Feb 25

Google Chromebook Pixel: Amazing Product With HD Touch Screen

Ever since the release of Google Chromebook Pixel, it has become a focus for people from all walks of life. As a stunning computer, Chromebook Pixel has solid and powerful hardware and comparing to MacBook it is also neat in appearance and strong in performance. As the major competitor for Apple MacBook, Google Chromebook Pixel was expected by lots of people before it’s released although Chromebook have been a simplicity-focused react to Windows computers. There is a tendency that Chromebooks should have dead because they are netbooks with lower cost.

The fact is that this type of PC has less starting times and more secure protection for files and data in the hard drive especially for people wants to lock files and important information. The Pixel is capable to impact MacBook with its two strong points that the latter do not have: HD touch screen (2560*1700 pixels) and application of 4G technology. While, Pixel has the attractions in function may not win back customers’ hart on the condition of the starting selling price of $1,299 which is apparently not so competitive.

The high-resolution display is an interesting element of the Pixel, while currently majority of the web was not made for it. And touch screen is also not a necessity for most PC users, but it can help to lead the whole world of computer into a new world where touch screen and HD display are the mainstreams. The progress for all technologies is hard to predict but people can experience it through constant trying, just like people find the way to lock USB drive disk and other files on computer to ensure data security, which is hard to image at the beginning of invention of USB flash drive.

Google Chromebook Pixel features a 12.85-inch display (2560*1700 pixels) with 239 pixels per inch which is the highest among all laptops in the market, according to Google. An Intelsat Core i5 processor, 4GB of RAM, 32GB solid state drive and 1 TB free cloud storage for 3 years which is rather attracting. But you will find that this machine which has all advantages of laptops is just a Web browser which is named Google OS.

Maybe this is just an exploration for its expansion of Google’s kingdom and a try for the future retail and marketing. The evolution of the technology world is also full of such explorations, and it is hard to tell too soon about the recent development of a single product.

Feb 19

Network Vulnerability: Thousands of Devices is Faced with Danger of Hacker Attack

Routers are one of the most widely used devices for people with the need of sharing their network and gain more convenience in using the network. Nowadays, routers and other network devices are the roots of attacks from hackers and other cyber criminals because of their adoption of Plug and play technology. As the occurrence of hacker attack and illegal use of the network people now value their privacy and folder encryption than they ever had.

According to a recent report from international media that network security software company Rapid7 is going to release a white paper which contains the content that most of the network technologies used in the market now leave networks vulnerable and then result in hacker attacks on thousands of personal computers, printers and storage devices in normal network environment. These attacks usually cause serious consequence for people’s private life and working staff. Comparing to USB security issues which are easy to control attacks from network devices are random and unpredictable so network vulnerabilities need more attention.

Computer routers and other network devices is the root for exposing users’ equipments to the danger of attacks from hackers and cyber criminals owing to the using of Universal Plug and Play, UPnP technology which enables the network to recognize and communicate external equipments faster, which save the time for network debugging greatly.

In this white paper, Rapid7 pointed out that their researchers have figured out 3 independent vulnerabilities from UPnP technology standard and these vulnerabilities result in 40 million to 50 million devices which include some well known brands such as Belkin, D-Link and Linksys etc. all around the world are vulnerable to attack.

If you want to make sure your sensitive files and folders in your computer or a USB drive disk free from the annoy of being breached or copied without any permission you can use a special data protection or USB copy protection software to safeguard your confidential information. But how about data protection threats result from vulnerabilities in network devices? According to the study of Rapid7, hackers may take advantages of the existing security vulnerability and get your highly classified documents, steal password, gain the total control of your PC or obtain remote control of the web cameras, printers and security systems.

Rapid7 recommended that if a company or consumer suspects his or her devices are at the danger of vicious attack then close the UPnP function in time and Rapid has released a tool on their web to help their customer to scan for potential security vulnerabilities in their routers and related devices and products.   

 

 

Jan 25

Privacy Leakage are Serious in Bank, Tenement and Telecom Area in Hong Kong

It is reported that according to Office of the Privacy Commissioner for Personal Data, Hong Kong with more and more residents attach more importance to privacy protection, these years the office has experienced a rising number of citizens who make queries to them. Last year alone, they received a total number of 19053 queries, which increased for 2 per cent. These complaints mainly involved in some private institutions, which refer to bank, tenement and telecom companies.

The fact is that, people now value their privacy more than they ever had before, that is not hard to tell from the number of people who using file and folder encryption and other data security software to safeguard their online and offline activities.

Last year the Office has received 1213 complaints, decreased about 18%, comparing to the former year (2011) which is 1486. Among all the complaints, the public or governmental organizations occupy about 1%, and the field that received the most complaints are police, housing, medical care and social welfare areas. There are about 50 privacy leakage relate to the government sectors incidences which more or less surprise the public.

About students in school, they often use USB drive disk to store files and studying materials, so that they value USB security very much, while how about the protection of personal information they put online. The fact is that, opening the searching site in Hong Kong, anyone can view and get information about students. According to the Office, these information include name, student number, their parents’ phone number and e-mail are put on the net by 11 education organizations, which will result in illegal use of the data by criminals.

Nowadays, data breach and data leakage of personal files are rampant, so it is urgent to take measures to protect private data. The worrying fact is that, the Office just revealed a very small part of the real situation. The privacy leakage affairs not only exist in the educational organizations, it goes for the commercial areas as well, although it is not so much obvious as the former one.

People can use some precaution method to prevent data losing and information leakage. First of all, when surfing the Internet, do not leave your private information in distrustful sites, and be alert about phishing webs. Next, you can password protect shared folder on the sharing network or LAN. Also do not forget strong anti-virus software and firewall, they are able to offer you a basic safe environment when you use the computer.