Need Assistance? Call us at (512) 814-8044, or submit a ticket

Unlimited Data Storage Space: A Good Thing or the Sword of Damocles?

“Does not Dionysius seem to have made it sufficiently clear that there can be nothing happy for the person over whom some fear always looms?” – Cicero

I walked into a local electronics store the other day and saw a 2TB SATA hard drive for $80, and a 3TB drive was on sale for about $160.00. I unconsciously blurted out “You’ve got to be kidding me!”. Of course everyone around gave me that “what’s up with that?” look.

Not too long ago, one terabyte of data storage space was “unthinkable”. Even worse was the projection of the cost. I have a hard drive an engineer friend of mine gave me a while back. It weighed a ton and had a whopping size of one gigabyte (1GB) and the astonishing price was $1, 248.99. (more…)

Share

Continue Reading

Is Samsung Installing Keyloggers on Laptops?

UPDATE: It has now been confirmed that Samsung laptops do not contain keyloggers or spyware.

UPDATE: Samsung has issued a statement saying that the finding is false. The statement says the software used to detect the keylogger, VIPRE, can be fooled by Microsoft’s Live Application multi-language support folder. This has been confirmed at F-Secure and two other publications, here and here.

UPDATE: GFI Labs, the maker of VIPRE, has issued an explanation and apology for generating the false positives that led to these articles: “We apologize to the author Mohamed Hassan, to Samsung, as well as any users who may have been affected by this false positive.”

UPDATE: A Samsung executive is said to have personally flown from Newark, N.J., to Burlington, Vt., carrying two unopened boxes containing new R540 laptop computers. These units were immediately put under seal and details recorded for chain-of-custody records. At 17:40, Dr Peter Stephenson, Director of the Norwich University Center for Advanced Computing and Digital Forensics, began the detailed forensic analysis of the disks. The results are expected by Monday.

Original post:
There seems to be a  claim (false, as it turns out) that Samsung installs a commercial keylogger called StarLogger on its laptops before shipping them out, apparently to “monitor the performance of the machine and to find out how it is being used.”

This was reported by Mohamed Hassan, MSIA, CISSP, CISA who bought two different models of Samsung’s laptop – the R525 and R540 models. If the report is true, it will be like a rehash of the Sony Rootkit snafu a couple of years back. (more…)

Share

Continue Reading

Routers, Hops, Executioners and Obituaries: A Look at ICMP

ICMP is the Internet Control Message Protocol which works at Layer 3 or the Network layer. It is used for all kinds of network messaging services utilized by IP, the Internet Protocol.
In fact, here’s how it is defined by Wikipedia:

“The Internet Control Message Protocol (ICMP) is one of the core protocols of the Internet Protocol Suite. It is chiefly used by the operating systems of networked computers to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached. ICMP can also be used to relay query messages”
(see RFC 1256, if you are into that kind of thing). (more…)

Share

Continue Reading

Can Computers Speak Human? A Look at ARP Conversations

Have you ever wondered what goes on behind the scene when you send an email, connect to a website or simply plug a new computer into your local network? I took a look recently, and I must say, machine language, basically, is no different from ours at some levels. When we hear the term machine language, we no doubt immediately think of 0s and 1s (zeros and ones) which is true, essentially. So how do computers know where to send information and that laptop you just connected to the network, how did it get its IP address so you can browse the network and surf the net? They do the same thing we do, they ask. (more…)

Share

Continue Reading
Close Menu
Share
Share