Archive for May 23, 2017

Belkin Introduced Pocket Power Series Of Portable Power Banks

Posted in Commentary with tags on May 23, 2017 by itnerd

Belkin has introduced a suite of its most compact and fast-charging portable power banks, enabling consumers to stay connected and charged all day. The all-new Pocket Power comes in 5,000 and 10,000 mAh sizes in black, rose gold and silver, and the 15,000 mAh model will be available in black only. Featuring fast-charging capability and polymer battery cell technology, the new battery packs are lighter, thinner and equipped to charge multiple devices at an affordable price point.

image005.jpg

Consumers spend five hours a day on their mobile devices, according to Flurry Analytics, and 90 percent of photos shared or stored online will be taken by a smartphone, according to Deloitte.

Key Features Include:

  • Built-in safety features protect the device and the consumer
  • Micro-USB port charges battery pack quickly and efficiently
  • 6” micro-USB cable included
  • 4 LED indicators display remaining power level
  • Plastic casing provides a lightweight solution

The Pocket Power 5,000 mAh is available today for an MSRP of $29.99 US on Belkin.com at http://www.belkin.com/us/p/p-F7U019/ and at Target in the U.S. and Walmart in Canada.

The Pocket Power 10,000 mAh and 15,000 mAh will be available later this summer; check back on Belkin.com for more details.

OWC Ships A New Version Of SoftRAID — Now With SoftRAID Easy Setup

Posted in Commentary with tags on May 23, 2017 by itnerd

OWC has announced the launch of SoftRAID v. 5.6 RAID software featuring SoftRAID Easy Setup­, which now makes it super easy to create a RAID system (redundant array of independent disks) from scratch to keep your precious files protected against disk failure and achieve faster data access. SoftRAID’s software RAID system is ideal for everyone who needs to safely store and backup massive amounts of data, including photographers, videographers, editors, audio producers, database and media managers, advertisers, archivers, and more. SoftRAID’s Easy Setup guides less technical users through the process of creating SoftRAID volumes, automating the process of configuring disks and making recommendations to help users setup their SoftRAID system. All users have to do is decide what the RAID volume will be used for and how much space to use (with hints from the application) — SoftRAID Easy Setup does the rest.

593d3ce4-3bfe-455b-980a-1fca3c294589.jpg

Additional new features in SoftRAID include the ability to monitor USB and FireWire disks for failure and impending failure and translation to Simplified Chinese (for both the application and documentation), in addition to the 5 other languages SoftRAID already supports: English, French, German, Spanish and Japanese. SoftRAID is available to purchase from www.SoftRAID.com/store for SoftRAID lite at $49 and the full SoftRAID at $179.  A 30 day fully functional Free Trial of SoftRAID or SoftRAID Lite is available to download immediately from www.SoftRAID.com/freetrial.

New Features in SoftRAID 5.6:

  • SoftRAID Easy Setup: helper application guides less technical users through the process of creating SoftRAID volumes.
  • SMART over USB proprietary driver: extends disk checking and monitoring to most USB drives, including most USB 3/3.1 and many USB 2 drives, FireWire enclosures and FireWire 400/800 connected drives.
  • Supports 6 languages: now translated to Simplified Chinese, in addition to English, French, German, Spanish, and Japanese.
  • Supports Thunderbolt 3 devices: with sustained throughput of over 2.5GB/s on a single Thunderbolt 3 bus. You can even use two ThunderBolt 3 buses at the same time and create a volume which can read and write at over 4 GB/s.
  • Email Notifications: updated to support recent security enhancements in SMTP servers, includes support for almost all third party email servers.
  • Quick Start Guides: updated for both SoftRAID and SoftRAID Lite to include an entire section on using SoftRAID Easy Setup.
  • Features improved failover handling: in the event of Mirror (RAID 0), RAID 4, RAID 5, and RAID 1+0 disk failure scenarios.
  • Extends disk certification: to all 4Kn (4 KB sector) drives.
  • Compatible with all versions of Mac OS X: from 10.6.8 through the latest release of Mac OS 10.12 (Sierra).
  • Includes bug fixes: details of which can be found in the release notes.

General SoftRAID Features:

  • Support for all Intel based Macs with Core Duo 2 processors or later.
  • Supports Thunderbolt 1, 2 & 3, eSATA, SAS, FireWire and USB 2.0, 3.0, 3.1 and USB-C.
  • Converts AppleRAID stripe (RAID 0) and mirror (RAID 1) volumes to SoftRAID.
  • Supports RAID 0, 1, 4, 5 and 1+0 (and non-RAID volumes) – (RAID 4, 5 and 1+0 volumes not available with SoftRAID Lite).
  • Supports TRIM (for SSDs) on all SoftRAID RAID levels.
  • All SoftRAID volumes can be startup volumes.
  • Supports volumes up to 4 petabytes (4,000 TB).
  • Supports up to 16 disks per volume and up to 32 volumes per Mac.
  • Automatic rebuilding of out-of-sync RAID volumes.
  • Fast Rebuilds for accelerated rebuild times.
  • Disk error reporting: SoftRAID monitors and logs all disk errors (often ignored by Mac OS).
  • Email notifications (not available with SoftRAID Lite).
  • Predictive failure analysis: gives advance warning of imminent disk failure on all disks which support SMART, most USB 3, 3.1 and USB C disks (enclosures) and also many USB 2.0, FireWire 400 and 800 disks.
  • Certify Disk: guarantees disk reliably read and write data (destructive, ideal for new disks).
  • Verify Disk: ensures entire disk can be read (non-destructive test for any-time use).
  • Validate volume: confirms your entire volume is readable and all parity data is correct.
  • I/O and error counters for every SoftRAID disk and volume.
  • Extended disk information, including hours of use, reallocated sector counts and media wear for SSDs.
  • Disk labeling and LED blinking to aid in disk identification.
  • Extensive logging of SoftRAID events.
  • Command line interface with dedicated man page (CLI not available with SoftRAID Lite).
  • Built-in recovery tools for recovering severely damaged partition maps.

SoftRAID version 5.6 is available now as a fully functional 30 day free trial at SoftRAID.com/freetrial, with pricing at just $179 through www.SoftRAID.com/store, Apple Certified Consultants, and retail outlets worldwide. It includes one year of free technical support via email. In addition, SoftRAID Lite is available for just $49 and includes support via online forum. SoftRAID Lite supports only non-RAID, stripe (RAID 0) and mirror (RAID 1) volumes. Users of SoftRAID version 4 can purchase an upgrade to version 5.6 for $89.SoftRAID requires Intel running Mac OS X 10.6.8 or later. Support for TRIM commands on SSDs require Mac OS X 10.7.5 or later. SoftRAID is known for their exceptional tech support, available nights and on weekends, in addition to standard hours.

See customer comments at: https://www.softraid.com/pages/comment/customers_comments.html. For more information, see the website: http://www.SoftRAID.com and http://www.macsales.com, Facebook: facebook.com/softraid.

593d3ce4-3bfe-455b-980a-1fca3c294589.jpg

NEVA: The Easiest and Most Affordable 3D Printer

Posted in Commentary with tags on May 23, 2017 by itnerd

For years the thought of buying and operating a 3D printer meant spending a lot of time learning how to print using sophisticated software included in the printer. Dagoma is bringing a game changer to the 3D printer market with NEVA 3D printer starting at $249 for early birds on Kickstarter.

neva_in_action.gif

There’s never been a 3D Printer that’s so easy to use and operate, thanks to its uniqude ONE touch button that lets you start/pause/stop the printer anytime you need. To change the color or replace the filament tap the base twice and presto, the filament comes out and ready to add the new one. NEVA just went live on Kickstarter today and already over 40% funded.

Canadian Web Hosting Introduces Virtual Private Server Plans With Built-in Disaster Recovery Services

Posted in Commentary with tags on May 23, 2017 by itnerd

Canadian Web Hosting, the leading provider of Canadian web hosting, cloud hosting and infrastructure services in Canada, announced today the release of their new Virtual Private Server Plans with built-in disaster recovery called VPS SAFE. These new plans offer customers true business continuity across Canada at a fraction of the cost of traditional disaster recovery systems and help prevent local outages and interruptions to business applications and websites. Moreover, these new disaster recovery plans can be added in just a few clicks and make it easier than ever to have true disaster recovery.

1.jpeg

Canadian Web Hosting’s new VPS SAFE plans work by leveraging artificial intelligence (AI) to learn customers data patterns and maximize data protection by seamlessly moving data between data center locations and helping to prevent data loss. The new plans utilize enterprise-ready virtualization from VMware and Veeam’s replication technology that run on top of Canadian Web Hosting’s highly available, SSAE 16 compliant infrastructure. These new VPS SAFE plans deliver high-performance and scalable servers with recovery and data-loss avoidance to ensure guaranteed recovery of files, applications, and VMs. Anytime you upgrade, or modify your plan, your disaster recovery plan changes with it automatically.

Upon signup, Canadian Web Hosting will automatically enable disaster recovery on the designated VPS SAFE plan and enable disaster recovery to a secondary location of the customers choosing. Once Disaster Recovery is turned on that server begins replicating to the customer’s remote site, and will remain in continuous sync indefinitely, turned off only when it is disabled by the user. Canadian Web Hosting’s flexible data center locations options including locations that meet Canada’s privacy requirements including Toronto and Vancouver, as well as secondary sites like Dallas that can give customers further geographic flexibility.

By default, Canadian Web Hosting’s implements a standard Recovery Point Objective of 15 minutes for all new plans but offers additional flexibility by giving customers options for replication including real-time continuous replication for the most stringent RPO and RTO requirements helping to minimize any potential data loss with no need for slow or expensive hardware systems.

Customers can signup for Canadian Web Hosting’s new VPS SAFE plans today start at $15.00 per month.  Learn more by visiting www.canadianwebhosting.com or by phone at 888-821.7888.

Citrix Unveils Innovations at Synergy Conference

Posted in Commentary with tags on May 23, 2017 by itnerd

Organizations that harness the full potential of their people will drive business success that will power the future of work. According to a recent Oxford Economic Research study, executives who supported virtual work and mobile business strategies outperformed their peers across a wide range of business metrics, including higher revenue growth and profits, reduced expenses, increased employee retention and better customer satisfaction.

To help businesses drive transformational performance and greater employee engagement, Citrix is announcing new secure digital workspace offerings at Citrix Synergy that will power the future of work, enabling customers to reimagine where and how work happens – and what connected ‘things’ are involved.

New Citrix innovations include enhanced user experience capabilities in a unified, secure digital workspace; new mobile, software-defined networking and analytics services in the Citrix Cloud and advanced document workflows. In addition, Citrix is introducing a new intelligent security framework geared to secure and simplify access and control of the apps and data people need to work.

Simplifying the User Experience to Fuel Productivity

Gartner says organizations currently using cloud services indicate they are allocating 40 percent of their IT budget to cloud-related spending (including cloud-related services). Seventy-eight percent of these organizations plan to increase their spending on cloud through 2017. This proliferation of cloud technologies is frustrating end users that must navigate multiple cloud services, apps, and data sources as well as disparate access methods and credentials. Meanwhile, shadow IT increases these challenges by adding even more unsanctioned apps and tools. This, in turn, increases service complexity and the risk of security breaches as users circumvent IT standards.

To fuel productivity, Citrix is introducing an enhanced secure digital workspace user experience, which unifies access and management of mobile, SaaS, web and Windows apps and documents, and consolidates access, control and workflows in one, easy-to-use solution. With a single sign-on using any federated identity, employees gain simple, secure access to a seamless, consistent experience on any device. Unlike other solutions, the Citrix secure digital workspace is designed to be contextual, ensuring employees have the optimal balance of security, productivity and performance based on location, device, identity and other analytics.

The new workspace experience is also the only solution to include advanced content collaboration, information rights management and business workflow capabilities. From directly within the secure digital workspace, users can create, edit and collaborate on Office 365 online documents. They can then initiate a custom workflow and approval process with colleagues – all without leaving the workspace, and without having to re-authenticate as they switch between SaaS applications.

Providing Enhanced Security and Analytics

As organizations plan for their future, security continues to be a top priority. A recent global survey focused on security and IT professional found that 73 percent say data management, 76 percent say configuration management and 72 percent say app management are the keys to reducing the security risk over the next two years in building a new IT infrastructure.

The expanding and changing enterprise security perimeter – with new endpoints, locations, data sources, networks and clouds – is creating the need for more intelligence in orchestrating security policies across this new security perimeter. In addition, IT organizations need the ability to enforce those policies. Citrix addresses these evolving security needs with a new and unique approach that’s built around the reality of how people work. This approach provides expanded controls to form the basis for a new software-defined perimeter of the digital workspace, and complements other layers of defense in a multi-layer approach to security. In addition, to provide security-focused offerings to help Citrix customers better protect their Citrix environments, Citrix Consulting Services is formalizing a Security Practice.

Citrix is unveiling Citrix Analytics, a new, holistic security and behavior analytics offering that extends the capabilities of the proven Citrix NetScaler Management and Analytics System (MAS) with new behavior detection, insights, and proactive risk resolution capabilities. This new offering leverages machine learning. The new security solution analyzes data sets across the Citrix product portfolio – XenApp/XenDesktop, XenMobile, ShareFile, NetScaler and leverages machine learning algorithms and application behavior anomaly detection technology to enable IT organizations to find and quickly troubleshoot application infrastructure performance issues.

Meeting Customers Wherever They Are on Their Cloud Adoption Journey

Citrix Cloud continues to provide the cloud-based management plane across all Citrix technologies, integrating them with a simple, consistent administrative experience. This empowers customers to easily combine the applications, data and tools needed to work from the cloud and deliver them to people anywhere in secure, personalized and contextually relevant ways. Because Citrix Cloud is designed to manage multi-cloud environments, customers who use it for virtual apps, desktops and data can place their workloads on any public or hybrid cloud, or on any on-premises virtualized environment.

Citrix has accelerated innovation in the cloud, with the introduction of new services, features and capabilities to build out this powerful workspace delivery model. These services include XenApp Essentials and XenDesktop Essentials that are native to Microsoft Azure, but managed from Citrix Cloud. Additional Citrix Cloud services include XenMobile device management and app management and NetScaler Gateway Service, allowing customers to create a gateway-in-the-cloud, speeding and simplifying implementation. In addition, Citrix Cloud offers integration with Azure Active Directory for administrators, internet of things (IoT) capabilities, and other new services in our labs area.

Customers, like ÅF, are creating secure digital workspaces through Citrix Cloud. ÅF was founded in 1895 as The Southern Swedish Steam Generator Association and has been at the forefront of engineering, energy, and industrial design ever since. The firm has recently revealed how it uses gaming engine and virtual reality software to create 3-D, walk-through visualizations for clients on building and infrastructure projects.

Related links

Samsung Galaxy S8 Iris Scanner Security Pwned By Hackers

Posted in Commentary with tags , on May 23, 2017 by itnerd

If you bought a Samsung Galaxy S8 for the security that the iris scanner provided you, then you may have to rethink that decision. Motherboard is reporting that hackers have used a fake iris to bypass the phone’s security:

Despite Samsung stating that a user’s irises are pretty much impossible to copy, a team of hackers has done just that. Using a bare-bones selection of equipment, researchers from the Chaos Computer Club (CCC) show in a video how they managed to bypass the scanner’s protections and unlock the device. “We’ve had iris scanners that could be bypassed using a simple print-out,” Linus Neumann, one of the hackers who appears in the video. The process itself was apparently pretty simple. The hackers took a medium range photo of their subject with a digital camera’s night mode, and printed the infrared image. Then, presumably to give the image some depth, the hackers placed a contact lens on top of the printed picture.And, that’s it. They’re in.

So, why does this work? Here’s my guess. I am guessing that the S8 is only checking for the pattern of the iris and it has no ability to tell if it is a real eye or not. Thus it is easily pwnable.  If any of this sounds familiar, it should. The facial recognition in the S8 can be fooled in the same manner.  And according to Motherboard, the fingerprint scanner has been pwned too. Samsung hasn’t commented on this, but it will be interesting to see what they do to fix this as this was a key selling feature for the phone.

Hackers Can Pwn Your Computer Via Flaws In Media Players Exploited Via Subtitles

Posted in Commentary with tags on May 23, 2017 by itnerd

This is something that I never figured was possible. Security company Check Point has come out with a blog post that has details about a new type of exploit that leverages flaws in various media players to pwn computers. The vehicle for the pwnage is subtitles in videos:

Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim’s media player, attackers can take complete control over any type of device via vulnerabilities found in many popular streaming platforms, including VLC, Kodi (XBMC), Popcorn-Time and strem.io. We estimate there are approximately 200 million video players and streamers that currently run the vulnerable software, making this one of the most widespread, easily accessed and zero-resistance vulnerability reported in recent years.

There’s also a proof of concept video that you can see here:

Now the four media player apps that are mentioned have mitigations against this threat. But there are likely plenty that are not mentioned that are easily pwnable. Or at least will be pwnable now that this is out in the open and hackers start to figure out how to exploit this. Thus, I have two pieces of advice. First if you use any of the media players mentioned above, then I would say that you should update to the latest version of these players. Second, if you’re running something else, maybe you should switch to one of these four to protect yourself from the threats that are sure to come.

“EternalRocks” Is The Next NSA Inspired Malware That May Make Life Miserable For You

Posted in Commentary with tags on May 23, 2017 by itnerd

Having just got over the ransomware known as “WannaCry” which caused global havoc just over a couple of weeks ago, we now have something new to worry about. Meet “EternalRocks” which like “WannaCry” utilizes exploits found by and acquired from the NSA, but is far more dangerous according to this as it uses seven NSA sourced exploits to the two that “WannaCry” used. Antivirus and security company Symantec already has a write up about this new threat, which means that their products likely have countermeasures for it. Other companies are likely to follow suit as this is a clear and present danger. But at least it’s one that people see coming.

 

#FAIL: New Netgear Router Firmware Collects Analytic Data BY DEFAULT

Posted in Commentary with tags on May 23, 2017 by itnerd

I am not sure what Netgear was thinking when they came up with this idea, but if you own a NightHawk R7000 router from the company and you have updated the firmware to said router in the last little while, it’s now collecting the following info by default and sending it back to Netgear:

  • Total number of devices connected to the router
  • IP address
  • MAC addresses
  • Serial number
  • Router’s running status
  • Types of connections
  • LAN/WAN status
  • Wi-Fi bands and channels
  • Technical details about the use and functioning of the router and the WiFi network

Netgear had this on its website as to why it is doing this:

Technical data about the functioning and use of our routers and their WiFi network can help us to more quickly isolate and debug general technical issues, improve router features and functionality, and improve the performance and usability of our routers

Here’s the problem with that. If you want to collect data, allow one to opt into this. Forcing one to opt out should never be how this sort of thing should work as it just leaves a very bad taste in ones mouth as a result. Now if you don’t want Netgear collecting info on you, here’s how you disable this “feature”:

  • Launch a web browser from your PC or smartphone that is connected to the network.
  • Open the router login window by entering http://www.routerlogin.net.
  • Type the router username and password. If you haven’t changed the default settings, your username is admin, and password is password.
  • Select Advanced → Administration → Router Update on the Home page.
  • Scroll down to the Router Analytics Data Collection section and select the Disable button to disable router analytics data collections.
  • Click the Apply button to save your settings.

Now this “feature” is likely to come to other Netgear routers. So if you own one, you should be on the lookout for this “feature” and take action if required to protect your privacy.