Thursday, February 23, 2012

Facebook, Cloud-fully edgy?...


     I read an interesting few articles about Facebook. Big surprise right? Facebook in the news? Well this time, like many other times, the spotlight is the bad kind.

      If you haven't heard about cloud and edge servers, maybe it's time you have. The idea behind a cloud server is to store your data so that at any point in time, and from anywhere, you can access it.  Even if you are not on your home computer where the data is stored originally, you can still access it while on vacation without having to set up remote desktop connections and leave your PC running. Many software giants are starting to use this type of system so that they have more efficient access to their own data and things you request, and to provide it to the end-user as a convenience feature. One big name to note is Microsoft. Their business strategy with Windows 8 and Windows 7.5(Mango for mobile) is shifting towards providing cloud services in order to streamline all your windows and Microsoft devices to make the user experience more 'edgy'. Pun intended.

Thursday, February 16, 2012

Mozilla and PKI Certifications...


As stated in my previous blog post, SSL (Secure Socket Layer) is meant to enable encrypted data to be transferred over the internet, while PKI (Public key infrastructure) is meant to distribute and verify certificates to users (websites, programs, etc) that signify a legitimate source and secure data. Data sent by SSL that has a PKI certificate is not meant to be inspected by anyone, except for the parties involved in the requests and responses.

Encryption decrypted?...



SSL, TLS, and PKI are very important tools for security on the internet. SSL is an abbreviation for Secure Socket Layer, TLS means Transport Layer Security.
Both of these are application layer encryption protocols. PKI means Public key infrastructure. PKI is a various assortment of implementations, such as software, hardware, and people.  PKI is used mainly to identify and certify legitimate users based on a key that has been assigned. Essentially, PKI uses Certificate and Registration Authorities (CA & RA) to digitally sign the user into the database, and assign a key that is generated pseudo-randomly and encrypted with cryptographic protocols, such as SSL for example.

Thursday, February 9, 2012

Privacy. Is it Com-Google-Plex?...


Everyone who is anyone on the web knows about Google. Google has the most power by way of tools and content than any other entity on the web. What's that one guys name from that one movie with the cool flashback scenes? Google it! Google for years now has been the premier in many things: Search engine, Language, E-mail, Road Maps and Satellite Imagery among other numerous things.

Symantec dropped the ball...again.

Everyone who owns a PC has no doubt heard of the company Symantec.  The company was founded in 1982 by Gary Hendrix.  It wasn't until 1991 and a successful merger with Peter Norton Computing that the corporation became widely known to individual home PC user's, namely for its suite of PC security software, most notably Norton Antivirus.

Tuesday, February 7, 2012

It Begins...

I have been sent on a journey. My journey will have many paths.  During my journey I undoubtedly expect to at times be tired, hungry, stressed, happy, excited, or blown away - intellectually speaking.  The goal throughout all of this will be to circumnavigate the world of Computer Security.  I officially invite you to join me on this journey, by way of this... journal, of sorts.  Shall we ? ...