Popular Posts

Wednesday 14 November 2012

Network Security Video Notes: Watch The Future of Computer Security

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Network Security Video Notes: Watch The Future of Computer Security

Brad Templeton, chairman of the board of the Electronic Frontier Foundation (EFF), describes the future of online security, privacy and society. This lecture is from Singularity University's Graduate Summer Program 2009.

The Future of Computer Security


Watch The Future of Computer Security:


Watch The Future of Computer Security

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Friday 2 November 2012

Network Security Videos News: Internet Blocked In China During 18th Congress

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Internet Blocked In China During 18th Congress

The CCP's 18th Congress is approaching, and the ramped up
security work has spread to the network.
The China's MIIT claimed, in order to ensure the telecom
network security during the 18th Congress,
a nation-wide network blockade will apply from November 7
to the end of the 18th Congress.
Some analysts pointed out that the
Chinese Communist Party (CCP) is testing people's reaction.
A network blockade is to ensure the smooth flow of the network
on the surface, but the essence is to strengthen the monitoring of the network.

According to the China IDC Circle website news, the network
blockade from MIIT has made certain requirements.
First, to implement a "person in charge" in all units and
all levels to ensure a smooth 24-hour contact among relevant persons
so that if anything should happen, they can
quickly report to their superiors.

In addition, it requires all provinces, autonomous regions,
and municipalities directly under the Central Government
to strengthen the supervision and management of the safe
operation of telecommunications networks in the area.
as well as safety production and interoperability.
Any violators who affect the operation of the network security
and interoperability will be severely punished.

In this regard, Hu Jun, "Rights Movement" network manager,
commented, to ensure smooth network traffic
is the surface reason, in reality, it is to strengthen monitoring
of the network.

"Rights Movement" network manager Hu Jun:
"Just for a few days of meetings, you block everything?
What are you afraid of?
Online communication is normal for citizens.
Who are your enemies and what are you so afraid of?
To protect the 18th Congress? Why do you need to protect it?
From your establishment to the present,
you always make sneaky moves.
If the Party were legitimate,
you should not be afraid of the public."

Hu Jun said that the 18th Congress is an assembly
for transferring power.
Only when you do something not righteous,
will you be afraid of letting people know.

Hu Jun: "The handover of power itself involves the issue
of dividing up interest.
This is a very clear problem, re-dividing the blood
and sweat of the Chinese people.
This process is not any different than the mafia's style.

No one knows yet so far what would happen to the wealth
from Xilai's corruption."

Columbia University visiting scholar Gu Chuan said that
the CCP Internet blockade is normal.
It strengthens the blockade during the 18th Congress.

Gu Chuan: "In the report, it states maintaining smooth
contact 24 hours a day, including with other websites.
They asked the websites to be ready for 24-hour emergency.

However, the CCP will certainly strengthen
network blockade during the 18th Congress.
Its purpose is to prevent people from knowing what people
overseas think of the 18th Congress."

Gu Chuan also added that there is no truth in China
and "truth" is monopolized by the CCP officials.
The messages of truth circulating on the network
will be quickly deleted.

Gu Chuan: "In addition to the truth about the persecution
of Falun Gong and the repression of democracy activists,
there is also the political struggles within the Party, princelings,
and factions, including the collusion between Zhou Yongkang and Bo Xilai.
The CCP does not want people to know any of these,
so during the two sessions it will strengthen the blockade."

Some analysts pointed out, the news of the "network blockade"
was not disclosed by "Xinhua News Agency" or "People's Daily."
It was by the semi-official "21st Century Financial Network."
It is estimated that the CCP wants to test the public reaction.
But in any case, as long as anything important occurs during
the 18th Congress, the CCP is bound to take some measures.
That means telephone, telecommunications, networks,
and other public dissemination tools will be cut off.

Watch Video: Internet Blocked In China During 18th Congress

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Network Security News: Huawei and ZTE pose national security threat, US committee finds

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Well as you may already know:

Huawei Technologies Co. Ltd. is a Chinese multinational networking and telecommunications equipment and services company headquartered in Shenzhen, Guangdong, China. It is the largest telecommunications equipment maker in the world, after having overtaken Ericsson.

Huawei was founded in 1988 by ex-military officer Ren Zhengfei and formed as a private company owned by its employees. Its core missions are building telecommunications networks; providing operational and consulting services and equipment to enterprises inside and outside of China; and manufacturing communications devices for the consumer market. Huawei has over 140,000 employees, around 46% of whom are engaged in research and development (R&D). It has 20 R&D institutes in countries including China, the United States, Germany, Sweden, India, Russia, and Turkey, and in 2011 invested around US$3.74 billion in R&D.

In 2010, Huawei recorded profit of 23.8 billion CNY (3.7 billion USD). Its products and services have been deployed in more than 140 countries and it currently serves 45 of the world's 50 largest telecoms operators.

Critics have pointed to the issues Huawei has with intellectual property rights, security concerns and treatment of its workforce and customers. Huawei representatives have in turn denied or disputed these allegations. Source: Wikipedia

ZTE Corporation (formerly Zhongxing Telecommunication Equipment Corporation) (SZSE: 000063; SEHK: 0763) is a Chinese multinational telecommunications equipment and systems company headquartered in Shenzhen, China. It is the world's fourth-largest mobile phone manufacturer measured by 2011 unit sales and the world's fifth-largest telecoms equipment maker measured by 2011 revenues (after Ericsson, Huawei, Alcatel-Lucent and Nokia Siemens Networks).

ZTE's core products are wireless, exchange, access, optical transmission and data telecommunications gear; mobile phones; and telecommunications software. It also offers products that provide value-added services, such as video on demand and streaming media. ZTE primarily sells products under its own name but it is also an OEM, manufacturing some products which retail under other brand names.

ZTE was founded in 1985 by a group of state-owned enterprises associated with China's Ministry of Aerospace. Source: Wikipedia

According to much concern or most concentration on security threat, we got a news related to the both Chinese companies mentioned above that found by US committee, that's Huawei and ZTE pose national security threat...

Huawei and ZTE pose national security threat, US committee finds

After a year-long investigation, a US congressional committee on Monday concluded that Chinese telecommunication equipment vendors Huawei Technologies and ZTE pose a security threat to the US, with lawmakers advising US private-sector firms to not buy networking gear from the companies....

Read more: Huawei and ZTE pose national security threat, US committee finds

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!