Twitter ad products
Full Disk Encryption info
I do not know how many learned about the importance of Full Disk Encryption, but in this article I wish to inform the readers as well.
Full Disk Encryption is extremely beneficial for protecting information, which is achieved by encrypting data stored on any hard drive. When I say all the documents stored, I mean including the operating system and installed programs and files.
This technology makes it impossible to read all files from unauthorized person.
I do not know if you’ve heard of the study „The growing impact of full disk encryption on digital forensics”, the study shows the difficulty of CSI teams have to verify and obtain necessary digital data to fight against criminals.
There are many softwares for Full Disk Encryption that encrypts and decrypts data and few are transparent to users and applications. One of the problems with traditional Disk Encryption softwares is that it increases access time. In independent tests are software for Full Disk Encryption that provides performance results compared with major products in the market decreases by less than 2% of the performance of hardware.
Chromebook – Google Chrome OS on Acer and Samsung
During the Google I/0 2011 conference, there was an announcement made about the Chromebook operating system. This term basically describes all notebooks that support the Chrome operating system. The two manufacturers featured are Acer and Samsung, announced by Sundar Pichai.
The Chromebook wants to reinvent and redesign the whole PC experience while solely focusing on the web features, by bringing the perks of phones and tablets. It concentrates on improving security, portability and access. And because we know how frustrated we all get when we start-up our PC systems and wait light-years till everything is ready, the Chromebook will boot in 8 seconds.
Windows 8 – A Quick Review
Microsoft has been working on a new version of Windows for some time now. The work-in-progress name is Windows 8 and there are some unconfirmed rumors about it.
Apparently, Windows 8 has borrowed some elements from Windows Phone 7 and Microsoft Office. It will use the “ribbon” interface, first seen in Office 2007 and will replace the current menu style. The biggest advantage is that all features are now organized in logical tabs with dynamic ribbon buttons involved (Library Tools, Picture Tools, Disk Tools).
New features include Sync (synchronizes folders between computers) and Web Sharing (folders can be stored on Microsoft servers, accessible by anyone via a link). The log-in interface is similar to Windows Phone 7, based on text and images, having minimized elements on screen. Internet Explorer browser will show preview images of recently visited pages (just like Google Chrome).
Volkswagen launched 2010 Geneva Salon application for iPhone
2010 Geneva Salon is the name of the new iPhone applications unveiled by Volkswagen. This is very useful to visitors of the Geneva Motor Show and can be downloaded free from the AppStore.
Volkswagen launched 2010 Geneva Salon application for iPhone
The application has several useful functions, one of which gallery presentation for VW cars at Geneva, with technical data and positioning of each model at the show. VW Customers can even program their application a test drive with the iPhone.
Motorola transforms you in Robocop
Until we get to control computers on the brain, we could suffer the exact opposite. That means that we might be directly dependent on a computer!
Motorola transforms you in Robocop
Motorola has introduced a new concept of portable computer (Kopin Golden-i) that attaches to the head and you will turn into a real … Robocop.
Kasperski wants to produce hardware antivirus
Kasperski boast that they have just received a patent in the United States for a hardware antivirus solution type. In other words, it’s hard cleaning the viruses that are no longer dealing with an application from the operating system, but with a physical device, integrated in the PC it will be easier.
Russian company came to this concept in their desire to offer more efficient ways to fight root-kits and Trojan horse type virus. A device that works on hardware level could easily detect security vulnerability than one application from operating system.