Reason behind the WINDOWS 8 INSTANT BOOT

One of the most important feature of Windows 8-the INSTANT BOOT. As soon as you first boot into a new windows 8 PC,  the first thing you would be most fascinated to see that it boots up in less than 10 seconds. But how does it do it? Keep Reading to find out. Please note that the word now on which we would now most emphasize from now is 'KERNEL' .
 In computing, the kernel is the main component of most computer operating systems; it is a bridge between applications and the actual data processing done at the hardware level. The kernel's responsibilities include managing the system's resources (the communication between hardware and software components).  What actually happens in previous versions of windows is that when we shut down the Operating System, the windows kernel shuts off as well. So the next time you start your computer, the kernel wakes up afresh and loads freshly onto the RAM. But the new versatile windows 8 is different. THEY CALL IT- THE SLEEP HYBRID MODE.  What actually happens is that whenever you shut down your windows 8 PC,  the OS turns off all the apps while the WINDOWS KERNEL is made to sleep temporarily. The next time you start your PC, the start up programs gets loaded afresh while the windows kernel is resumed as from where it was made to sleep. This makes loading of the OS into the main memory faster and you get an instant boot. Please note that in windows 8 RESTARTING is not the same as shutting down the system and pressing the power key again. Restarting involves restarting the kernel also but shutting down the system and pressing the power key again resumes the kernel. So whenever windows would download new updates it will set bench-marking dates to restart the system in order to install the updates to windows. Simply shutting down and pressing the power key next time to turn it ON won't work as in previous versions of windows.

Go ahead and enjoy this instant boot feature as it is one of the best aspects of the new ultimate OS.

Windows 8- Top reasons to upgrade

The wait finally gets over. Microsoft is ready with its biggest ever gamble. The WINDOWS 8.



With the large industrial patch on windows 7 and STILL on windows XP, the release of the OPERATING SYSTEM was quite crucial for the OS giants MICROSOFT. So, they are up with the official release (after a long 1 year testing versions) on OCTOBER 26th 2012. But shifting over a touch oriented OS for the enterprises can be quite devastating because its a completely new interface. But with a quite a bit hands on to windows 8 made us to get through some of its important advantages over other version of windows:

  1. PRICE: The first and the foremost is the price which MICROSOFT is offering. The officially complete version is available at an amazing price of just RS. 1999 in India ($39.9). Further if you have purchased your Genuine Windows 7 PC after June 2012 you can upgrade to windows 8 for just RS. 699. The price is far far much less are compared to the previous releases of Windows.
  2. The Intuitive touch METRO interface: This was perphaps the main point where Microsoft gambled. The first thing where you would notice a change in your PC experience. Start Menu bunched up with beautifully responding tilesThe touch interface according to us is quite interesting and responsive with equal and optimized support for mouse and keyboard.
  3. Cloud Connected OS: Every app in windows 8 is cloud connected. Social Hubs, cloud storage( including skydrive ) etc. all remains absolutely cloud connected.
  4. New APP Store: APPS are the heart of windows 8. Like the i-phone or android apps, Microsoft has setup its STORE which lets you download numerous apps with loads of features. The best thing about apps is that they are all available in the new METRO interface.
  5. INTERNET EXPLORER 10: Another awaited feature of the new OS is IE 10. Perhaps the fastest of all browsers (Tested better than chrome and firefox by many tech experts). Further A report by THINKDIGIT on IE 10 proved that it blocked about 90% of unsecured pages  while chrome could do only 30% of those. Thus security is also not compromised at the expense of speed.
  6. No registry bloatation with APPS: The worst issue of a WINDOWS OS was that it degraded with time. The reason for this was the fact that when we install some softwares on an OS it creates its registry entries and when we uninstall it those registry entries do not get removed. Thus registry bloatation occurs which causes windows to degrade with time. THIS IS NOT THE CASE WITH WINDOWS 8 APPS. The apps are always removable with the WINDOWS STORE. Thus registry never gets sentinized by apps. But still all the daily needed sotwares are not available as apps and will take some time to be available as apps.

With this we end up. Hope you like the post and would want to upgrade to the new OS.

IDM resuming issue Resolved

Internet Download manager-The ultimate tool for making your downloads on the web quicker and resumable. But a reported and self experienced issue exist with this extravagent software.
Probably one of the most common uses of IDM is to use it for downloading YOUTUBE VIDEOS. The fantastic integration of IDM with a video caption pages is really admirable. But recently I noticed a flaw( Not basically in IDM but due to server issues) that resuming a video (or may be other downloads too from dynamic servers) sometimes displays an error as such:


 The phenomena is quite frustrating when we want to resume quite large downloads and its really impossible to start over the download again. So DON'T WORRY.. TECH GETS EASY is up here with an innovative trick to recapture these lost downloads. The trick we are revealing here capsulates by recapturing the lost URL of the download and changing the url manually for the existing download. Now we proceed with these steps. (Please note that we are taking the unresumable download as a youtube video. The trick will work the same for other types of unresumable downloads also)

The unresumable video in my IDM download list is :



1. First of all as soon as you see the above box click CANCEL button.
2. Next open youtube.com and search for the same unresumable video.


 3. Then click open the search result and after the page loads click on the DOWNLOAD THIS VIDEO button of IDM at the bottom of the page.

4. Then the IDM's download box opens up. Click on Start Download button.



5. The file gets added to the download list of IDM


6. Right Click on the file name and open its PROPERTIES. Then Copy the entire ADDRESS of this download.


7. Then in the IDM main window right click on the original unresumable download and open its properties and paste the copied address in the address field and CLICK OK.


 8. Finally click on resume download option of the original download


 Your download will be resumed.

  
Enjoy this useful trick... Any queries through comments are always appretiated. Also please note that this trick does not work on non resumable servers. It applies to only dynamic servers on which the address of  a download changes after a specific time.




Block Unknown Messages in Facebook

Are you fed up of receiving messages from unknown people on Facebook  Cant you point out how can strangers send you messages without being your friend? Then probably you don't know that Facebook privacy features allow you to block these unwanted messages. How?????? Read and find out.

One of the most fascinating features of Facebook is that it makes no compromise with the privacy of its users. Several privacy layers are setup in each of of its feature to make sure that its users do not get confronted with people whom they really don't know. I have been always listening to people that they receive messages from strangers and aren't getting a way to avoid this. So a little sneaking into the picture I realized that there must be some sort of privacy layer employed by Facebook to avoid this and actually there is a way to get rid of messages from strangers on Facebook. Here are the steps to do this


Login into your Facebook account.
Click on the lock near the HOME option on the top right corner of wall page and then click on Who can contact me.

Now select STRICT FILTERING from the options that appear.
You are done and no one except your friends can send you messages on Facebook .

Create Your own context menus in windows 7

A Context menu in windows is the one that pops up when you right click on an empty space on your desktop. You have the authority to create your own context menus in windows but a problem that persists is that it requires sneaking into the registry which can be a harmful step if you are not a registry editing freak. SO Tech Gets Easy comes up again with an extremely easy way to create your personal context menus in windows. Keep reading to find out how to do this.


Context menus in windows 



Here we proceed with our steps to create a context menu in windows :

1. We will need a software for it called YOUR MENU. First of all download YOUR MENU from here.


2. Now open the compressed folder of this installer and install it onto your hard drive.
3. After the installation run the program by double clicking the icon on the desktop.
4. The program opens up with a window with an intro screen and prompting you to proceed. Click On PROCEED button.




5. Now another window opens which provides two types of options. First is to create a single context menu and the other on is to create a cascade context menu. A single menu is the one which opens your application as soon as you click on it and runs only one application. A Cascade menu opens a sub menu to provide a list of more than one applications. We will proceed with Single menu as the latter one is quite similar to create.


6. Click on Single option button.
7. Two blank field now pop up onto the same window.


8. Now enter the name of the context menu you want to create into the MENU NAME field.



9. In the second field [SELECT PROGRAM (CLICK EMPTY FIELD)] just click to open a file browser.

10. Now choose the application for which you want to create the context menu. We are going with Avast Antivirus.


11. Now click on GENERATE REG FILE button.
12. Now again a file browser opens which asks you to select the location where you want to save your registry files. Save these files on desktop (you may choose other locations too) by clicking on save button. Then click OK button.



13. Now move to the location where you saved your files (Desktop in our case).
14. You will see 2 new files on that location. The first one is for creating the context menu and the other one is for inverting back the changes. Double click on the first file.


15. Now click on YES button from the warning that pops up and then click OK on the new window.




16. VOILA!!!!!!!!!! You are done. Right click on an empty space on the desktop to see your preffered context menu. If you want to revert to the changes click on the second registry file and you will go back to what you started with.




Top 5 Tips for searching on GOOGLE

Who does not know that google is the world's best and most widely used search engine. But efficiently using google for your searches can make you discover the real power of google.  Today we are providing you a list of top 5 tips for making efficient searches on google.


Definitions:

Search exact definitions for a word with google definition search. Type the word 'Define' before your keyword. For example DEFINE GADGET would yield first result as :




Phone number lookup


Enter a full phone number with an area code to display the details linked with that number. For instance :




Find PDF results only:


Add filetype: to your search to display results that only match a certain file type. For example, if you wanted to display PDF results only type: "dell xps" filetype:pdf -- this is a great way to find online manuals. Similarly other file types can also be searched


As in our case:





Calculator:


Use the Google Search engine as a calculator by typing a math problem in the search. For example, typing:100 + 200 would display results as 300.



Local search:


Visit Google Local enter the area you want to search and the keyword of the place you want to find. For example, typing: restaurant at the above link would display local restaurants.


GO ON UTILIZE THE POWER OF GOOGLE WITH THESE ULTIMATE TOOLS




Problem Steps recorder in windows 7


1. Problem Steps Recorder
As the local PC guru you're probably very used to friends and family asking for help with their computer problems, yet having no idea how to clearly describe what's going on. It's frustrating, but Microsoft feels your pain, and Windows 7 will include an excellent new solution in the Problem Steps Recorder.



When any app starts misbehaving under Windows 7 then all your friends need do is click Start, type PSR and press Enter, then click Start Record. If they then work through whatever they're doing then the Problem Steps Recorder will record every click and keypress, take screen grabs, and package everything up into a single zipped MHTML file when they're finished, ready for emailing to you. It's quick, easy and effective, and will save you hours of troubleshooting time.


Turning your windows 7 into a wifi hotspot


Windows 7 includes a little-known new feature called Virtual Wi-Fi, which effectively turns your PC or laptop into a software-based router. Any other Wi-Fi-enabled devices within range - a desktop, laptop, an iPod perhaps - will "see" you as a new network and, once logged on, immediately be able to share your internet connection.
This will only work if your wireless adapter driver supports it, though, and not all do. Check with your adapter manufacturer and make sure you've installed the very latest drivers to give you the best chance.
Once you have driver support then the easiest approach is to get a network tool that can set up virtual Wi-Fi for you. Virtual Router (below) is free, easy to use and should have you sharing your internet connection very quickly.


Virtual router

If you don't mind working with the command line, though, maybe setting up some batch files or scripts, then it's not that difficult to set this up manually. 


Why does Google name its Android products after desserts?





If you've been following tech news this week, you probably came across the term "Honeycomb," Google's unofficial name for its new Google Android operating system.
Honeycomb -- technically Android version 3.0 -- is significant because it's designed for tablet computers, not just smartphones.
But on a lighter note, what's up with that name?
As it turns out, all Android operating systems are named after desserts. And, just in case that wasn't nerdy enough for you, Google put these sugary names in alphabetical order.

Here's the edible Android timeline: Cupcake, Donut, Eclair, Froyo, Gingerbread and finally -- at least for now -- Honeycomb.
On this week's Tech Check podcast, a team of writers places bets on the next Android OS name. My guess: Icee. (Ice cream is too obvious. Sorry, Doug Gross). And guess what google has announced ICE CREAM SANDWHICH :p
The next logical question about this is simple: Why?
Google doesn't want to explain.
"It's kind of like an internal team thing, and we prefer to be a little bit -- how should I say -- a bit inscrutable in the matter, I'll say," said Randall Sarafa, a Google spokesman. "The obvious thing is that, yeah, the Android platform releases, they go by dessert names and by alphabetical order for the most part."
"For the most part" because two versions of Android, 2.0 and 2.1, were both called Eclair. And because Google won't say what it called the first two versions of Android, which you can assume started with "A" and "B."
"As far as the public knows, it started with Cupcake," Sarafa said.
"I have some ideas, but I don't actually know for sure," he said of the first two Android names. "That was, jeez, like four years ago."
A bit more geekery before you get on with your day: Google actually has built statues of these various Android desserts. They sit on the lawn at the company's headquarters in Mountain View, California.
There is a pretty surreal YouTube video of some guys wearing T-shirts and jeans (one has purple hair) and carting in the eclair statue.
"It's kind of a ridiculous thing to look at, right? They're huge," Sarafa said. "The gingerbread man is like 15 feet tall or something."
Of course, Google isn't the only hip-seeming tech company to employ quirky naming conventions. Apple's operating systems are named after cats, although there's some concern that they're running out of fearsome-sounding cat names


     How Actually Do File Recovery Softwares Work??????


Have you ever accidentally deleted a file on your computer, removed a file from your jump drive or even formatted a camera memory card? Or maybe you can’t find your music collection after a system crash or a malware infection compromised your hard drive? Fortunately, the lost files and folders can often be recovered by using the best data recovery software. But how does data recovery software work?
When you delete a file on your computer the first place it goes is to the recycle bin. Emptying the recycle bin makes the file far less accessible, but doesn’t actually remove it. What really happens behind the scenes when you “delete” a file is that the computer’s file system removes the path to access that file, and designates the space that the file is using as being available for future use when needed. The ones and zeros that make up the file are still there on your computer, hidden until they are overwritten with another file. Parts of the file may stay on your hard drive for years, while other traces may be replaced within hours.
One way to visualize this situation is with a book representing the file. Let’s say you decide you don’t want the book anymore, so you put it in a bin to donate it to a paper recycling company. When you first “delete” the book it is still very much intact and easy to get back simply by pulling it out of the recycle bin. When the recycling company picks up your pile of books and takes them to their facility (emptying the recycle bin), they rip off the cover and put the pages of the book in a pile of other paper to be recycled. The text and pages of the book (the contents of your file) are still there, but without the cover they’re much harder to locate, and in the shuffle you might lose a page or two. As the recycling facility gets more paper in they have to shred the book to make more room for others. Once the pages are shredded it is beyond repair, but up to that point there’s still the possibility of getting the book back; it just takes more work than you’re probably willing to sacrifice for the book.
data recovery analogy: how data recovery software works
In our analogy, data recovery software essentially saves you from going to the recycling facility and sifting through the piles of paper to find the pages of your book. The software can do all of that for you, and even rebind the book for you. The process requires special tools and costs time and money, but ultimately it’s worth it if you have to have that book back for some reason – like if the book is a novel you spent years on, a hand-written journal or even a family photo album.
So while deleted files are inaccessible and are in danger of being overwritten, you can often recover them completely with professional data recovery tools. Data recovery software is designed to scour the drive and locate any recoverable data, piecing it back together and providing it in a salvageable format. The best data recovery applications provide a preview of recovered files, filtered and searchable results, easy file restoration and additional tools.
File recovery programs can be used to resurrect files of any type or size, from pictures, music and videos to documents and spreadsheets. Data recovery software can locate and restore emails, executables and compressed files. The best file recovery software can even maintain the folder organization of your files, and it may be able to recover a complete partition or drive.
The best file recovery software is also broad in scope, equipped to recover files from all sorts of storage media, regardless of how they connect to your computer or what file structures they use. Most data recovery needs are for files on the hard drive or a USB jump drive, but you can also recover files from CDs, DVDs, camera cards, MP3 players, external hard drives and more.
Of course no data recovery software is perfect; if a file has been partially overwritten or otherwise compromised, the chances of any usable recovery are low, even with the best recovery software. But if it hasn’t been too long since you accidentally deleted the file, the chances of complete recovery are pretty good.........
So Now if u ever come across some accidently deleted files from any of your sto dont worry if it hadnt been too long... Get over my list of best five data recovery softwares here........


TOP FREE DATA RECOVERY TOOLS


The best way to recover from unexpected data loss is to be properly prepared. With one of the following tools on hand, you'll always be ready to save your data from the Reaper.

While the best defense against data loss is redundant and real-time backup, we understand that sometimes data loss sneaks right up on you. Whether your vacation pictures didn't make it safely from your camera to your computer or a bumbling roommate deleted the paper you've been working all week on, having emergency data recovery tools handy is crucial to getting your data back before it's gone forever. Earlier this week we asked you to share your favorite data recovery tools with us. We tallied up your favorites and now we're back with the nominees for best free data recovery tool.

TestDisk  (Windows/Mac/Linux)

Five Best Free Data Recovery ToolsTestDisk is a powerful open-source tool for recovering your data. Not only can TestDisk perform basic file recovery like undeleting accidentally deleted files from FAT, NTFS, and ext2 file systems, but it comes with a host of additional functionality. With TestDisk you can recover your boot sector from a backup, rebuild your boot sector, fix FAT tables, fix your MFT, locate the ext2/ext3 backup SuperBlock, copy deleted files from partitions to recovery media, and find lost partitions in dozens of formats to help you locate your lost data. It's a command line tool, so there's no GUI, but the menus and the documentation in the wiki should get you started without much trouble.

Recuva  (Windows)

Five Best Free Data Recovery ToolsRecuva is a user-friendly Windows-based tool. When you run Recuva, you can resurrect missing files using either the file-recovery wizard or the application's manual mode. The file-recovery wizard is handy when you're sure your data is gone but you're not quite sure where it went or how to get it back. The wizard lets you narrow your search type to pictures, music, documents, video, or all files, and you can set the search location to everywhere on your computer, removable media only, in My Documents, the Recycle Bin, or a specified location. If you don't need the wizard you can jump right into manual mode and get to work searching where you know the file should be. Recuva uses a green/yellow/red light system to indicate how probable the recovery of your files will be, and when available, it can provide previews image files available for recovery. Recuva also includes a tool to securely wipe files you find, handy if you're attempting a file recovery just to ensure the files are actually dead and gone.

PhotoRec  (Windows/Mac/Linux)

Five Best Free Data Recovery ToolsPhotoRec is a companion program to TestDisk, also included in this Hive Five. Like TestDisk, this app is also devoid of a GUI, but likewise is quite powerful at file recovery. We're including PhotoRec independently of TestDisk because many users distinctly prefer PhotoRec as a safer alternative when deep disk recovery isn't necessary. This recovery tool won't mess with your partitions or help you rebuild your master boot record; it will, however, dive into your disks in a safe, read-only mode and ignore partitions and file systems in an effort to seek out your missing files. PhotoRec focuses on file types, is operating-system agnostic, and despite its name, isn't relegated to just photos. Overall, PhotoRec is a powerful tool for quickly and safely copying your deleted files to another disk.

Restoration  (Windows)

Five Best Free Data Recovery ToolsRestoration is a tiny, no-frills, portable recovery tool. You can use it in all versions of Windows and Windows file systems. It lacks some of the advanced functionality of other nominees but does have basic file-name search and the ability to sort by file parameters such as size and filename. Despite its tiny size, it performed just as well as the other nominees when tasked with restoring files from our test disks. Restoration weighs in at a mere 406k and would make a great addition to any Windows-based USB toolkit.

Undelete Plus  (Windows)

Five Best Free Data Recovery ToolsUndelete Plus used to be commercial software but has gone on a lengthy "limited time offer" freeware run. This file recovery app works on all versions of Windows and incarnations of the FAT and NTFS file systems. Like Recuva, Undelete Plus assigns a recovery probability to files it finds based on how damaged the file is. You can sort files by type, set filters based on time and size to avoid sifting through every deleted file on your disk, and keep folder structures intact when you perform your recovery.

Digital Signatures For Mobile Phones

Did you ever wonder why does the applications like opera mini (in 90% cases) asks for a permission while connecting to the network or while reading or writing on your phone's memory????????????? i.e. something an error like this----ALLOW THIS APPLICATION TO CONNECT TO NETWORK.  




Most of us would answer NO in that case. But I am going to tell you a characterstic reason for that.


The easiest reason for the fact is that these applications are not digitally signed. Confused?????????? Ok let me explain what digital signatures are:


digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit. Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering.

The applications which we download through the phone manufacturer's official website like in case of Nokia THE OVI STORE, you always download a digitally signed application. But whenever the talk begins of a third party apps let me tell you those apps are never digitally signed. Ever heared about VERISIGN ? Or Thawte? Actually these are organisations which develop these digital signatures for mobile phones. These signatures are just to authenticate that no application can harm your digital device.

You might be wondering that opera is a trusted brand , then why do they themselves not give digitally signed application i.e. OPERA MINI. The answer is they do give digitally signed opera mini but their homepage provide an unsigned version. Don't worry I will explaining how to download a signed version of opera mini. Just follow these simple steps:

1. Go to Opera mini website with your phone's browser.
2. Now you might be seeing suggested downloads for your phone. Just ignore them and click on the link OTHER DOWNLOAD OPTIONS.
3. Now browse to the bottom and you will see a heading " OTHER OPTIONS FOR OPERA MINI 6.5 "(an example in our case).
4. Under that head there is a link provided saying SELECT CODE SIGNING CERTIFICATE.Click on that.
5.A new page opens up which might say AUTO DETECTION OF CODE SIGNING CERTIFICATE FAILED. No worries select a suitable certificate from the list of certificates given below. I would recommend selecting ALL CERTIFICATES as the certificates may vary from phone to phone.
6. Again a new page pops up asking for you to download OPERA MINI 6.5. Go ahead and click this link. Actually this is a digitally signed link.
7. You are ready to go once the application downloads.
8. Now to change the access permissions in your NOKIA phone goto the downloaded location. Open OPTIONS> APPLICATION ACCESS> COMMUNICATION>NETWORK ACCESS AND CHANGE IT TO ALWAYS ALLOWED.
9. You are ready to go. Now everytime you access internet with your application are need not give permissions your connecting to the network.
10. Please note that if you would have downloaded the unsigned application from the opera mini home page you will not be able to change the access permissions to always allowed.

Please comment if you like my post . Any suggestions are gratefully admired.

A Walk With Avast 7

Getting a paid security for your pc or your networks is not a tough job. But when it comes to a free security software we come with our hands muttering along to choose a good antivirus software for our pc. Although a number of antivirus softwares are available free of cost but the most fascinating free antivirus which I have been using past 5 years is Avast Free Antivirus.
Avast recently launched a new version AVAST FREE ANTIVIRUS 7. The software was a boombox. I came across several vibrant features which could never be found in a free security software. I am mentioning some of the special tools and features available in avast 7:





PROS:

1. The Cloud Services: With the all new avast 7 , a new feature has been added known as avast cloud services.
A special tool which keeps you connected to avast labs for downloading streaming updates. This feature makes sure that you are momentarily up to date with the latest virus definitions.





2. Avast Real Time Shields: A totally fresh tool. About 8 security shields to protect your pc from the most unpredictable threats. Whether its a spam or a malware or an adware or a trojan, avast's always there to care for your pc. The always active shields include web shield, file system shield, mail shield, p2p , IM, network, script and behaviour shield.





3. Avast Auto Sandbox : Fear of a program harming your system??????? No worries, the all time hit avast will automatically run the program into its AUTOSANDBOX. Any harm done by the program will totally be distracted by the software.



4. Avast BROWSER Protection: Although this feature was also included in the previous version but its quite intersesting. This feature grades the sites according to user votings. Visit only those sites which you find admirable.

5. The FASTEST  UPDATION OF VIRUS DEFINITIONS : Avast has been best in receving updates from the labs. Whether you are on a slow connection or a high speed 3G connection AVASTwill update itself as soon as you connect to the web.

6.  Avast REMOTE ASSISTANCE : THE BEST SHOULD BE KEPT FOR LAST. Keeping this thought in mind I reserved this feature to be mentioned at last. The sensational combination of an antivirus and a REMOTE ASSISTANCE software. Want to help your geek poor in computing to resolve his problem. Don't worry. Connect to him through avast remote assistance feature. Its swift, provides full access to a remote computer and most importantly works well even on a slow internet connection.



CONS:

The hard work of the avast team is always admirable but some issues still prevailing in the system such as repairing a infected system file is never done successfully. Also avast did not make much changes to the interface. Remember avast that basic and average and basic users recognize a newer version of a software through a new interface and a major group of comprises of those users.


Anyways you can download avast from the official  avast website.


If you admire my post kindly comment or like it.............

  

Are our networks still secured?


Blame a seemingly never-ending arms race between hackers and defenders and the fact that attackers are--for now--much more motivated to break in than companies are to keep them out.

RSA Executive Chairman Art Coviello offered theme songs for the security industry: The Rolling Stones' "You Can't Always Get What You Want" and Twisted Sister's "We're Not Gonna Take It."
(Credit: James Martin/CNET)
SAN FRANCISCO--Every year, security vendors gather at the RSA conference here to reaffirm their commitment to fencing out hackers and keeping data safe. And every year, corporate and government Web sites continue to fall victim to basic attacks. Heck, ubersecurity firm RSA itself was compromised not that long ago, as was digital certificate heavyweight VeriSign, even if it didn't admit it for two years.
In other words, very little changes from year to year beyond the buzzwords du jour bruited about by security vendors. "It's Groundhog Day," says Josh Corman, director of security intelligence at Akamai.
Art Coviello, executive chairman of RSA, at least had the presence of mind to be humble, acknowledging in his keynote that current "security models" are inadequate. Yet he couldn't help but lapse into rah-rah boosterism by the end of his speech. "Never have so many companies been under attack, including RSA," he said. "Together we can learn from these experiences and emerge from this hell, smarter and stronger than we were before."
Really? History would suggest otherwise. Instead of finally locking down our data and fencing out the shadowy forces who want to steal our identities, the security industry is almost certain to present us with more warnings of newer and scarier threats and bigger, more dangerous break-ins and data compromises and new products that are quickly outdated. Lather, rinse, repeat.
"The cybersecurity cycle will go on for the rest of our lives," predicts Rod Beckstrom, president and CEO of ICANN and former director of the U.S. National Cybersecurity Center. "The industry takes a long time to evolve."
Of course, while it's evolving, the rest of us are still coming to grips with existing vulnerabilities--to say nothing of trying to figure out which future problems are going to pose us the biggest headaches. This is a world, after all, with keyloggers that record bank account information. With "advanced persistent threats," or APTs, that conduct long-term industrial espionage. With government secrets left on unencrypted laptops and malware like Stuxnet apparently designed to sabotage national nuclear-arms programs.
The industry's sluggishness is enough to breed pervasive cynicism in some quarters. Critics like Corman are quick to note that if security vendors really could do what they promise, they'd simply put themselves out of business. "The security industry is not about securing you; it's about making money," Corman says. "Minimum investment to get maximum revenue."
Even if you're not quite as jaded as Corman, there are still two big--maybe insuperable--obstacles lying between us and security Nirvana. First, there's the seemingly endless arms race between hackers and defenders, one that shows no sign of slowing anytime soon.
Second, there's the fact that attackers are--at least for now--much more motivated to get in than companies are to keep them out.
Put together, it's enough to make almost anyone despair. One executive at a top security firm who asked not to be identified admitted that technology innovation is lagging behind the criminal hackers, whose motivation is greater than the level of risk corporations feel they face.
"Never before have so many spent so much and accomplished so little," he said.
Part of the problem is the increasing pervasiveness of networked computers, software, and social networks. There are more targets for attackers to hit. Twenty years ago we didn't have mobile phones and Facebook and Internet-connected power-grid controllers. Digital thieves are sneaking in new side doors before companies even realize they're unlocked.
And the attackers are fast learners, able to devise new methods for getting into computer systems even when strong defenses are in place. When antivirus software blocked malware, lurking villains came up with cunning social engineering tricks to lure you to the malware.
Making matters worse is the fact that the white hats are riding lame stallions and firing rusty revolvers. Models like antivirus signature updating--which protects only against known threats--are fundamentally broken, yet many companies still rely on them. The promises of Public Key Infrastructure have not materialized. Some hope that analysis of Big Data--the tons of log and network information housed within corporate systems--can identify points of weakness and block hackers. We'll see.
"We're fighting the problems, but they're not solvable," said David Perry, president of G Data Software North America. "Everyone has expected the magic bullet forever, but there is none."
Companies and consumers still want an easy fix, though--and that often plays right into the hands of hackers. When you see headlines about identity fraud and data breaches, it's much easier to buy a new antimalware package than to really analyze the problem and switch gears. "There's a mentality that we can solve the problem with another product," said Mary Landesman, senior security researcher at Cisco. If only it were true.
Getting companies to devote time and money to adequately address their security issues is particularly difficult because they often don't think there's a problem until they've been compromised. And for some, too much knowledge can be a bad thing. "Part of the problem might be plausible deniability, that if the company finds something, there will be an SEC filing requirement," Landesman said.
Of course, it would help if software in general was less buggy. Some security experts are pushing for a more proactive approach to security much like preventative medicine can help keep you healthy. The more secure the software code, the fewer bugs and the less chance of attackers getting in.
"Most of RSA, especially on the trade show floor, is reactive security and the idea behind that is protect broken stuff from the bad people," said Gary McGraw, chief technology officer at Cigital. "But that hasn't been working very well. It's like a hamster wheel."
This concept helped Microsoft improve its battered image 10 years ago after being hammered by viruses that infected tons of computers by exploiting holes in Windows. Microsoft launched its Software Development Lifecycle program to focus on building software with security in mind and it has been a success, making its products some of the most secure in the industry.
That sort of solution, though, isn't particularly scalable, especially not with coders churning out apps and applications to meet the demand for new apps on new devices. "We know how to build software with fewer bugs per square inch and we are getting much better at that," McGraw said. "The problem is we're building more square miles of code than ever before."
There is no easy answer, because there are so many aspects to security, said Bruce Schneier, chief security technology officer at BT.
"The fundamental problems are about using technology, implementation, user interface, installations, updates, all of those ancillary things," he said. "And there are economic barriers that people who deploy the technology don't have financial motivations to do so.... The person in charge of the problem doesn't have the ability to fix it and the person with the ability to fix it isn't in charge."
And no one wants to pay money to provide security for anyone else. Like pollution, security incidents are something everyone potentially contributes to and suffers as a result of. "This might be a fundamental mismatch that the market cannot resolve," without government intervention, Schneier said.


About Me

My photo
Jalandhar, Punjab, India
Basically a student and quite interested in technology............ Hoping a bright future in computing.........
Powered By Blogger