The Future of Mobile News

Half of all U.S. adults now have a mobile connection to the web through either a smartphone or tablet, significantly more than a year ago, and this has major implications for how news will be consumed and paid for, according to a detailed new survey of news use on mobile devices by the Pew Research Center’s Project for Excellence in Journalism (PEJ) in collaboration with The Economist Group.

via The Future of Mobile News – Pew Research Center.

News remains an important part of what people do on their mobile devices-64% of tablet owners and 62% of smartphone owners say they use the devices for news at least weekly, tying news statistically with other popular activities such email and playing games on tablets and behind only email on smartphones (not including talking on the phone). This means fully a third of all U.S. adults now get news on a mobile device at least once a week.

What Penetration Testers Find Inside Your Network

Why is network segmentation so important? “Today, there is still more focus on the perimeter than on internal network segmentation. Network engineers don’t realize that one successful social engineering or client-side attack could mean ‘game over’ once the attacker has that foothold,” Sanders says. Segmentation based on asset importance and level of trust is one of the most effective ways to prevent many of the attacks advanced attackers — and even himself — perform once inside a target network, he says.

via Tech Insight: What Penetration Testers Find Inside Your Network – Dark Reading.

Twitter, PayPal reveal database performance

Cole revealed that Twitter’s MySQL database handles some huge numbers — three million new rows per day, the storage of 400 million tweets per day replicated four times over — but it is managed by a team of only six full-time administrators and a sole MySQL developer.

via Twitter, PayPal reveal database performance – Software – Technology – News – iTnews.com.au.

Daniel Austin, a technology architect at Paypal, has built a globally-distributed database with 100 terabytes of user-related data, also based on a MySQL cluster.

Austin said he was charged with building a system with 99.999 percent availability, without any loss of data, an ability to support transactions (and roll them back), and an ability to write data to the database and read it anywhere else in the world in under one second.

20 Iptables Examples For New SysAdmins

This Linux based firewall is controlled by the program called iptables to handles filtering for IPv4, and ip6tables handles filtering for IPv6. I strongly recommend that you first read our quick tutorial that explains how to configure a host-based firewall called Netfilter (iptables) under CentOS / RHEL / Fedora / Redhat Enterprise Linux. This post list most common iptables solutions required by a new Linux user to secure his or her Linux operating system from intruders.

Via Linux: 20 Iptables Examples For New SysAdmins.

Docsis 3.1 Targets 10-Gig Downstream

ORLANDO — SCTE Cable-Tec Expo — The Docsis 3.1 platform will support capacities of at least 10Gbit/s downstream and 1Gbit/s upstream, a move that will certainly prolong the industry’s need to deploy fiber all the way to the home.

via Light Reading Cable – Cable – Docsis 3.1 Targets 10-Gig Downstream – Telecom News Analysis.

To hit its capacity targets, the cable industry wants to increase its spectral efficiency by about 50 percent. As expected, the new specs will do away with 6MHz- and 8MHz-wide channel spacing and instead use smaller (20KHz-to-50KHz-wide) orthogonal frequency division multiplexing (OFDM) subcarriers; these can be bonded inside a block spectrum that could end up being about 200MHz wide. (See Docsis 3.1 Will Change Cable’s Data Channels.)

The definition of ofdm from wiki.

Orthogonal frequency-division multiplexing (OFDM) is a method of encoding digital data on multiple carrier frequencies. OFDM has developed into a popular scheme for widebanddigital communication, whether wireless or over copper wires, used in applications such as digital television and audio broadcasting, DSLbroadband internet access, wireless networks, and 4G mobile communications.

And the primary advantage using ofdm is:

The primary advantage of OFDM over single-carrier schemes is its ability to cope with severe channel conditions (for example, attenuation of high frequencies in a long copper wire, narrowband interference and frequency-selective fading due to multipath) without complex equalization filters.  Channel equalization is simplified because OFDM may be viewed as using many slowly modulated narrowband signals rather than one rapidly modulated wideband signal.

Verizon draws fire for monitoring app usage, browsing habits

Verizon Wireless has begun selling information about its customers’ geographical locations, app usage, and Web browsing activities, a move that raises privacy questions and could brush up against federal wiretapping law.

via Verizon draws fire for monitoring app usage, browsing habits | Politics and Law – CNET News.

Verizon Wireless’ marketing literature acknowledges that it sells “mobile-usage data that offers insights on the mobile-device habits of an audience, including URL visits, app downloads and usage.” (Not all carriers do: Google guarantees that its proof-of-concept Google Fiber project “will not engage in deep packet inspection” except when necessary to fend off network attacks.)

Apple loses UK tablet design appeal versus Samsung

Apple still needs to run ads saying Samsung had not infringed its rights.

The US firm had previously been ordered to place a notice to that effect – with a link to the original judgement – on its website and place other adverts in the Daily Mail, Financial Times, T3 Magazine and other publications to “correct the damaging impression” that Samsung was a copycat.

via BBC News – Apple loses UK tablet design appeal versus Samsung.

Apple declined to comment. It can still appeal to the UK Supreme Court, otherwise the ruling applies across the European Union.

Hackers Exploit ‘Zero-Day’ Bugs For 10 Months On Average Before They’re Exposed

One aspect of zero-day exploits use that’s made them tough to track and count has been how closely targeted they are. Unlike the mass malware infections that typically infect many thousands of machines using known vulnerabilties, the majority of the exploits in Symantec’s study only affected a handful of machines–All but four of the exploits infected less than 100 targets, and four were found on only one computer.

via Hackers Exploit ‘Zero-Day’ Bugs For 10 Months On Average Before They’re Exposed – Forbes.

Unsurprisingly, the study shows that hackers target common software like Microsoft Word, Flash and Adobe Reader. Sixteen of the 18 zero-day exploits discovered and analyzed in the study affected Microsoft and Adobe software.

The New Microsoft Walled Garden

For the first time in the history of the PC, Microsoft is rolling out a new Windows ecosystem for which they will be the sole software distributor. If you buy Windows 8, the only place you will be able to download software that integrates with its new user interface will be the official Windows Store. Microsoft will have complete control over what software will be allowed there.

via Critical Detail.

This article has a very lengthy description of Microsoft Windows and MS-DOS describing  past evolution of the PC to where it is now going.  In essence, Microsoft want to be like Apple.  It will be interesting to see how this all plays out in the next year.  Here’s another blurb:

Now, this is apparently a point of some contention. Perhaps because Microsoft has not made a bigger deal about it in their press releases, not everyone believes that distributing software for the modern UI will require developers to get Microsoft’s permission. But they are wrong. In order to set the record straight once and for all, a complete, thoroughly researched analysis of Microsoft’s official publications on the subject is included as Appendix B to this article. It demonstrates that there is no method for developers to distribute modern UI applications to the internet at large without receiving explicit approval from Microsoft.

Pirate Bay Moves to The Cloud, Becomes Raid-Proof

“If one cloud-provider cuts us off, goes offline or goes bankrupt, we can just buy new virtual servers from the next provider. Then we only have to upload the VM-images and reconfigure the load-balancer to get the site up and running again.”

via Pirate Bay Moves to The Cloud, Becomes Raid-Proof | TorrentFreak.

The load balancer and transit-routers are still owned and operated by The Pirate Bay, which allows the site to hide the location of the cloud provider. It also helps to secure the privacy of the site’s users.