Jump to content
Search In
  • More options...
Find results that contain...
Find results in...
Welcome Guest!

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

Search the Community

Showing results for tags 'Data'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • DarkUmbra Community
    • Introductions, Farewells & Vacations
    • News & Announcements
    • DarkUmbra Cafe
    • Help & Support
    • Entertainment & Artwork
  • Newsstand
    • Nintendo News
    • Microsoft News
    • Sony News
    • Mobile News
    • Other News
    • Reviews
  • Guides and Tutorials
    • Nintendo Tutorials
    • Microsoft Tutorials
    • Sony Tutorials
    • Mobile Device Tutorials
    • Other Tutorials
  • Content Sharing
    • Nintendo
    • Microsoft
    • Sony
    • Mobile Devices
    • Torrents
    • Retro Games
    • Requests

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


ICQ


Yahoo


Jabber


Skype


Location


Interests


Nintendo Network ID


Playstation Network ID


Xbox Live Gamertag


Wii Console ID


Steam ID


Twitter Username


Referrer

Found 2 results

  1. 3nino

    Data Security

    Data Security English | Size: 2.67 GB Category: CBTs What is Data Security? Data Security is a process of protecting files, databases, and accounts on a network by adopting a set of controls, applications, and techniques that identify the relative importance of different datasets, their sensitivity, regulatory compliance requirements and then applying appropriate protections to secure those resources. Similar to other approaches like perimeter security, file security or user behavioral security, data security is not the be all, end all for a security practice. It's one method of evaluating and reducing the risk that comes with storing any kind of data. Why Data Security? If the Data Security process is just one of many different ways to structure your organization's information security systems, what makes it better than competing methods? Broadly speaking, most other security processes are "user-centric": they focus on questions like: Is this user allowed to access this data? Is this person authorized to be on this network? Is this person abusing system resources? Which is great and necessary but struggles with many real-world issues like large organizations having hundreds or thousands of servers with haphazardly applied permissions, antiquated user groups and gaps in knowing who is accessing what. A data-centric security model is a practical way of approaching this from a different direction. Data vs User Security Models Imagine a scenario where a user on your customer service team places a spreadsheet containing customer Personally Identifiable Information like Social Security Numbers or other sensitive records onto a globally accessible shared folder. User Centric Model: this isn't a problem, everyone has the proper rights to access that file. Data Security Model: this is a huge problem as sensitive information is now available to every intern, contractor or "coasting through their two weeks notice until they take a new job at your biggest competitor" employee with network access. This scenario makes plain the big dependency of a Data Security approach: data classification. DOWNLOAD [Hidden Content] [Hidden Content] [Hidden Content]
  2. One of the most requested features for Apple's MacBook Pro line has been for the integration of some sort of built-in 3G cellular data to allow for anywhere wireless connectivity. MacBook Pro users presently need to purchase a separate Mi-Fi or 3G USB Modem in order to keep their machines connected to the internet when not near a Wi-Fi hotspot. Click for a larger view Apple has developed prototypes of the MacBook Pro with integrated 3G data, as evidenced by this eBay sale showing a never-released MacBook Pro prototype. This particular machine dates back to 2007 and is a 15" MacBook Pro Santa Rosa laptop with a 3G antenna, 3G hardware and SIM card slot built in. The machine was purchased "for parts" from Craigslist by the seller who describes the unit: Upon removing the top case it was immediately clear this was no normal Macbook Pro: the circuit boards inside were bright red as opposed to the normal blue! Further inspection found multiple differences from the stock version, most notably a feature never seen in a Macbook laptop of any kind: what appears to be a fully integrated cellular modem and SIM slot. There is an extendable cellular antenna located at the right top side of the display assembly (The antenna is marked with "Tyco Proto / #006" when slid out), and a standard size SIM card slot located underneath the memory cover on the bottom of the machine. The SIM card board is connected to the logic board via a connector not found on production machines. The solder footprint for it is still present on the production boards and not populated, which is interesting. This would seem to suggest that it was a last minute decision to remove the cellular functionality before going into mass production. The optical drive is marked as a "Sample for Evaluation". Rather than a normal EMC Number the specifications lapel simply says "XXXX", and the serial number does not show up in Apple's online database. The seller was able to repair the machine to get it into working condition. The 3G connector is seen by the operating system, but the actual data connection is not presently functional. The auction is, of course, sold "as is" but for our purposes, the existence of such a machine is the most interesting aspect. Click for a larger view The laptop carries a red motherboard which is typical of Apple prototypes. We've seen this in other prototype machines that have leaked out of Apple before: prototype Mac Pro (Image 1, Image 2) and prototype iPod touch (Image 1). The seller also notes that the remnants of the SIM-card connectivity remain on the production motherboards but are not populated. It's not clear at what stage Apple decided not to pursue production of this model. Click for a larger view The integrated SIM card slow shown above means Apple had used GSM 3G technology rather than CDMA, allowing for use on AT&T and many other international networks. The 3G card itself is identified as a Dynastream ANT2USB stick according to OS X. In the prototype, Apple integrated the 3G antenna as an extendable antenna along the right side of the lid. Apple has yet to produce such a machine with integrated 3G, but has clearly been working on possibility since as far back as 2007. Source: MacRumors These finds are always very interesting to me, it gives a little insight on what Apple's working on behind the scenes.
×