Articles Posted in Information Technology

Udated March 17, 2010.

On Tuesday March 16, 2010 the U.S. Federal Communications Commission (FCC) announced a proposal to overhaul the U.S. broadband* policy by introducing a plan that would provide higher speed internet access and much faster internet connections thoughout the U.S. than are presently available. The plan sets a goal of connecting 100 million U.S. households to broadband connections of 100 megabits per secondf, at least 20 times faster than most home connections now, by 2020.

The plan also calls for every american conmunity to have at least one “anchor” institution, such as a school, library, or hospital that has ultra high speed internet access. The FCC defines ultra high speed in this eontext as at least a gigabit per second, 10 times faster than the 100 megabit per second envisioned for home connections.

Mary Alice Baish, Director of Government Relations and Emily Feldman, Advocacy Communications Assistant (both of the American Association of Law Libraries, AALL), have been doing a tremendous job serving as advocates for high quality and highly accessible legal information on the web in a format that can be authenticated.

The following is an e-mail from Emily which mentions the work of the White House open government working group and includes a request for suggestions regarding specific types of information and datasets you would like to see agencies publish. Although Emily’s e-mail is directed primarily to law librarians I am posting it here because of the value of this initiative to the entire legal community.

FROM: Emily Feldman March 10, 2010

The 2010 CyberSecurity Watch Survey, sponsored by Deloitte and conducted in collaboration with CSO Magazine, the U.S. Secret Service, and the CERT Coordination Center at Carnegie Mellon, indicates that threats posed by cyber crime have increased faster than potential victims — or cyber security professionals — can cope with, placing targeted organizations at significant risk.

While we cannot provide you a copy of the actual Survey, the Deloitte whitepaper, Cyber Crime: A Clear and Present Danger reports on several of the survey findings and includes Deloitte’s interpretation of key results. Quoting from the Introduction to the white papter: “By its very nature, interpretation goes beyond simple reporting of results…and may prompt disagreement and even controversy”

With that, we invite you to download the white paper from the link below, read it, and draw your own conclusions

The webcast of Eben Moglen’s speech ‘Freedom in The Cloud’ is proving to be one of most popular ever, and has received over 20,000 hits representing about a 1000 views since Feb 14. In the talk Eben challenges the tech community to provide the public with the means to recapture its privacy from social media/cloud juggernaut through the development of personal social media servers operating in a robust distributed network.

Note that free DVDs of this talk are available to libraries,

educators, and other interested in running screenings – email dvd@isoc-ny.org and ask for DVD1710.

SigInt Technologies, LLC seeks a Senior Level Digital Library Programmer Analyst to support a US Government Agency.

Salary range: $125,000.00 – $135,000.00

We are growing our hardcopy-centric collection to include a substantial amount of digital content. You will have the opportunity to chart the course as we incorporate a variety of electronic data sources into the collection and make them available to our users. You will have the freedom to select the tools you deem best and implement them as you see fit. You’ll work directly with library management to collect requirements and propose and implement solutions. You will lead and direct other developers who will assist with the implementation.

Volume3 Number 1 January 2010

From the Desk of David Badertscher

As we begin the new year, it’s an opportune time to assess the cyber security landscape and prepare for what new challenges may lie ahead, as well as what current threats may continue.

Although addressed primarily to Internet Society members, the following message contains information which should be of interest to librarians, lawyers and other important stakeholders in the internet community who need to follow ongoing developments.

Dear Members, Friends, and Colleagues,

The end of 2009 is here – and what a year it has been. The Internet

Includes both useful resources and a request for information from the courts.

Nora Sydow reports that the National Center for State Courts (NCSC) has recently developed a Social Media and the Courts web module. Included in this module is a state links page that links to courts that are using Twitter, Facebook, YouTube, etc. In an effort to make this page as complete as possible, we are asking for your help.

(1) If your court is using a social media site, could you please send me the link(s) so we can include them in our state links page?

January – February 2010 Issue:

The January/February 2010 issue of D-Lib Magazine (http://www.dlib.org/) is now available.

This issue contains eight articles, two conference reports, the ‘In Brief’ column, excerpts from recent press releases, and news of upcoming conferences and other items of interest in ‘Clips and Pointers’. This month, D-Lib features The Swingle Plant Anatomy Reference Collection, a historical collection of plant anatomical microscope slides, courtesy of University of Miami Libraries.

Volume 2 Number 12 December 2009.

Automatic Software Updates and Patching
From the Desk of David Badertscher
Security vulnerabilities are flaws in the software that could allow someone to potentially compromise your system. Each year, the volume of software security vulnerabilities discovered increases, and the hacking tools available to exploit these vulnerabilities become more readily available and easier to use. Vulnerabilities in commonly used programs such as Adobe PDF Reader, QuickTime, Adobe Flash and Microsoft Office are prime targets of attacks on computers connected to the Internet. Recent statistics reported show that 48% of the cyber attacks identified in the second quarter of 2009 were targeted against vulnerabilities in Adobe Acrobat/Adobe Reader1 and in October 2009 Microsoft released patches for a record number of security holes. No entity is immune to vulnerabilities, so we must ensure we understand the risks and take appropriate mitigation steps.

Why do I need to update my software?

One of the basic tenets of computer security is to update your operating system and other software installed on your computer. Software updates fix problems in the software, add functionality, and most importantly, fix vulnerabilities that impact the security of the software and subsequently your computer. These vulnerabilities can lead to your computer-and information that resides on it-being compromised. Exploitation of vulnerabilities may occur by opening documents, viewing an email which contains malicious code or visiting a web site hosting malicious content. Seventy percent of the top 100 web sites hosted malicious content or contained a link designed to redirect users to malicious sites.2
What is a software patch (fix) and when should I install software patches?

Patches are often called “fixes.” A patch is software that is used to correct a problem to an application (software program) or an operating system. Computer companies are continuously addressing security holes (i.e. vulnerabilities) in computer software which could be used to infect your computer with a virus, spyware or worse. When vulnerabilities are discovered, the software vendor typically issues a fix (i.e. patch) to correct the problem. This fix should be applied as soon as possible since the average time for someone to try to exploit this security hole can be as little as a few minutes. Most major software companies will periodically release patches, usually downloadable from the Internet, that correct very specific problems in their software programs.

My computer includes hundreds of software programs– which ones do I need to update and how often?

One of the challenges facing the average computer user is to know which software needs to be updated and how often. Software programs that communicate or interact with the Internet are especially susceptible to attacks and should be kept at a vendor-supported version and current on all patches.

Many software programs include a feature called “auto update.” This feature allows the computer to check for updates at periodic intervals. The software will automatically check for updates and save them to your computer. Some updates will instruct you to “reboot” your computer before the software update can be applied.

At a minimum, you should enable the auto update feature on the following products:

Anti-virus and Anti-spam signatures: anti-virus and anti-spam software requires regular updates to virus and spam signatures to remain effective. New viruses and other types of malware appear every day and the anti-virus/anti-spam vendors release new signatures on a daily basis to stay on top of the new threats. Windows Office software: Word, Excel, Outlook, etc. – (see below for updating Windows software) Internet Browsers: e.g., Internet Explorer (Microsoft), Firefox (Mozilla), Safari (Apple) and Chrome (Google). Make sure you update any software you use for browsing the Internet. Adobe products: e.g., Adobe Reader, Adobe Acrobat, Flash, Shockwave Media Players: e.g., Windows Media Player (Microsoft), QuickTime (Apple), Real Player (Real Networks) and Flash Player (Adobe)

Java (Sun Microsystems): Java is software that is installed on most computers to allow users to play online games, conduct online chats, and view images in 3D, among other functions. It is also used for Intranet applications and other e-business solutions. Other software programs that communicate or interact with the Internet, like e-mail, web servers, and remote desktop software are especially susceptible to attacks and should be kept current on patches and version levels.

It is very important to promptly download and patch your operating system and programs whenever security updates or “service packs” become available. These patches are created to protect systems against potential attacks. Be aware that attacks sometimes occur before updates are released.

How do I update my Microsoft Windows programs?

Windows Update is a Microsoft service that provides updates for the Windows operating system and other Microsoft software. Installing Windows updates, such as “service packs” and other patches, is necessary to keep your Windows system secure. To activate Windows Update, go to Settings/Control Panel/Automatic Updates. When you turn on Automatic Updates, Windows routinely checks the Windows Update web site for high-priority updates that can help protect your computer from the latest viruses and other security threats. These updates can include security updates, critical updates, and “service packs.” Depending on the setting you choose, Windows automatically downloads and installs any high-priority updates that your computer needs, or notifies you as these updates become available. Be sure to set the auto updates to daily, as patches can be released at any time.

Note: Many organizations have formal processes to patch systems that will automatically update all appropriate software. In these situations, no end user action is required.

******************************

Source: 1. F-Secure
Source: 2. SC Magazine
The above comments are based on information tips provided by the Multi-State Information and Analysis Center (MS-ISAC). To learn more about MS-ISAC go to http://www.msisac.org/
__________________________________________
OTHER NEWS AND VIEWS Continue reading

Contact Information