Practical Technology

for practical people.

Apple appears to have built its own content-delivery network

August 1st, 2014 · No Comments

As usual, Apple has nothing to say about its latest operation: the creation of a content-delivery network (CDN) for its software updates and audio and video content. Dan Rayburn, executive VP for StreamingMedia and Principal Analyst for the research firm, Frost & Sullivan, make a compelling, fact-based argument that Apple is already operating its own CDN.

Apple appears to have built its own content-delivery network. More>

→ No CommentsTags: Apple · Business · CDN · Internet · Network

BadUSB: Big, bad USB security problems ahead

July 31st, 2014 · No Comments

It’s a common scene from TV: Our hero sneaks into the villain’s office, plugs in a USB stick and — flash! — all the secret plans to conquer Chicago are sucked down into the thumb-drive. The only fiction is how fast it takes to download data. In the real world, office data thieves walk out with stolen data everyday on their flash drives.

It could be worse. USB sticks can also carry malware. Or, as SRLabs security researchers Karsten Nohl and Jakob Lell propose to show at Black Hat, an ordinary USB pen drive can be turned into an automated hacking tool.

BadUSB: Big, bad USB security problems ahead. More>

→ No CommentsTags: Infrastructure · Security

LibreOffice 4.3: The best open-source office suite gets better

July 30th, 2014 · No Comments

Ever since LibreOffice split off from the troubled OpenOffice in 2010, this open-source office suite has gotten better and better. With this new release from The Document Foundation, LibreOffice 4.3 has established itself as the best non-Microsoft office suite.

LibreOffice 4.3: The best open-source office suite gets better. More>

→ No CommentsTags: Applications · Development · Office Software · Open Source

Red Hat starts work on 64-bit ARM servers

July 30th, 2014 · No Comments

Red Hat, the Linux king today and the would-be OpenStack cloud king tomorrow, is putting its money and resources on the line by betting — with its ARM Partner Early Access Program — that the 64-bit ARM architecture is ready for the data center.

Red Hat starts work on 64-bit ARM servers. More>

→ No CommentsTags: Business · Cloud Computing · Data Center · Infrastructure · Linux · Operating System · Red Hat · Server

Google fixes Android’s Fake ID security hole

July 29th, 2014 · No Comments

Bluebox Security, a mobile security company, has found a serious Android security hole that dates all the way back to Android 2.1. This hole, Fake ID, can be used by malware to impersonate trusted applications without any user notification.

Can you say bad news? I knew you could.

By enabling malware to act like already approved, high-level programs, Bluebox claims that Fake ID “can be used by malware to escape the normal application sandbox and take one or more malicious actions: insert a Trojan horse into an application by impersonating Adobe Systems; gain access to NFC [Neat Field Communication] financial and payment data by impersonating Google Wallet; or take full management control of the entire device by impersonating 3LM.” Ironically, 3LM is part of an Android enterprise security system.

Google fixes Android’s Fake ID security hole. More>

→ No CommentsTags: Business · Google · Infrastructure · Linux · Operating System · Security · SmartPhone · Tablet