Posts Tagged 'files'

Seagate offers up new Maxtor 1 TB NAS

To address the growing consumer need for storage in the home, Seagate today announced the Maxtor Central Axis network drive, a network storage drive that can be used by the whole family. This latest drive from Seagate provides a terabyte of storage that every computer in the home can back up to. In addition to media streaming capabilities for video, photos and music, the new Maxtor Central Axis network drive also includes an easy-to-use remote access service that allows people to easily and securely retrieve content stored on their network drive through any Internet browser.

A concept once only reserved for the small business and enterprise space, networked storage is increasingly becoming a viable option for multiple-computer homes. According to Yankee Group’s 2008 Device Survey, of those who purchased network routers for the home, 75.9% did so with the intent of providing multiple computers with access to the Internet. The challenge of these multi-computer households is the ability to share and back up files from each computer. Maxtor Central Axis network drive allows for each computer in the home to be automatically backed up, so important files and precious memories are sheltered from virus infections or disc drive failures. Sharing files from computer to computer is easy when there is one repository for any file that you would like to share. Additionally, since the storage device is connected to the router and not formatted for an individual computer, files can be accessed and stored from both Mac OS X and Windows operated PCs. (link)

Advertisements

Music industry urges boycott of Baidu

Music industry representatives have warned advertisers to stop supporting Baidu, China’s largest search engine, because they believe it is encouraging music piracy.

Baidu is the largest source of pirated music in China, according to the representatives, who describe the company as “incorrigible”.

The Chinese firm’s music search engine is accessed through what is described as a prominent link on the company’s home page.

Baidu provides links only to music files stored on third-party servers. No music is stored on computers owned or controlled by Baidu. (link)

Gadget: paranoid data freaks can protect their data with this

Maybe you’re a spy or you’ve got schematics for the next hot gadget locked away on your hard drive, but either way you’re going to want to lock your files down. That’s where the DataLocker Drive Enclosure comes in.

The DataLocker is an enclosure so you’ll have to supply your own 2.5″ SATA hard drive, which is the standard size drive for laptops. After that, you create a 6-digit passcode that you punch in on the unit’s backlit touchscreen. Tap it again to lock that sensitive info down. It’s powered and enabled by your USB port. Plug it in, put in your code and access your data. (dvice)

More on the net neutrality issue

Looks like the government doesn’t know which side to take on the issue. For now it looks like they are going to dodge the issue until someone else (U.S.) takes a stand which they can adopt. Guess it comes down to whether or not criminal activity is taking place and how it could be proved in the court of law.

“Some of Canada’s largest ISPs – including Bell and Rogers – have employed “shaping” techniques for more than a year to manipulate Internet traffic flows, essentially slowing down certain kinds of Internet activity on their networks while giving priority to other data. Most of the data being shaped, or “throttled,” is peer-to-peer or “torrent” traffic, typically large files such as video files.” (link)

“On Friday, the National Union of Public and General Employees sent a letter to the Canadian Radio-television and Telecommunications Commission (CRTC) demanding that it investigate the impact of “traffic shaping” by ISPs on Canadian Internet users.

For more than a year, some of Canada’s largest ISPs – including Bell Canada and Rogers Communications Inc. — have employed “shaping” techniques, essentially slowing down certain kinds of Internet activity on their networks while giving priority to other data. Most of the data being shaped, or “throttled,” is peer-to-peer or “torrent” traffic, which is typically used to transmit large files, such as video files. ” (GlobeandMail)

Laptop to take picture of thieves

A company in the UK has claimed a patent for a new high-tech version of exploding dye packs that are placed in banks in bags of cash. This new patented software will photograph the laptop thief remove any sensitive files, and not only that, will give away its position.

The system has had exhaustive tests in the county of Yorkshire, which followed a spate of well-publicised thefts of government laptops from cars or homes of government officials.

The company will charge a monthly fee of £10/$20 for a link to its main control centre, the staff at the centre can quickly take action if the laptop is switched on outside of a designated area, this can be outside of a government building or even a small area such as a specific desk.

If the computer is removed from a specified area, the computer will automatically connect to the Internet when it is switched on, and then commence to take multiple photographs of its surroundings and user, at the same time sending out a signal specifying its exact location to the company’s control centre. (link)

Karl Rove cover up

The head of the Office of Special Counsel who is currently leading an investigation into allegations against Karl Rove is taking fire over allegations that he improperly and illegally disposed of documents and files. Since this is the sort of nonsense that only makes sense if you live inside the Ultimate RDF generator (i.e., inside the Beltway), I’ll take a moment and break things down.

The Office of Special Counsel (OSC) is an independent federal agency tasked with protecting the rights of whistleblowers or other complainants that work for the federal government, investigating whether or not government employees have properly followed restrictions on their political activity, and defending the reemployment rights of returning war veterans.

On April 23, 2007, Scott Bloch, the head of the OSC, launched a wide investigation into the political activities of Karl Rove. Allegedly, Rove, as well as other White House aides, had violated federal law by giving partisan political presentations to government employees that explicitly encouraged them to find ways to support Republican candidates. The investigation is ongoing. (story)

Quicktime exploit danger for Firefox users

According to an advisory from the US-CERT, the vulnerability stems from a weakness in the way QuickTime handles a type of media-streaming communications called the “real time streaming protocol” (RTSP). Attackers could exploit the flaw merely by convincing users to click on a poisoned link, open a malicious e-mail attachment, or visit a specially crafted Web page. US-CERT says the vulnerability is present in QuickTime versions 4.0 through 7.3 (the latest version) on both Windows and Mac systems.

Interestingly, researchers at Symantec say they tested the publicly available exploit code for this flaw and found that it failed to work properly against Internet Explorer 6/7 as well as Safari 3 Beta; in those tests, the exploit simply crashes QuickTime. But Symantec said the exploit worked perfectly against Firefox if users have chosen QuickTime as the default player for multimedia formats. (link)


Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 29 other followers

Technorati – Blog Search

Add to Technorati Favorites

submit express

Advertisements