McAfee's new family shield

June 15, 2009

On the heels of Symantec's OnlineFamily.Norton released earlier this year, security stalwart McAfee jumps into the family protection game with a new home-oriented protection program. Called McAfee Family Protection, the program offers many familiar tools to parents in the hopes of fostering conversation while protecting children from harm.

McAfee Family Protection protects children based on multiple levels of technology.

(Credit: McAfee)

McAfee Family Protection offers blocking, monitoring, and parental notifications for most computer-based activities. The program allows for up to 10 users on three different machines, utilizing several layers of algorithms to monitor behavior. Parents can outright block or merely monitor Web sites, social-networking behavior, and instant messaging including Facebook IM and multi-protocol chat clients, according to Javed Hasan, vice president of McAfee Product Management.

In addition to blanket blocks for subject matter and specific Web site blocks, parents can customize rules so that they can block all of YouTube, or just YouTube videos that have specific tags. Web sites protected by secure protocol, https, can also be blocked. They can also set up roadblocks that prevent specific applications from opening, such as peer-to-peer clients or media players, and parents can receive brief SMS notifications alongside more detailed e-mail reports.

The program also can restrict computer usage based on cumulative time used or by time of day. It uses a server-based clock, so tampering with the local system-based clock shouldn't affect this feature.

McAfee says that Family Protection uses about 20 MB of RAM when idle and can run on systems with as little as 128 MB of RAM. It's available as a 30-day trial, after which a three-computer license costs $39.99.

 

Data backup service leads to recovery of stolen laptop

June 15, 2009

Using a data backup program helps recover lost data but can also help get a stolen laptop back--if you're lucky.

A Berkeley, Calif., man recently recovered his stolen laptop after seeing photos the thief took of himself with the built-in camera via his Internet-based data backup program.

That's according to a police officer's article in an e-mail newsletter from Berkeley City Councilmember Susan Wengraf that was posted to the Web by open-source advocate Bruce Perens.

It all started on May 5, when the victim left his laptop in the back seat of his car (tsk tsk). Two hours later, the thief smashed the car window and grabbed the computer. It's not clear what else was done with the laptop, but the big break in the case came when the laptop owner later spotted the self-portrait photos of the thief on the storage service Web site.

Detectives working the case were shown the photos and recognized the man, who had been released from jail earlier in the year. They noticed that in the photos he appeared to be in a motel room and began trying to track down the IP address used by the laptop hoping that it would lead to the motel.

Before that could be accomplished, however, the detectives spotted the man getting into a car in a motel parking lot in Oakland and arrested him. In his car and the motel room they found the laptop along with stolen property from other auto burglaries.

 

Turkish hackers breached U.S. Army servers

June 15, 2009

Hackers based in Turkey penetrated two U.S. Army Web servers and redirected traffic from those Web sites to other pages, including one with anti-American and anti-Israeli messages, according to a report in InformationWeek.

The hackers, who go by the group name "m0sted," breached a server at the Army's McAlester Ammunition Plant in Oklahoma on January 26 and a server at the U.S. Army Corps of Engineers' Transatlantic Center in Winchester, Va., on September 19, 2007, the report said.

Investigators believe an SQL injection attack was used to exploit a vulnerability in Microsoft's SQL Server database in order to gain access to the servers.

It is unclear whether any sensitive information was accessed, according to the report.

Search warrants have been served on Microsoft, Yahoo, Google, and other ISPs and e-mail providers, while a criminal investigation is underway at the Defense Department, the U.S. Army's Judge Advocate General's Office, and the Computer Emergency Response Team, InformationWeek reported.

 



Best Communitation Website
Which communication website is best?

Myspace
Facebook
Twitter
Furry-paws
Youtube


Make a free website with Yola