The number of malware samples that use P-to-P (peer-to-peer) communications has increased fivefold during the past 12 months, according to researchers from security firm Damballa.
General packet radio service (GPRS)
GPRS (General Packet Radio Service) is a very widely-deployed wireless data service, available now with most GSM networks.
GPRS offers throughput rates of up to 40 kbps, enabling mobile handsets to access online services at a similar speed to a dial-up modem, but with the convenience of being able to connect from almost anywhere.
GPRS enables people to enjoy advanced, feature-rich data services, such as e-mail on the move, multimedia messages, social networking and location-based services.
General packet radio service (GPRS) is a packet oriented mobile data service on the 2G and 3G cellular communication system’s global system for mobile communications (GSM). GPRS was originally standardized by European Telecommunications Standards Institute (ETSI) in response to the earlier CDPD and i-mode packet-switched cellular technologies. It is now maintained by the 3rd Generation Partnership Project (3GPP).[1][2]
GPRS usage is typically charged based on volume of data transferred, contrasting with circuit switched data, which is usually billed per minute of connection time. 5 GB per month for a fixed fee or on a pay-as-you-use basis. Usage above the bundle cap is either charged per megabyte or disallowed.
GPRS is a best-effort service, implying variable throughput and latency that depend on the number of other users sharing the service concurrently, as opposed to circuit switching, where a certain quality of service (QoS) is guaranteed during the connection. In 2G systems, GPRS provides data rates of 56–114 kbit/second.[3] 2G cellular technology combined with GPRS is sometimes described as 2.5G, that is, a technology between the second (2G) and third (3G) generations of mobile telephony.[4] It provides moderate-speed data transfer, by using unused time division multiple access (TDMA) channels in, for example, the GSM system. GPRS is integrated into GSM Release 97 and newer releases.
finnix
Finnix is a self-contained, bootable Linux CD distribution (“LiveCD”) for system administrators, based on Debian. You can mount and manipulate hard drives and partitions, monitor networks, rebuild boot records, install other operating systems, and much more. Finnix includes the latest technology for system administrators, with Linux kernel 3.0, x86 and PowerPC support, hundreds of sysadmin-geared packages, and much more. And above all, Finnix is small; currently the entire distribution is over 400MiB, but is dynamically compressed into a small bootable image. Finnix is not intended for the average desktop user, and does not include any desktops, productivity tools, or sound support, in order to keep distribution size low.
Google Nexus
Google Nexus is a line of mobile devices using the Android operating system produced by Google in conjunction with an original equipment manufacturer (OEM) partner. Devices in the Nexus series[1] do not have manufacturer or wireless carrier modifications to Android (such as custom graphical user interfaces), and have an unlockable bootloader[2] to allow further development and end-user modification.[3] Nexus devices are the first Android devices to receive updates to the operating system.[4][5][6] The Galaxy Nexus is one of the few smartphones recommended by the Android Open Source Project for Android software development.[7] As of November 2012[update], the latest devices in the series are the Nexus 4 phone by Google and LG, and the Nexus 7 and Nexus 10 tablet computers by Google with Asus and Samsung respectively.
ClockWorkMod
ROM Manager is a Android front end to the Clockwork Recovery image.
http://www.clockworkmod.com/rommanager
http://www.clockworkmod.com/
Zachman y los seis honestos de Kipling
I keep six honest serving-men
(They taught me all I knew)
Their names are What and Why and When And How and Where and Who
Uno de los dichos de mi buen amigo Ángel es sobre la gracia del gringo, ese gringo mítico de poderes de Comic, para tomar algún concepto del sentido común y convertirlo en un producto mercadeable. Un ejemplo interesante de esto es el marco de Zachman para arquitecturas empresariales. Todo un icono en la comunidad de arquitectura de datos. Se basa en el patrón de analizar problemas con una matriz de puntos a revisar. En el marco de Zachman las columnas corresponden a los seis interrogantes en ingles y las hileras a diferentes roles en el desarrollo de una aplicación empresarial. De este sencillo concepto Zachman desarrolla todo una teoría detallada de cómo documentar y administrar un proyecto de desarrollo de un sistema empresarial basado en un modelo entidad-relación.
WHAT’S WRONG WITH THE ZACHMAN FRAMEWORK? Extending the RUP with the Zachman Framework
Los operadores de copia e igualdad.
Una de las trampas de la orientación a objetos en lenguajes como C# son los operadores de copia e igualdad.
En C# al usar el operador = o ==, la igualdad entre objetos referenciados solo se da si en realidad es el mismo objeto y de manera similar al hacer una copia nos podemos llevar una sorpresa si no tenemos cuidado de estar copiando la referencia o el contenido. Por eso la interfaz ICloneable es controversial porque su significado es ambiguo
Referencias:
Implementar ICloneable mediante serialización
Should we Obsolete ICloneable (The SLAR on System.ICloneable)
IClonable deep vs shallow, best practise
The true root causes of software security failures
Developers being overly trusting is one of them.
7 steps to securing Java
Java, the popular OS-independent platform and programming language, runs on just about every kind of electronic device imaginable, including computers, cell phones, printers, TVs, DVDs, home security systems, automated teller machines, navigation systems, games and medical devices.
Apple keeps patching Java on OS X Snow Leopard after proposed drop-dead date
Apple on Tuesday patched Java for the aged OS X Snow Leopard and tweaked Safari to give users more control over what websites they let run the vulnerability plagued Oracle software.