The data corrected by new employees in the first week is usually five times as many as which at the ordinary time. In this week, he/she can leave at anytime; he may crazily copy and transmit company’s data if he wanna steal these data for illegal purposes.

Jul 29

Automobile is Unsafe: the U.S. Hackers Will Publish Intrusion Method This Week

Two U.S. security researchers will announce the methods of network intrusion of the Toyota Prius and Ford Escape at Def Con hacker conference announced this week, hoping to attract more researchers to participate in the relevant projects.

 

Car hacking is not a new field, but the information has been kept secret to the outside. However, this situation may change, as Charlie Miller and Chris Valasek, these two well-known hacker said that they will release a detailed roadmap to facilitate outside to learn how to intrude Toyota Prius and Ford Escape critical systems through 100 pages of white paper.

 

Miller and Valasek are “white hat” hackers; their main purpose is to disclose the vulnerabilities before criminals make use of them. They will also release the software which can be used in this week’s Las Vegas Def Con hacker conference released for invasion of these two models of the software.

 

They said it has developed a number of ways to force the Toyota Prius to brake when it is in the speed of 80 miles (about 128 km), plays the steering wheel or the engine suddenly accelerates.

 

As the intelligence director of the security consulting firm, IOActive, Valasek is known to the public because he found out many loopholes of the Windows operating system. He referred to the two holes and said: “Think about it: If you are approaching to the crowd, what will happen.”

 

But the reality may be not so horrible as it sounds.

 

To exploit these vulnerabilities, these two researchers will be sitting in the car to directly connect to the network of car with a laptop computer. Therefore, the information they published won’t be used in remotely network intrusion, and this is major attacking method in the real world.

 

They hope their data to be released to encourage other white hat hackers continue to look for more car security vulnerabilities, and then fix them.

 

From the report above, we can realize how unsecure the electronic control is. Even though the electronic control can enhance the traffic safety and efficiency, it also brings about more challenges. Hackers will break in any computer as long as they master relevant skills. For almost all individuals and groups, one of the most important things is data and information, which can be considered as great fortune to people. So, try to password protect folder contained important and confidential data and information with encryption solution, and then you can add one more protection for your fortune. When you lock folder/file in your computer, you can be at ease even though hackers or malware intrude your computer.

Jul 22

Apple: Developer Center Downtime Results From Hacker Attacks

In July 22, Apple has just released a statement, explaining the Developer Center downtime events since last Thursday. The company said that its security system is compromised, the intruder may have stolen some of the developer’s name, mailing address and e-mail addresses and other personal information, but the user information is not stolen.

 

Apple is hoping to notice developers who may be affected. In addition, due to the intrusion event, Apple also decided to completely revised developer system, including updating the server software, and rebuilding the database and so on. This could also explain why the downtime lasted four days.

 

Apple expects the developer website will soon recover. The company’s statement reads as follows:

 

“Last Thursday, an intruder attempted to secure personal information of our registered developers from our developer website. Sensitive personal information was encrypted and cannot be accessed; however, we have not been able to rule out the possibility that some developers’ names, mailing addresses, and/or email addresses may have been accessed. In the spirit of transparency, we want to inform you of the issue. We took the site down immediately on Thursday and have been working around clock since then.

 

In order to prevent a security threat like this from happening again, we’re completely overhauling our developer systems, updating our server software, and rebuilding our entire database. We apologize for the significant inconvenience that our downtime has caused you and we expect to have the developer website up again soon.”

 

Apple’s subsequent verify to the IT website Macworld that the incident did not result in any disclosure of user information. The company spokesman said that all user information is securely encrypted; the intruder couldn’t come into contact with the application code or message server storage applications. But the company declined to reveal whether the government agencies are investigating this issue.

 

For every company or group, the company secrets or the confidential data and information are the most important fortune for them, so almost all companies or enterprises are focusing on data security, they choose to encrypt folders contained confidential and important data and information. Therefore, the data cannot be breached even though the computer is broken in by hackers or other malware or virus, for the folder is protected by the encryption resolution so nobody can access to it without correct password. Locking shared folder and configure different access permissions to different people can effectively protect shared data on the LAN.

Jul 15

Who Can Control The Data Security?

With the continuous development of scientific and technological, the popularization and application of computer technology is also updated at an alarming rate. Meanwhile, the attendant problems about computer system vulnerabilities result in a serious interference for majority of computer users. Especially in recent years, as computer vulnerabilities are constantly being maliciously used, its dangers are constantly upgraded.

On July 9, some Windows systems users was hacked, and a number of media reports that hackers took advantage of the vulnerability illegally released by an engineer in Google without notification to Microsoft.

 

For this hacker attack, Microsoft did not provide details, but said hackers launched a “purposeful attack”, which generally refers to the government’s or corporate clients’ Windows computer were attacked, and hackers majorly aim at obtaining confidential information for the purpose.

Regardless of users are using Microsoft’s Windows system, or Google’s Android system, some elements of system security should be taken into consideration.

First of all, using a firewall or router to help users protect their system is a good idea.

 

Second, updating security patches. Although in many cases, before deploy the patches to the production systems, the test can be extremely important, but ultimately the patches must be deployed to the system. If the patches don’t update for a long time, your computer may well easily be the target of unscrupulous attackers.

 

Third, using data encryption, for the attention of enterprise data security system administrators, there are different levels of data encryption available, choose one solution of folder/file encryption to protect the data and information to meet the enterprises’ need. Effective data encryption can help the administrators to secure folder/file on the LAN.

 

Fourth, protecting your data by backup, data backup is used as the most important way to avoid disaster. Enterprise administrators can set directory or drive in the local, when the local file changes, the file will automatic backup in accordance with the chronological order of release management, so that users can always check backed up files.

 

No matter business or personal, the user’s data security should not be trampled by anyone. Only picking up the information security tools, grasping security autonomy, can we calmly face the dangers of such dispute!

Jul 08

Analyze American New Thinking of Information Network Security Through the “Prism”

“Information is power, but, like all other kinds of power, someone wish to take this power for their own.” This is the warning from famous American hacker Aron Swartz who left it home before committing suicide warning five months ago.

 

Internet originated in the United States, the current terminal server still lies in its hands. But the United States has always liked to play as the victim of cyber world, Snowden, such a nobody, exposed scandals, “prism” monitoring event really showed the “American” hypocrisy. From the Bush era, the U.S. intelligence agencies have processed to data mining work in nine U.S. Internet companies, including the audio, video, pictures, e-mail, documents, and personal connection information contact analysis and action. There are ten types of monitor categories: information and e-mail, instant messaging, video, photos, store data, voice chat, file transfer, video conferencing, login time, the details of social network data, including two secret surveillance program, the one is monitoring, monitoring public telephone call records, the other is to monitor public network activity. Former CIA officers, Edward Snowden revealed government crimes of violation of user privacy, causing panic in the world, and even U.S. allies have been accused of this.

 

Internet popularity provides information dissemination with the cheapest and most effective means, which also offer a unique tool to spread American values, affect the political situation in some countries. For all this, in the past few years, former U.S. Secretary of State Hillary Clinton has been working hard to promote their political idea of “Internet freedom”, hoping to promote a set of values and political ideas that U.S. government insisted on to the Middle East and some countries that are not friendly to it with the help of cyberspace which is completely under the control of the U.S..

 

The U.S. government and the military issued a series of documents and assessment report about information network security in recent decade. In these policy documents, there has been a lot of discussion about network security strategy and tactics which puts forward some new concepts, develops new idea about information network security. There is one tip in these new ideas- cyberspace blurs the boundary between militarization and civilian applications, and cyber warfare becomes an important direction of future military transformation.

 

From this, we can say these tactics is a two-sided sword which will invade personal privacy and threaten the legitimacy of “Internet freedom”. As the general citizen, we should know that our data and information in our own computer is not that safe at all, we should consider applying more secure method to protect the information in our computer. Encrypting the folder contained confidential data will decrease the threat from attacks of hackers or malware. You should protect your data with folder locker, so the encrypted folder will not be accessed by unauthorized users.

Jul 01

HP Recovery in Progress: Whitman Still Faces Challenge to Reach Victory

From the big data platform to the cloud computing operating system, from Android desktop computer to the printer, Hewlett-Packard launched a large number of new products in this “World Tour”, and these new products is no longer a follower, but have more new technology .

 

The first is its private, hosted and public cloud offerings, HP also announced the next generation of common architecture based on OpenStack. The followed are HP OS and CloudSystem Enterprise starter kit, along with new servers, tape libraries, 3P storage new products, HP comes up with a holistic solution.

 

This is Whitman’s “IT new forms”, she thought that “cloud computing, security, big data and mobile computing is changing this era,” and HP’s strategic goal is to allow the company to deal with this new form.

 

Last quarter, HP’s PC market share in China reached 7%, which is HP  new high after the incident of 315, and the in the aspect of printer, HP launched competent products which can come up with that of other major competitors such as Epson.

 

One of the outstanding products is a brisk 21-inch screen Android desktop computer, which is the first desktop computer with Android system in the industry. Apart from the market feedback, the action of launching this product itself is meant innovative.

 

Here, we may say now the competitions are almost around science and technology, and the rapid development and generation shift of electronic products makes computer, mobile phone and other scientific and technology products become one dispensable part of our life. At the same time, the data security is the attendant result the hi-tech society brings to us, we may always worry about the security of data and information stored in the computer, for they are easy to store, transfer and be stolen. When we enjoy the joy and convenience the science and technology offer us, we should protect our important data by locking file/folder for the data will be leaked via the Internet. With password protection of file/folder, the data and information will be under strict control by you yourself.

 

Even the furious competition of PC in the market, Whitman believes that “HP has started to recover,” and the iconic feature is the company concluded an internal adjustments.

 

Cite the case reported by Forbes for Whitman, after the failure that HP competed with Dell for Microsoft Bing server orders which worth $ 350 million, Whitman directly call Microsoft CEO Steve Ballmer, asking him outspoken how HP can do better. When Microsoft gave her a memorandum, HP spent one year enhancing their products, and in January of this year, HP beat Dell in the Bing order of $ 530 million.

 

But now what Whitman faces, is still an uncertain IT environment. EMC, IBM and even DELL are actively respond to the enterprise market, while Microsoft, Oracle began the transformation of cloud computing, HP’s software division has been considered a core competency, but the status that IBM are beginning to lay off increases the difficulty of HP recovery.

 

 

If HP’s recovery process is divided into two steps, which Whitman is now helping companies stopped the downward trend is the first step, and the second stage will be more difficult.

Jun 17

Prism: U.S. Use it to Monitor Netizens

Last week, former CIA employee, Edward Snowden’s leakage issue is called as reality version of American movies, handsome agent, glamorous pole dancing girlfriend, sophisticated state secrets, betrayal and exile, the agents system and lies, complicated Hong Kong, depressed black president, conflicts between personal privacy and national interest …… various elements are available, and some even have entitled: “Leaker: Snowden.”

This project is called “Prism” which means secretly use super software to monitor Internet users and telephone records. Now, the debate concerning that Snowden is a hero or a traitor is still in progress, Snowden’s whereabouts is still pending. Apart from these troubles and view companies and industries involved, their interests, gain and pay are a relatively clear picture.

According to Snowden, Google, Yahoo, Microsoft, Apple, Facebook, AOL, PalTalk, Skype, YouTube, etc. nine companies have been involved in espionage allegations, these companies are suspected of being involved in the issue that opening their servers to U.S. National Security Agency, which makes the government easily monitor millions of netizens mail, instant communication and data accessed.

Subsequently, these companies strongly denied the charges. But by June 14, Facebook, Microsoft admitted that the U.S. government indeed ask them for user data, and published some of the information and data content in order to get rid of quagmire as soon as possible.

 For this case, all of us, no matter individuals or groups, should turn our attention to potential information security threats. We should be aware of the security of private information and confidential data. For example, never fill your detailed information and private information in any forum, social network so that you will be less likely to be tracked through network by hackers. As for the data and information stored in the computer, their security is also an important matter that we should focus on, for once your computer are connected to Web, your computer becomes a totally open device which allow others to access your computer as well as you to contact the world. However, in this case, you cannot ignore the importance of data security, otherwise, data leakage and breaches will put you into troubles. Applying third party software to password protect files/folders stored in computer, and then they won’t be accessed unless entering right password, what’s more, the administrators can configure different access permissions so different people will have different right for the protected files/folders.

 

Actually, many people have noticed the importance of data security. For example, the forthcoming cloud computing standards will likely pay more attention to security issues, which will offer local production of hardware and software, system integration and cloud computing platform provider greater development space.

Jun 04

Top Hot Ultra-book

In this rapidly developing mobile electronic age, who can firmly grasp hot point, break the convention, who can get caught the attention of consumers? Over most of the year, the direction of development will continue to be variability and touch function. This can already be seen in the last year, capacitive multi-touch screen from the original tablet PCs and smart phones, steps into the ultra book. A number of products have realized the 2-in -1 of tablet computer and ultra book through morphological changes.

Touch-screen laptop should make many changes in products form and design because of the change in interaction, so we see a lot of ultra-book which is able to flip, rotate, slide and even be detachable. The designer emphasizes on how to solve the convenience and safety of touch-screen interaction, which is not be considered before.

Now, I will introduce some types of hot ultra book as below.

LenovoYoga13-IFI

Lenovo Yoga13-IFI (daylight orange)

Operating system

Windows 8

Motherboard chipset

Intel QS77

CPU model

Intel Core i5 3317U

Memory Capacity

4GB

Hard drive capacity

128GB

Hard to describe

SSD Solid State Drive

Screen Size

13.3 inches

Screen Resolution

1600×900

Screen description

Capacitive multi-touch support ten-point touch, IPS wide viewing angle screen

Graphics chip

Intel GMA HD 4000

Webcam

Integrated 1.0 mega pixel camera

Wireless network card

802.11b/g/n wireless protocol

Bluetooth

Support, Bluetooth 4.0 module

Notebook Weight

1540g

Case Description

Sunlight Orange

 

Asus: TAICHI 21

Asus TAICHI 21

Deformation

Dual

Operating system

Windows 8

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Memory Capacity

4GB

Hard drive capacity

256GB

Hard to describe

SSD Solid State Drive

Screen Size

11.6 inches

Aspect Ratio

16:9

Screen Resolution

1920×1080

Screen description

Capacitive multi-touch support ten-point touch, IPS wide viewing angle screen

Graphics chip

Intel GMA HD 4000

Webcam

Integrated 5 megapixel camera

Data interface

2 × USB3.0

Battery Type

Polymer battery, 3500 mA

Notebook Weight

1250g

Shell material

Magnesium alloy

Case Description

Silver

Acer:S7

Acer S7-191-53334G12ass

CPU model

Intel Core i5 3337U

CPU frequency

1.8GHz

The Process

22nm

Memory Capacity

4GB

Hard drive capacity

128GB

Screen Size

11 inches

Screen Resolution

1920×1080

Backlight Technology

Backlit FHD

Screen description

Capacitive multi-touch

Graphics chip

Intel GMA HD 4000

Webcam

Integrated camera

Data interface

2 × USB3.0

Reader

Multi-in-1 card reader

Keyboard Description

Backlit keyboard

Battery Type

4 polymer battery, 4680 mA

Notebook Weight

1248g

Samsung : 700T

Samsung XE700T1C-A01

Operating system

Windows 8 (64bit)

CPU family

Intel Core i5 3-generation family (Ivy Bridge)

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Supreme Turbo

2600MHz

Bus Specifications

DMI 5 GT / s

Memory Capacity

4GB

Memory Type

DDR3

Hard drive capacity

64GB

Screen Size

11.6 inches

Aspect Ratio

16:9

Screen Resolution

1920×1080

Card type

Core Graphics

Graphics chip

Intel GMA HD 4000

Data interface

1 × USB3.0

Video Interface

Mini HDMI

Keyboard Description

Keyboard Dock

Shell material

Composite materials

Case Description

Black

Toshiba : U920t-T06B

Toshiba U920T

Operating system

Windows 8

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Memory Capacity

8GB

Hard drive capacity

256GB

Hard to describe

SSD Solid State Drive

Screen Size

12.5 inches

Screen Resolution

1366×768

Card type

Core Graphics

Graphics chip

Intel GMA HD 4000

Bluetooth

Support, Bluetooth 4.0 module

Data interface

USB2.0 + USB3.0

Video Interface

HDMI

Notebook Weight

1520g

 Lenovo :ThinkPad S230U

Lenovo ThinkPad S230u Twist (33473QC)

Operating system

Windows 8 Professional edition 64bit (64 of professional edition)

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Memory Capacity

4GB

Hard drive capacity

24GB +500 GB

Hard to describe

Hybrid hard drives (SSD +7200 rpm HDD)

Screen Size

12.5 inches

Aspect Ratio

16:9

Screen Resolution

1366×768

Screen description

Capacitive multi-touch, support for five-point touch, IPS wide viewing angle screen

Graphics chip

Intel GMA HD 4000

Data interface

2 × USB3.0

Video Interface

Mini HDMI, Mini DisplayPort

Notebook Weight

1580g

Sony : Duo 11

Sony D11217CCB (Metallic Grey)

Operating system

Simplified Chinese version of Windows 8

CPU model

Intel Core i3 3217U

CPU frequency

1.8GHz

Memory Capacity

4GB

Hard drive capacity

128GB

Hard to describe

SSD Solid State Drive

Screen Size

11.6 inches

Aspect Ratio

16:9

Screen Resolution

1920×1080

Backlight Technology

Backlit FHD

Graphics chip

Intel GMA HD 4000

Bluetooth

Support, Bluetooth 4.0 module

Data interface

2 × USB3.0 (one powered USB powered common interface)

Video Interface

HDMI

Notebook Weight

1305g

Thickness

17.85mm

Shell material

Magnesium alloy

Dell : XPS 12

Dell XPS 12 (XPS12D-1508)

CPU model

Intel Core i5 3317U

CPU frequency

1.7GHz

Memory Capacity

4GB

Hard drive capacity

128GB

Hard to describe

SSD Solid State Drive

Screen Size

12.5 inches

Aspect Ratio

16:9

Screen description

Capacitive multi-touch

Card type

Core Graphics

Graphics chip

Intel GMA HD 4000

Webcam

Integrated 1.3 megapixel camera

Audio System

Built-in audio chip

Speaker

Built-in speaker

Microphone

Built-in microphone

Wireless network card

Intel 6235 AGN

Bluetooth

Support, Bluetooth 3.0 module

Data interface

2 × USB3.0 (one powered USB powered common interface)

Video Interface

Mini DisplayPort

Audio Interface

Headphone / microphone combo interface

Other interfaces

RJ45 (network interface), power connector

Pointing device

Glass touchpad

Keyboard Description

Anti-leakage keyboard, backlit keyboard, full-size keyboard

Notebook Weight

1520g

Length

317mm

Width

215mm

Thickness

15-20mm

Shell material

Magnesium alloy

Case Description

Gray

 

As the rapid development of computer, we have to recognize that computer has become one important part of man’s life. We use it for work, entertainment, and living, we may take it as transfer media, storage devices, etc., and meanwhile, we should pay more attention to our information security in computer. You’d better lock files/folders to prevent someone else will access and view your sensitive and confidential data and information without your permission. 

May 13

Count Ten Brands of Storage Devices

Not long ago, storage appliance was still a new concept. Now, there are hundreds of storage appliance products in market. According to Gartern’s statistics, the only market of backup devices will achieve 19% yearly growth before 2016.

And then I will introduce ten types of storage devices below.

Data Domain DD160

EMC Data Domain sells various data de-duplication devices. Data Domain DD160 is the entry-level product which can meet customers’ need of data protection on a unified platform. It supports most back-up and archival applications and it integrates with EMC Avamar and EMC Networker. Increasing another remote DD160 will provide your disaster recovery with remote copy function based on the Internet.

EVault

Evault provides EVault Plug-n-Protect Appliance and EVault Express Recovery Appliance series back-up and recovery products. They contain default hardware, store and software, which is designed for data protection of cloud connection. EVault Plug-n-Protect has the cloud copy function, while EVault Express Recovery Appliance is able to speed up data recovery by keeping local data cache for data backup.

The price of EVault Plug-n-Protect is between $17,995 to $10,995.

Asigra Cloud Backup Connector Appliance

It is based on Cisco Integrated Service Router Generation 2 and is equipped with Asigra software under private, public and composite backup environment. This equipment will enable users to protect all company data on local LAN or backup all the data to data center of ISP.

 

The quotation of Asigra Cloud Connector starts at $2695.

Astute ViSX

Astute ViSX series are based on Performance Storage Appliancesof SSD. It offers storage I/O speedup, this function will be applied to the existing storage system. It start at $32,000

Gridstore

Grid from Gridstore enables you to increase storage block based on requirement. It virtualizes storage stack and distribute it in a grid based on network. It can also optimize workload by virtual controller. These controllers can well adjust every I/O requirement of virtualized or non-virtualized workload.

 

HP StoreOnce 2600

HP StoreOnce Backup provices joint data de-duplication function, which is available in small branch offices as well as large DR recovery site. This product contains several series, in which 2000 series is entry-level product. The quotation of StoreOnce 2600 starts at $10,000.

Avere FXT 3800

Avere FXT 3800 is a compound edge file system device. It can automatically have layers in memory, SSD, SAS and SATA. Data block will be distributed based on data active level. It can be clustered into other FXT Edge file system device, and be extended up to 50 node. It starts at $112,500.

 Sepaton S2100-ES3

With configuration of version 7.0 software, Sepaton S2100-ES3 Backup and Recovery Appliance PBBA contains 8Gb/sec fiber channel、1Gb/s Ethernet and 10Gb/s Ethernet connections. It can absorb data with speed of 80TB/h. It is configured with calendar data storage array, which can encrypt data during idle time and de-duplication. The price of it starts at $355,000, and the encryption of it needs individual authorities.

Pivot3 HC-3 Healthcare Validated VDI

Combined with VMware、Teradici、Samsung and Imprivata, Pivot3 provides medical sevice providers with VDI based on equipment. It integrates all storage and sever hardware, desktop virtualization software, license management software and endpoints in device mode. Every Pivot3 VDI device supports up to 125 desktop.

Silver Peak Virtual Appliance.

Silver Peak VRX-2、VRX-4 and VRX-8virtual devices provide data acceleration function to speed up the process of copy. They adopt Virtual Acceleration Open Architecture of Silver Peak to solve the problems of WAN and quality. This software runs on the standard virtual machine manager which includes VMware、 vSphere、MS、Hyper-V、Citrix XenServer and KVM。

The price of entry-level product, VRX-2 with the configuration of 60GB/h and remote copy function, is $2,764 per year.

 

With rapid development of storage devices, we should also pay more attention and efforts to file encryption to protect the important or even confidential data and information from stealing and breaching.

Mar 15

Samsung Galaxy S4 Finally Comes out and Within Reach of People

For years, in the market of smartphone, Apple and Samsung have been competing with each other for the market share. Ever since the release of Galaxy S3, Samsung has made Android phone more adorable than any other phone could. On March 15, 2013, Radio City Hall was filled with people, at the same time at the heart of New York City in Times Square an even larger crowd waiting there. At the beginning of the release conference, a piece of video which is about the company’s Unpacked Event campaign, and people are wondering about what it is in the little boy’s box.

Samsung made a perfect secret keeping job before the real release of Galaxy S4, so that it left much more space for all kinds of guesses and rumors and made it the most awaited phone of Samsung. Recently, with the popularity of all kinds of smartphones, tablets and ultrabooks, people enjoy more freedom in data on the removable devices, while USB security issues or folder protection case becomes more and more important at the same time.

Finally, when the box was opened and all guesses and anticipated come into the eye of all people. It is proved that Samsung S4 deserves a highly praise whit its strong and powerful hardware and featured new features. It sports a larger 5-inch 1080p Full HD Super AMOLED display and come with a much smaller bezel, has 441 ppi. Other specs include a 13MP rear-facing camera and 2MP for front camera, 2600mh battery and thinner body.

Apart for the improved hardware, the highlighted features of S4 lie in the brand new updated user experience. Sound Shot, Drama Shot, Eraser, Air Views, S Translate, Adapt Display, Story Album, Home Sync, S Voice Drive, Smart Switch, Group Play, Air Gesture and other special features make Galaxy S4 a perfect smartphone also brings people more convenience in use.  There are more chance for people to access the digital files on phone or computer, which also pose your files and folders to dangers and risks of data leakage, therefore, you need to lock files on your smartphone or PC.

Also, some people think that S4 is much like the previous S3 in appearance. There are a large amount of people talking about the disappointment about the new Samsung phone. But there are still space for improvement. We cannot deny that the development of technology keeps presenting surprise and changes to people’s life, from the original computers, phones to the recent advanced software and apps, such as USB flash drive copy protection application. Maybe this time you are not so satisfied with a single technology, more or less time will tell you about the reality. We can just anticipate for the next new product or new invention to enter our life.