Blogy a osobní weby

Battery for Lenovo ThinkPad T410

IDC in December reckoned on compound annual growth rate of one per cent over five years for portable PCs, and a decline of 2.5 per cent for desktops. That’s alarming for Intel, which relies on a cadence of PC sales of three years in notebooks and four for desktops to help drive sales.Also, Intel has historically relied on new releases of Windows – businesses and consumers buy fresh PCs to cope with the system demands of Microsoft’s new OS.“When people move to a new operating system they almost always do so on new hardware so it’s a benefit to us as well,” Garrison said on a trip to the UK. He estimated people are “excited” about Windows 10, released in July, a fact that will drive PCs sales and therefore mean business as usual.“What you get from your old PC versus what you can buy is a significant cost for the business, plus the PC starts to wear out and break frequently,” Garrison said. But, if Gartner and IDC are correct, Windows 10 hasn’t so far (and won’t in the near future) do anything to prompt growing PC sales.Microsoft hasn’t exactly helped by giving Windows 10 away for free to download – an offer that, at times, has seen Microsoft forcing Windows 10 on existing users. Worse, Microsoft has said there will be no new versions of Windows after Windows 10 – that it’ll be incremental updates, instead.

Garrison reckoned this won’t hurt PC sales, and the raw fact that the older a PC becomes the slower and cruddier it gets, will somehow prick the conscience of corporate IT purchasers. “Do we expect to see any change in the hardware purchase? The answer is ‘no’. If they are on a three-year cycle we expect to see them still on a three-year cycle, he said.Intel won’t admit it, but Microsoft will (or has), and the author of the Windows client seems to have recognised both the implications and the limitations of its “free” policy. Microsoft will refuse to release updates for Windows 7 PCs to take advantage of new chipsets from January 2020 and January 2023 for 8.1.Whether it’s ignorance about ending support deadlines, lack of money to spend on new PCs, or just a willingness to gamble, Microsoft’s dangling of the carrot hasn’t forced them to upgrade in the past. It’s unlikely to do so in the future. On Tuesday, the California chip giant sprung this news on the world, revealing what it seemed to be saying was a really big secret: all this time, the sixth-gen Core family, launched in September, has had brand-spanking new multi-factor authentication support, and no one knew? Blow me down with a feather.

However, the technology appears to be an extension to various security mechanisms Intel has been eking out for years.The multi-factor authentication – dubbed Intel Authenticate – hopes to do away, in part, with passwords, and is aimed at businesses, large and small. Right down at the firmware layer, the chipset stores policies and authentication data that are supposed to be safe from hackers.Authentication data could, for example, be the user’s fingerprint, or a PIN. A policy could, for example, state that a recognized work-issued smartphone within close range of the machine, plus the entry of a correct PIN, is enough to log into the device. The policy could add that if the machine is not connected to a corporate network, then a smartphone within range, a valid PIN, and a valid fingerprint, read from a builtin sensor, is needed to unlock the computer.So, if you’re using a laptop in the office on the corporate Wi-Fi, with your phone on the desktop within Bluetooth range, all you need to do is type in a PIN to log back into the PC. If you’re in a cafe at the weekend, you’ll need to provide a fingerprint to make sure you’re not a thief.

Intel Authenticate embeds multi-factor authentication into hardware in the platform architecture, said Thomas Garrison, a vice president in Intel’s client computing group.By doing so, the most common software based attacks that steal user credentials through viruses or malware are rendered ineffective. Intel delivers a secure PIN, a Bluetooth proximity factor with your Android or iPhone, a logical location factor with vPro systems, and fingerprint biometrics.The operating system – so far Windows 7, 8 and 10 support Intel Authenticate – has to communicate with the firmware to get the yes or no confirmation for allowing the login. The OS isn’t supposed to see the fingerprint or the PIN, so it can’t be stolen by code running inside the kernel or in user space.If you can’t login – such as you lose your phone – you can optionally fall back to a password. It’s supposed to help employees who are bad at remembering complex passwords, and IT support desks who have to do daily resets for people.Intel Authenticate uses two firmware-level systems that give security researchers and privacy activists the heebie-jeebies: Intel’s Management Engine (ME), and Intel’s Active Management Technology (AMT). Both of these have been around for years, work below the operating system, and are mostly invisible to the layers of software above them. They are supposed to allow sysadmins to control machines remotely, but offer other features. AMT, for example, provides the network location detection used by Intel Authenticate.

The Management Engine built into the motherboard chipset provides the secure memory area for storing policies and the user’s authentication data, which aren’t allowed to leave the secure area nor allowed to be tampered with unless you’ve got the right privileges. This is supposed to stop miscreants from setting lax policies or swiping people’s login details.This is why you need a firmware download to activate Intel Authenticate; the software runs only on vPro editions of Intel’s new sixth-gen Core CPUs, aka the Skylake family. The Skylake vPro parts were announced this week.This whole system appears to be an iteration of the two-factor authentication methods we’ve seen before in Chipzilla’s business-friendly chips, such as the 2011 Sandy Bridge vPro parts, and the Broadwell vPro family in 2015. Back then, it was known as Intel Identity Protection, which provides support for two-factor authentication, such as logging in with a username, password and hardware token, or a username, password and one-time code sent to a smartphone.

Now, Intel’s added Bluetooth and fingerprint-reader support, made it a bit more user-friendly, thrown in PIN codes, and voila. It might explain why these two press releases on the vPro series, a year apart, seem so similar.A Canadian widow won’t have to go through the courts to get the password to her dead husband’s iPad after Apple, in the face of media pressure, withdrew its insistence on legal action.Last August 72-year-old Peggy Bush lost her husband to lung cancer and, among other belongings, was left her husband’s Apple laptop and iPad. But when she fired up the fondleslab she found it was password protected and her husband had neglected to write it down anywhere.I just had the iPad. I didn’t touch his computer, it was too confusing to me … I didn’t realize he had a specific password I should have known about … it just never crossed my mind, Bush told the Canadian Broadcasting Corporation.Her daughter got in touch with Apple support and explained the situation. The customer support operators said it wouldn’t be a problem – they would just need the will bequeathing the hardware to Mrs Bush, along with a death certificate.These she gathered, but when calling back the customer support representative claimed never to have heard of the case. Bush’s daughter spent the next two months being given the runaround, as she put it, before an Apple staffer told her they would need a court order to hand over the password.

Battery for Lenovo ThinkPad X300

“We need that first crack and we’ll look and look to find it,” he said. “There’s a reason its called and advanced persistent threat; we’ll poke and poke and wait and wait until we get in.”The goal is to find weak points, whether they be within the network architecture, or in staff who maybe work from home or bring in unauthorized devices. There’s also areas where the target network interconnects with other computer systems, like heating and ventilation controllers, which can be useful for an attack.Companies need to pay particular attention to cloud providers, he said. Once you use a cloud company you are essentially handing your data over to them and relying on their security, so he warned due diligence is even more important than usual.For the initial exploitation phase the key attack vectors are malware attachments in email, injection attacks from websites, and removable media – the latter being particularly useful for penetrating air-gapped systems that aren’t even on the network; Iran found that out the hard way with Stuxnet.Another common attack vector is common vulnerabilities and exposures (CVEs) that haven’t been patched, he said. Companies need to make automatic patching the norm to protect themselves against nation-state hackers he warned. As for zero-day flaws, he said they are overrated.“A lot of people think that nation states are running their operations on zero days, but it’s not that common,” he said. “For big corporate networks persistence and focus will get you in without a zero day; there are so many more vectors that are easier, less risky, and more productive.”

As for the NSA’s own collection of zero-day exploits, Joyce said that in fact the agency had very few and each new one was discovered was evaluated by an outside committee to see when software manufacturers should be informed to build a patch. The NSA doesn’t have the final decision on this, he claimed.To protect against this admins need to lock things down as far as possible; whitelisting apps, locking down permissions, and patching as soon as possible, and use reputation management. If a seemingly legitimate user is displaying abnormal behavior, like accessing network data for the first time, chances are they have been compromised, he said.Reputation-based tools are particularly useful against malware, Joyce explained. Signature-based antivirus won’t protect you against a unique piece of attack code, but when used in conjunction with reputation databases it can be effective – if code or a domain hasn’t been seen before there’s a high chance it’s dodgy.It’s amazing how often simple issues come up and allow access to target networks, he explained. Things like administrator credentials being left embedded in scripts, how many networks are unsegmented, and how often suspicious activity reported in network logs got missed.

He cited cases where NSA hackers have performed penetration testing, issued a report on vulnerabilities, and then when they go back two years later to test again found the same problems had not been fixed. When the NSA hacking squad comes back, he said, the first thing they do is investigate previously reported flaws and it’s amazing how many remain un-patched even after the earlier warning.Once inside a network, the next stage is to establish persistence, primarily by establishing software run lines or subverting other applications. Application whitelisting is key to locking down this phase of an attack he said.A 0-day security breach at Lincolnshire County Council has exposed locals’ medical records, addresses, and bank details, claimed an anonymous tipster, though the council denies any data was stolen.The breach was reported by The Lincolnite, which stated anonymous reports from inside the council suggested a major breach of its main adult care system had spaffed the sensitive personal information of constituents.Talking to The Register this morning, a council spokesperson denied that any data had been lost and claimed an email attachment with a zero-day exploit had managed to infect its internal system after being sent to multiple members of staff.In addition, The Lincolnite reported that another system which stored staff details and bank details, as well as the G Drive, which holds various other documents and forms, had been breached.According to the local paper’s source, emails were not initially affected by the breach, however the attackers’ access seems to have been extended to include them.

The council’s response has been to order staff to close their computers and turn the power off.Judith Hetherington Smith, the council’s CIO, told the local paper that the council closed down our systems very quickly to protect the data and are investigating the cause but at this stage have found no evidence of any breach.A spokesperson for Lincolnshire County Council added that, as a precautionary measure, [we] have suspended IT use until the extent of it is clear.As part of a campaign into UK councils’ cyber security conducted last year, The Register was told that Lincolnshire County Council’s AV solution(s) – the specifics of which the council declined to disclose – had thrown up 196,553 malware alerts in 2015.The Register has learned that the council has outsourced its IT operations to Serco since last April, although what AV solutions the outsourcer company uses has not been disclosed.The council told us that there had been 32 malware infections, via email, over that period. The areas and machines affected were not recorded, however. Faster, longer battery life, chip-based security – innovation is alive and well in its sixth-generation Core chips, Intel claims, with the company officially launching its sixth-generation Core vPro processors on Tuesday, wrapped in a series of changes it claimed would inevitably drive sales.

Two and a half times the performance of a fifth-gen CPU-powered laptop, three times the battery life, and four times faster wake-up are the promises. Also, we’re looking forward to Intel authenticate – multi-factor authentication that also works with PINs and biometrics in association with a smartphone.If the phone strays further than a specified Blue-toothy connection distance from the i7 vPro machine in question, it locks you out. No more PCs going walkies in public places, mid-session documents, and data open to plunder.PC makers are lining up behind the chips, claiming about 200 business PC designs – 160 for vPro and 30 ultra book designs. Machines are coming from Acer, Dell, Hewlett-Packard, Lenovo and others in a variety of form factors – 2 in 1s, ultra books, and desktops, you name it.The thrust is very much the business user, with Intel citing one Gartner analyst claiming the chips make PCs part of businesses’ overall security solution with users more secure and productive than ever.Innovation is still the industry’s muse: as a phrase it’s over used, often mischaracterised, and its application frequently divorced from cold, hard market realities. Explaining recent years’ falling PC sales and the eclipse of the PC by the tablet, vice president and general manager of Intel’s business client platform division, Tim Garrison, told The Register he believes the “innovation” on display now will shift boxes.

“Years ago we got in trouble [because] there wasn’t much innovation going into the PC. It was the same old PC we’d had for generations and people said ‘I don’t see a future here’, said Garrison. “Since then, with the sixth generation core, you see so much more innovation going on.”However, the PC market’s structural dynamics, which have blighted sales for the last few years, are still in place. PC makers, and those middlemen in the channel responsible for getting devices into the hands of buyers, remain saddled with a backlog of unsold PCs using old chips.They’ve been stuck for a variety of reasons: consumers flocking to new tablets, businesses holding out on Windows XP and Windows 7 on old PCs, and OEMs and channel partners burned by buying big into Microsoft’s promises on Windows 8.That was a version of Windows where Microsoft was playing the “innovation” card – innovation around the touch interface, which ultimately proved about as popular as John Lennon proclaiming the The Beatles were more popular than Jesus.Gartner this week reckoned 232 million traditional PCs would be shipped in 2016, equating to a 1.7 per cent drop on 2015. In the last quarter of 2015, 22.5 million PCs shipped into third-party sellers in EMEA, according to the research giant, a decline of 16.1 per cent year-on-year.

What do you think the coming adidas NMD Singapore

adidas NMD Singapore is surprising everybody with a lot of completely new NMD choices combined with some old favorites on adidas NMD Day this Thursday, April sixth. It would be simple to go missing maneuvering with the numerous colorways and press announcements we have seen in the last handful of days, so we have come up with a useful guide so that you can locate which pair you would like tomorrow. Incorporated within the mix are 4 NMD R1 options with 1 completely new colorway and three old standbys, 10 total NMD R2 pairs separated with a couple of standout women’s exclusives, the NMD City Sock 2 Ronin Pack featuring newer and more effective patterns, and three NMD XR1 options featuring new striped Primeknit.
It almost appears as though adidas NMD R1 Singapore and Kanye have differing intentions and desires, despite the fact that Kanye would be to adidas what Jordan would be to Jordan Brand, or at best somewhat exactly the same. Yet, while Kanye appears eager money Yeezy athletic shoes, adidas appears to become busy whipping up increasingly more new NMD colorways. Via their Twitter account, Finish Line lately advised sneakerheads to look for that Gray-colored variation from the adidas NMD R1 PK ‘Tri-Color.’
Included in a forthcoming ‘Glitch’ pack, the adidas NMD XR1 Singapore is featured and will also be released in another variation the coming year, this time around draped in solid gray. Featuring the defining glitch graphic through the upper with 3M reflective accents, the sneaker’s understated, yet eye-catching makeup is further pronounced with contrasting white-colored accents because of its signature three stripe motif, branded heel badge, boost sole unit and Avoi insert around the rear.

Další stránka »