Tuesday, 4 October 2011
Sunday, 2 October 2011
Friday, 30 September 2011
Egg Freckles | Faq
Saturday, 24 September 2011
Thursday, 15 September 2011
News.me | What a Band Really Makes from Streaming Sales
View full story at http://gizmodo.com/5840580/what-a-band-really-makes-from-streaming-sales
Sunday, 11 September 2011
Article: Home Improvement Store, Lowe’s, Deploying 42,000 iPhones
Home Improvement Store, Lowe's, Deploying 42,000 iPhones
http://www.macstories.net/news/home-improvement-store-lowes-deploying-42000-iphones/
(Sent from Flipboard)
Thursday, 1 September 2011
Article: Student Ryan Kessler Transformed His Workflow, Raised His GPA and Left His Textbooks at Home (Back-to-School Series)
Student Ryan Kessler Transformed His Workflow, Raised His GPA and Left His Textbooks at Home (Back-to-School Series)
http://blog.evernote.com/2011/09/01/student-ryan-kessler-transformed-his-workflow-raised-his-gpa-and-left-his-textbooks-at-home-back-to-school-series/
(Sent from Flipboard)
Wednesday, 31 August 2011
Article: One in five Britons feel unsafe when online
One in five Britons feel unsafe when online
http://www.guardian.co.uk/technology/2011/aug/31/britons-feel-unsafe-online
(Sent from Flipboard)
Tuesday, 23 August 2011
Article: Apple’s iPad Replacing Cash Registers at Major Retailers
Apple's iPad Replacing Cash Registers at Major Retailers
http://www.cultofmac.com/apples-ipad-replacing-cash-registers-at-major-retailers/109933
(Sent from Flipboard)
Wednesday, 3 August 2011
NHS database: Digital disaster unit 8 project management
3 Aug 2011 20:23:20
A project that was supposed to transform patient care in England has achieved little except enrich IT consultants and waste billions
The figures speak for themselves. This week's public accounts committee (PAC) report on the NHS national computer system uses moderate language, but ought to cause outrage. It underlines the calamity of a project that was supposed to transform patient care in England but which has instead achieved little except enrich IT consultants and waste billions.
The scheme was launched in 2002, with a budget of £11.4bn, of which £6.4bn has already been spent. "The possibilities are enormous if we can get this right," Tony Blair promised at the start, overlooking the possibility of getting it wrong. The aim was to replace paper medical records with a centralised national electronic database, allowing a patient from Hull to walk into a hospital in Hereford and find all their details ready at the click of a mouse.
It never happened. The scheme quickly degraded into a mass of regional and incompatible systems, provided by two companies, BT and Computer Sciences Corporation , who have been paid about £1.8bn. Neither has been able to deliver even the reduced capability specified in their contracts. BT is being paid £9m to install systems at each NHS site, although other parts of the NHS outside the national programme are paying the same company only £2m for the same systems. For once the cliche is true. The PAC report really is a catalogue of disaster.
There are lessons in the report for all policymakers. As the failure of the NHS private finance scheme has also shown, the government is an inept purchaser of private services: indecisive, ponderous, overambitious and wasteful. Mass centralisation does not reduce costs, but it kills flexibility. Under the national scheme, NHS professionals were given expensive systems with little discussion of what would actually help them do their jobs. The project was carried along by the momentum of its scale and the sense that having spent so much it would be wrong to pull out (pressures that have also wrecked the defence budget, as a report from the defence select committee reminded people on Wednesday).
Most of all, though, the PAC report challenges the current government. The problem began under Labour but it has continued under the coalition. The committee suggests that £4.3bn might be better spent elsewhere and that perhaps the programme should be scrapped. It also warns that the planned NHS reorganisation will only make things worse, since it proposes abolishing the organisations currently managing the programme. Past failure, current failure and future failure: a warning for all governments that big ambitions and bigger budgets do not automatically deliver big success.
Health
NHS
e-Government
Computing
guardian.co.uk © Guardian News & Media Limited 2011 | Use of this content is subject to our Terms & Conditions | More Feeds
--
Tuesday, 2 August 2011
Village voice
http://www.bbc.co.uk/go/rss/int/news/-/news/business-14328157
Sent from my iPhone
Saturday, 30 July 2011
Monday, 25 July 2011
Article: Hugo Chávez uses Twitter to run Venezuela from hospital bed
Hugo Chávez uses Twitter to run Venezuela from hospital bed
http://www.guardian.co.uk/world/2011/jul/22/hugo-chavez-twitter-venezuela-hospital?CMP=twt_atn
(Sent from Flipboard)
Sent from my iPad
Friday, 22 July 2011
Thursday, 21 July 2011
Article: Major overhaul makes OS X Lion king of security • The Register
Major overhaul makes OS X Lion king of security • The Register
http://www.theregister.co.uk/2011/07/21/mac_os_x_lion_security/
(Sent from Flipboard)
Sent from my iPad
Wednesday, 20 July 2011
Tuesday, 19 July 2011
Article: full story (The Dark Arts)
full story (The Dark Arts)
http://www.vanityfair.com/business/features/2011/06/rupert-murdoch-news-of-the-world-201106?printable=true
(via Instapaper)
Sent from my iPad
Saturday, 16 July 2011
BBC News - TEDGlobal 2011: Simple tech aids developing world
Digital divide
Sent from my iPhone
Thursday, 14 July 2011
Sunday, 3 July 2011
Article: South Korea plans to convert all textbooks to digital, swap backpacks for tablets by 2015
South Korea plans to convert all textbooks to digital, swap backpacks for tablets by 2015
http://www.engadget.com/2011/07/03/south-korea-plans-to-convert-all-textbooks-to-digital-swap-back/
(Sent from Flipboard)
Regards
Monday, 20 June 2011
Monday, 6 June 2011
Friday, 3 June 2011
E-mail hack attacks an 'epidemic'
E-mail hack attacks an 'epidemic'
Sophisticated e-mail attacks that single out high-value individuals are proliferating rapidly, say security experts.
Google Discloses China-Based ‘Hijacking’ of Gmail Accounts
Google Discloses China-Based 'Hijacking' of Gmail Accounts
Amir Efrati, reporting for the WSJ:
Google Inc. said it uncovered a computer attack from China targeting prominent users of its Gmail service, potentially further complicating relations between the Internet giant and the country with the highest number of Internet users.
Google said hundreds of Gmail users, including U.S. government officials, Chinese activists and journalists, were tricked into sharing their passwords with "bad actors" based in China. The attackers were able to read and forward the victims' email.
Wednesday, 1 June 2011
Tuesday, 31 May 2011
Saturday, 28 May 2011
WikiLeaks accused Bradley Manning 'should never have been sent to Iraq'
I saw this and thought you should see it:
http://www.guardian.co.uk/world/2011/may/27/bradley-manning-wikileaks-mentally-fragile
Regards
Thursday, 26 May 2011
Wednesday, 25 May 2011
US to store passenger data for 15 years (from Google Reader)
http://www.guardian.co.uk/world/2011/may/25/us-to-store-passenger-data
--
Martin H
NHS IT system condemned - Public Sector IT
A2 topic: project management gone wrong, read the comments at the bottom of the article for some key problems with such huge systems.
Sunday, 22 May 2011
BBC News - The right to be let alone
BBC News - The right to be let alone
Law vs technology - life in the info age
Wednesday, 18 May 2011
Check out this podcast episode
If you have iCatcher! for you iOS device your can use this link iCatcher Import Link to import it
Their website is here
The podcast feed is here
Get iCatcher! here on the App Store
BBC E-mail: NHS e-records 'achieving little'
** NHS e-records 'achieving little' **
Patients are getting "precious little" from the £7bn NHS electronic
care records system in England, a watchdog says.
< http://www.bbc.co.uk/news/health-13430375 >
** BBC Daily E-mail **
Choose the news and sport headlines you want - when you want them, all
in one daily e-mail
< http://www.bbc.co.uk/email >
** Disclaimer **
The BBC is not responsible for the content of this e-mail, and
anything written in this e-mail does not necessarily reflect the BBC's
views or opinions. Please note that neither the e-mail address nor
name of the sender have been verified.
Regards
Mr M Highmore
Sent from my iPad
Article: Nintendo Takes Heat for 3DS Bricking Policy, Rights to User Content
Nintendo Takes Heat for 3DS Bricking Policy, Rights to User Content
http://technologizer.com/2011/05/17/nintendo-3ds-bricking-and-content-rights/
(Sent from Flipboard)
Regards
Sunday, 15 May 2011
Being British: How has the internet affected our national identity?
I saw this and thought you should see it:
http://www.guardian.co.uk/technology/2011/may/15/aleks-krotoski-britishness-internet
Sent via the Guardian's iPhone application.
Get it here
Regards
Saturday, 7 May 2011
Raspberry Pi - the £15 computer
http://www.youtube.com/watch?v=pQ7N4rycsy4&feature=youtube_gdata_player
Mr M Highmore
Sent from my iPhone
Thursday, 5 May 2011
Link from Tweetbot
(Source: http://twitter.com/BBCNews/status/66021531771338752)
Mr M Highmore
Sent from my iPhone
Wednesday, 4 May 2011
Wednesday, 13 April 2011
Sunday, 20 March 2011
Friday, 18 March 2011
10 Hot IT Skills Now - Intelligence - News & Reviews - Baseline.com - Baseline Mobile
See mobile devices are in the list eg iOS and android.
Mr H
Sent from my iPhone
Thursday, 17 March 2011
Wednesday, 16 March 2011
Tuesday, 15 March 2011
William Shatner explains what microprocessors are and do... from way back in 1976 -- Engadget
SXSW 2011: The internet is over | Technology | The Guardian
Regards
Mr M Highmore
Sent from my iPad
Friday, 4 March 2011
Wednesday, 2 March 2011
Cover work for Wednesday 2/3/2011
Carry on working on ebook. Email a PDF of screenshots showing your main menu, main section menus and the digital divide section to mhighmore@shsg.org.
Remind students that they should have uploaded their security reports to fronter.
Sent from my iPad
Monday, 28 February 2011
Database tasks
Anonymous vs. HBGary: the aftermath
The fallout from the whole debacle endures. In the wake of the attack, HBGary's Penny Leavy and Greg Hoglund (they are married) entered the Anonymous IRC channel #ophbgary to plead in vain for Greg's e-mails to stay private. (Several less relevant remarks have been removed from the transcript for easier reading.)
< greg> so you got my email spool too then
<&Sabu> yes greg.
<@`k> greg we got everything
< Agamemnon> Greg, I'm curious to know if you understand what we are about?
Do you understand why we do what we do?
< greg> you realize that releasing my email spool will cause
millions in damages to HBGary?
<@`k> yes
< c0s> greg: another reason its not out yet.
< Agamemnon> yes we do greg
<@`k> greg is will be end of you :) and your company"
Anonymous vs. HBGary: the aftermath
Interesting cyber war between security company and the anonymous hacking group.
Unit 2 database task
Wednesday, 23 February 2011
Article: Why Has Google Been Collecting Kids’ Social Security Numbers Under the Guise of an Art Contest?
Why Has Google Been Collecting Kids' Social Security Numbers Under the Guise of an Art Contest?
http://www.huffingtonpost.com/bob-bowdon/why-has-google-been-colle_b_825754.html
(via Instapaper)
Sent from my iPad
Tuesday, 22 February 2011
Monday, 21 February 2011
How to beat technology addiction
I saw this and thought you should see it:
http://www.guardian.co.uk/education/2011/feb/14/information-overload-research
Sent via the Guardian's iPhone application.
Get it here
Sent from my iPhone
Friday, 18 February 2011
1.7 Million Patient Records in Massive Data Heist at NYC Hospitals - Latest News
1.7 Million Patient Records in Massive Data Heist at NYC Hospitals - Latest News
Thieves made off with the personal health records of about 1.7 million New Yorkers' when they stole backup tapes from four Bronx hospitals in December, the city's Health and Hospitals Corp. revealed.
Cyber crime costs Britain �27bn a year | Metro.co.uk
Cyber crime costs Britain �27bn a year | Metro.co.uk
Wednesday, 16 February 2011
Tuesday, 15 February 2011
Monday, 14 February 2011
Article: iPads storm the enterprise | Tablets
iPads storm the enterprise | Tablets
http://www.macworld.com/article/157880/2011/02/ipad_enterprise.html?lsrc=twt_macworldbiz
(Sent from Flipboard)
Sent from my iPad
2,500 UK web sites hacked every hour - 02 Nov 2010 - Computing News
The Mobile Device Challenge | Blog Central
Global Energy Industry Hit In “Night Dragon” Attacks | Blog Central
BBC News - Technology of Business
Example of Phishing
From: HM Revenue & Customs <info@hmrc.gov.uk>Date: 14 February 2011 09:56:23 GMTSubject: [BULK] Tax Refund NotificationFrom: HM Revenue & Customs (info@hmrc.gov.uk<mailto:info@hmrc.gov.uk>) [http://./clear.gif]
Sent: Mon 2/14/11 9:02 AM
To:
[http://www.businesslink.gov.uk/Horizontal_Services_images/logo.gif]
Tax Refund Notification
After the last annual calculations of your fiscal activity, we have determined that you
are eligible to receive a tax refund of 468.50 GBP. Please submit the tax refund
request and click here by having your tax refund send to your bank account in due time
Please Click Here <http://www.xsima.com/front/libraries/pear/archive_tar/hmrc/hmrc/refundportal.htm> to have your tax refund to your bank account, your tax refund will be sent
to your bank account in due time take your time to go through the bank we have on our list
Note : A refund can be delayed a variety of reasons, for example submitting invalid
records or applying after deadline.
Best Regards
HM Revenue & Customs
[http://www.hmrc.gov.uk/images/log_dg.gif]<http://www.businesslink.gov.uk/bdotg/action/home> © Crown Copyright<http://www.hmrc.gov.uk/copyright/index.htm> | Terms & Conditions<http://www.hmrc.gov.uk/terms/index.htm> | Privacy Policy<http://www.hmrc.gov.uk/about/privacy.htm> | Accessibility<http://www.hmrc.gov.uk/about/accessibility.htm> [http://www.hmrc.gov.uk/images/log_bl.gif] <http://www.direct.gov.uk/en/index.htm>
Friday, 11 February 2011
How likely is it that the Internet could be shut off in the US by the government?
Internet blackouts - Reaching for the kill switch - this could be used as research for Unit 1 - the ebook
Article: Your Guide to Crimeware Apps | Magazine
Your Guide to Crimeware Apps | Magazine
http://www.wired.com/magazine/2011/01/st_crimeware/
(Sent from Flipboard)
Sent from my iPad
Thursday, 10 February 2011
Commentary on security report exemplar
The evidence for this strand is given in context of transactional websites which is good practice. Cookies, spyware and hacking are identified as threats and explained. Various methods of prevention are also described and these include encryption, SET, firewalls and virus protection. The Data Protection Act is covered. However, there is no mention of the Computer Misuse Act. There is sufficient evidence to reach mark band 2 but there is an insufficient number of preventative measures and legislation described to access all the marks in this mark band.
4 marks out of 6
Information Security Threats in the Second Quarter of 2010 - Securelist
Information Security Threats in the Second Quarter of 2010 - Securelist
Information Security Threats in the Second Quarter of 2010 - Securelist - up to date list of current ICT threats
Can Firefox 3.5 wean universities off their IE addiction? | ZDNet
http://www.zdnet.com/blog/igeneration/can-firefox-35-wean-universities-off-their-ie-addiction/1969
Is it a good idea to move to another browser with less security issues, bear in mind most companies and organisations, including SHSG use IE as their main browser on all machines.
FW: Recent IE security flaw is one flaw too many: Time to jump ship?
Feed: iGeneration Blog RSS | ZDNet
Posted on: 01 February 2011 18:37
Author: Zack Whittaker
Subject: Recent IE security flaw is one flaw too many: Time to jump ship?
A new critical security vulnerability in Internet Explorer has been exposed, allowing attackers to obtain personal information by running malicious scripts on websites. As Adrian Kingsley-Hughes reports, this affects all users of Windows. In total, its estimated to affect 900 million people worldwide. Nearly one billion people. That's nearly one in six of all people on the planet. Enough is enough. I think it's time to jump ship, don't you? For me, this is too much, and one step too far. There is near no doubt that Internet Explorer 9, the latest incarnation of the browser, soon to be out in release candidate stage, is the most secure, dynamic and powerful yet. But without effective systems in place to prevent lax security and quality assurance, to the actual fixes themselves, millions of users, in particular pirate copy users of Windows will go about unpatched. The simplicity factor in being able to patch the browser is another problem users of Internet Explorer have. Both Google Chrome and Mozilla Firefox update on a regular basis with fixes, tweaks and community submitted reports. Firefox reports on these changes and asks for permission to update - seemingly out of respect and courtesy, whereas Chrome updates constantly through a running background service. But when Internet Explorer is found to suffer from such wide scale vulnerabilities, the general public have to resort to being told by the technology media, rather than the browser itself. And in my experience, the Windows Update service is too slow. Nearly a full day after this was discovered, the only update I have on my machines is a definition update for Microsoft's anti-virus program. It's not good enough. With this particular flaw exploiting scripts and attaining information held on the computer, combined with the fact that so many enterprise workplaces and universities run the browser on their Windows machines, huge quanitites of data could be harvested. Is it time for an Internet Explorer mass exodus? |
ICT legislation
Legislation affecting IT.
- The Data Protection Act. - http://news.bbc.co.uk/1/hi/uk/3344075.stm
- aimed at protecting the rights of the individual to privacy.
- If an organisation holds data on individuals it must register under the act.
- Personal Data should be processed fairly and lawfully.
- Personal Data should be held only for registered purpose/s.
- Personal Data should not be disclosed in anyway other than lawfully and within the registered purpose.
- Personal Data held should be adequate and relevant and not excessive for the required purpose.
- Personal data should be accurate and kept up-to-date.
- Personal data should not be kept for longer than is necessary.
- Data must be processed in accordance with the rights of the data subjects.
- Appropriate security measures must be taken against unauthorised access.
- Individuals should be informed about the data stored and should be entitled to have access to it and be able to correct errors.
- Personal data cannot be transferred to countries outside the European Union unless the country provides an adequate level of protection.
- The Computer Misuse Act - http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
- Before this act it was not possible to prosecute a 'hacker'. The act created 3 new offences.
- Unauthorised access to computer material (viewing data which you are not authorised to see).
- Unauthorised access with intent to commit or facilitate commission of further offences (hacking).
- Unauthorised modification of computer material.
- Copyright Designs and Patents Act - http://news.bbc.co.uk/1/hi/england/somerset/8221014.stm
- This act protects software developers from having their software copied and pirated.
- A software audit should be carried out by an organisation to ensure all its software is legal.
- Health and Safety - not applicable to the security report
- Both employers and employees are obliged to implement the relevant Health and Safety provisions, which are designed to provide a safe and healthy working environment.
BBC - GCSE Bitesize: Types of computer misuse
HowStuffWorks Videos "It's All Geek to Me: Wireless Internet Security"
BBC - Can the whole of London go wi-fi?
However, a recent investigation by Watchdog revealed that some users of wi-fi hotspots are susceptible to attack by hackers - leaving tens of thousands of users at risk of fraud.
When using wi-fi your data (e-mails, internet addresses, keystrokes) is being transmitted across the airwaves and encrypted for security. It is possible malicious hackers can intercept this data unless you set up a security such as a remote access virtual private network (VPN).
This is something advised by major providers of wi-fi but not often set up by the user."
How-To: Remotely Wipe an iPhone Using Exchange: Apple News, Tips and Reviews �
Full disk encryption for desktops, laptops, and USB devices | Whole Disk Encryption
1Password | Videos
BBC News - Gawker hack triggers password resets at major sites
BBC News - Hacker faces jail over poker chip theft
The Hacker Crackdown - Wikipedia, the free encyclopedia
Threats caused by employees
- Telling outsiders their password, or other security info
- Taking sensitive information away on paper, usb pen, ipod, via email, fax, or mobile phone.
- Clicking on an unsafe link in an email.
- Forgetting to lock their screen when away from the computer.
- Using an insecure password.
- Bringing in an virus infected usb pen.
- Losing their company laptop.
- Can you think of any more?
Threats to consider for the security report
Threat | Notes about this threat | How could your business safeguard against this threat? |
Unauthorised access | | |
Hacker | | |
Cracker | | |
Phreak | | |
Pirate | | |
Virus Author | | |
Password cracker | | |
Key logger | | |
Employee | | |
Viruses | | |
Worms | | |
Trojans | | |
Unauthorised access | | |
Natural Disasters | | |
Malicious damage | | |
Technical failures | | |
Human errors | | |
Theft | | |
Confidentiality | | |
Security report criteria
Structure:
1. Description of threats (use articles - put into your own words to illustrate and backup your points.)
2. Measures to prevent the threats
3. Legislation that is working to prevent the threats
4. Assessment of the measures being taken to prevent the threats.
security threats ict - Google Search
Are you a middle-class pirate? This man wants a word with you... - Telegraph
Monday, 7 February 2011
How a Remote Town in Romania Has Become Cybercrime Central
Thursday, 3 February 2011
Wednesday, 2 February 2011
Exams come to the bedroom with new invigilation software | Education | The
Sent from Read It Later
Sent from my iPhone
Tuesday, 1 February 2011
Monday, 24 January 2011
Simply the fastest, easiest way to download video from YouTube
Simply the fastest, easiest way to download video from YouTube
Have you ever been browsing YouTube and seen something that you absolutely had to have? Not that we're condoning the theft of intellectual property, but if this has ever happened to you, then we have your solution. What does it take? All you have to do is remove a few letters from the URL and add two others in their place.
Need the example? Here you go. Let's say that you're watching an Eminem video from Vevo's section on YouTube. Note the URL:
Now, pay attention to the www. (or http://www. if you're not using Chrome). Highlight that section of the url and replace that with "nt". What you should be left with is an address bar that looks like this:
Now, press enter. You should start seeing a direct download of the MP4 file for that video. Play it back with any compatible player and you're viewing the exact same thing that you'd see on YouTube. Granted, it appears to download the file that is related to the specific URL, so if you're viewing a 320 version and would like the 1080, you'll need to find the URL for the 1080 video.
Taking a look at the domain for ntyoutube.com, there is a rather nondescript bit of text that doesn't tell us much more than we already know. It's registered to a gentleman named Scott Jackson (who links himself in the text) and it seems that he might have just stumbled onto the process:
I have no idea what this does. I just typed random characters into TextMate for a little while. Apparently, if you add "nt" to the start of a YouTube video URL, you'll get an mp4 version of the video. I don't know.
We've no doubt that this will disappear soon, but if you have an explanation in the mean time, we'd love to hear it in the comments. Thanks to Viticci for the heads up.
Saturday, 1 January 2011
Article: Slideshow: The evolution of hard drives
Slideshow: The evolution of hard drives
http://www.macworld.com/article/156758/2010/12/harddriveevolution.html?lsrc=rss_main
(Sent from Flipboard)