Wi-Fi login problems with iOS 6 devices

Article

What went wrong with iOS 6 Wi-Fi | ZDNet – loop

My Comments

You may have upgraded your iPhone or iPad to iOS 6. But after your Apple device shuts down and restarts as part of applying the update, you find that you are not on your home or business Wi-Fi network even though you downloaded that update through the same network.

The problem is not necessarily a flawed network configuration, but part of the iOS Wi-Fi automatic troubleshooting routine. Here, the software attempts to load a “Success” stub page from the Apple servers. This logic is intended to cause the iOS device to load a login or “assent” page that is part of a public-access or guest-access Wi-Fi network’s user experience. This stub was deleted by a former Apple employee before he left without realising it was part of iOS 6 troubleshooting logic.

The computer press have realised that this logic is flawed because this can place the servers at risk of denial-of-service attacks thus crippling iOS 6 devices. Similarly, someone could use a “man-in-the-middle” or “evil-twin” attack to point the device to a site that is of a malevolent nature. If a “show particular Webpage” logic is to be implemented in a network troubleshooting logic, it could work with a list of commonly-available Websites like Web portals or Web resource pages which the device chooses from at random.

It could be a chance for software developers to create network-test logic that makes less reliance on loading a particular Web site as proof of function. This could be through use of simplified randomised test routines that work with locations that are randomly chosen from a list of commonly-known highly-available Internet locations. This can be augmented by government standards bodies and similar organisations like NIST or BSI adding basic-HTML “Internet Success” pages to their Websites and making the URLs available to the IT industry.

Sometimes an NTP or similar time-fetch routine that obtains the time from one of many atomic-clock time servers to synchronise a device’s internal clock can work as a simplified Internet-functionality-test routine. If the time-server supports HTTP access where the UTC time is obtained via an HTML or text string, this could be achieved using HTTP so as to test Web-access functionality.

By not relying on one particular server as a proof-of-functionality test for Internet access and integrating a “login-page load” failover routine for public-access networks, we can achieve a safe and sure network setup experience.

Other manufacturers can yield more cool devices now

Click to view: Samsung’s latest video / TV ad for the Galaxy S 3

My Comments

Just lately, as Apple were launching the iPhone 5 and the fanbois were lininig up outside the Apple Stores or mobile-carrier outlets to be the first to get this phone, Samsung have been running a video campaign about how more advanced their phones are compared to the Apple product.

Previously, I touched on Android’s competitive-environment abilities such as the use of other browsers or ability to shift content to the phone using the computer’s file system. This has also underscored the ability to provide paths to innovation that we are seeing in devices that work to this platform. The commercial that I am referring to, along with other Samsung TV commercials for the Galaxy S3, even emphasised the near-field communication technology as a content-transfer technology rather than just as an authentication technology, thanks to Android Beam.

Similarly, the latest crop of Windows-based computers that appeared over the last few years are showing that this operating environment is still a breeding ground for innovation. One key feature that we will be seeing more of is the touchscreen on these computers, most of which will have this feature work alongside a supplied or standards-compliant optional keyboard. I even reviewed a taste of things to come when I reviewed the Sony VAIO J Series all-in-one desktop. This was also augmented when I heard of a Toshiba Ultrabook that was to come with an NFC, which could support file transfer in the Android Beam manner.

This is showing that there are other companies and IT operating platforms out there who can make and improve the technology that maintains the “cool factor” in its use, rather than only one company with its platforms. It is the sign of healthy competition when this kind of innovation takes place.

Symantec Symposium 2012–My observations from this event

Introduction

Yesterday, I attended the Symantec Symposium 2012 conference which was a chance to demonstrate the computing technologies Symantec was involved in developing and selling that were becoming important to big business computing.

Relevance to this site’s readership

Most solutions exhibited at this conference are pitched at big business with a fleet of 200 or more computers. But there were resellers and IT contractors at this event who buy these large-quantity solutions to sell on to small-business sites who will typically have ten to 100 computers.

I even raised an issue in one of the breakout sessions about how manageability would be assured in a franchised business model such as most fast-food or service-industry chains. Here, this goal could be achieved through the use of thin-client computers or pre-configured equipment bought or leased through the franchisor.

As well, the issues and solution types of the kind shown at this Symposium tend to cross over between small sites and the “big end of town” just like a lot of office technology including the telephone and the fax machine have done so.

Key issues that were being focused were achieving a secure computing environment, supoorting the BYOD device-management model and the trend towards cloud computing for the systems-support tasks.

Secure computing

As part of the Keynote speech, we had a guest speaker from the Australian Federal Police touch on the realities of cybercrime and how it affects the whole of the computing ecosystem. Like what was raised in the previous interview with Alastair MacGibbon and Brahman Thiyagalingham about secure computing in the cloud-computing environment, the kind of people committing cybercrime is now moving towards organised crime like East-European mafia alongside nation states engaging in espionage or sabotage. He also raised that it’s not just regular computers that are at risk, but mobile devices (smartphones and tablets), point-of-sale equipment like EFTPOS terminals and other dedicated-purpose computing devices that are also at risk. He emphasised issues like keeping regular and other computer systems up to date with the latest patches for the operating environment and the application software.

This encompassed the availability of a cloud-driven email and Website verification system that implements a proxy-server setup. This is designed to cater for the real world of business computing where computer equipment is likely to be taken and used out of the office and used with the home network or public networks like hotel or café hotspots. It stays away from the classic site-based corporate firewall and VPN arrangement to provide controlled Internet access for roaming computers. It also was exposing real Internet-usage needs like operating a company’s Social-Web presence, personal Internet services like Internet banking or home monitoring so as to cater for the ever-increasing workday, and the like. Yet this can still allow for an organisation to have control over the resources to prevent cyberslacking or viewing of inappropriate material.

Another technique that I observed is the ability to facilitate two-factor authentication for business resources or customer-facing Websites. This is where the username and password are further protected by something else in the similar way that your bank account is protected at the ATM using your card and your PIN. It was initially achieved through the use of hardware tokens – those key fobs or card-like devices that showed a random number on their display and you had to enter them in your VPN login; or a smart card or SIM that required the use of a hardware reader. Instead Symantec developed a software token that works with most desktop or mobile operating systems and generates this random code. It even exploits integrated hardware security setups in order to make this more robust such as what is part of the Intel Ivy Bridge chipset in second-generation Ultrabooks.

Advanced machine-learning has also played a stronger part in two more secure-computing solutions. For example, there is a risk assessment setup being made available where an environment to fulfill a connection or transaction can be assessed against what is normal for a users’s operating environment and practices. It is similar to the fraud-detection mechanisms that most payment-card companies are implementing where they could detect and alert customers to abnormal transactions that are about to occur, like ANZ Falcon. This can trigger verification requirements for the connection or transaction like the requirement to enter a one-time-password from a software token or an out-of-band voice or SMS confirmation sequence.

The other area where advanced machine-learning plays a role in secure computing is data loss prevention. As we hear of information being leaked out to the press or, at worst, laptops, mobile computing devices and removable storage full of confidential information disappearing and falling in to wrong hands, this field of information security is becoming more important across the board. Here, they used the ability to “fingerprint” confidential data like payment card information and apply handling rules to this information. This includes implementation of on-the-fly encryptions for the data, establishment of secure-access Web portals, and sandboxing of the data. The rules can be applied at different levels and affect the different ways the data is transferred between computers such as shared folders, public-hosted storage services (Dropbox, Evernote, GMail, etc), email (both client-based and Webmail) and removable media (USB memory keys, optical disks). The demonstration focused more on the payment-card numbers but I raised questions regarding information like customer/patient/guest lists or similar reports and this system supports the ability to create the necessary fingerprint of the information to the requirements desired.  

Cloud-focused computing support

The abovementioned secure-computing application makes use of the cloud-computing technology which relies on many of the data centres scattered around the world.

But the Norton 360 online backup solution that is typically packaged with some newer laptops is the basis for cloud-driven data backup. This could support endpoint backup as well as backup for servers, virtual machines and the like.

Mobile computing and BYOD

Symantec have approached the mobile computing and BYOD issues in two different paths. They have catered for the fully-managed devices which may appeal to businesses running fleets of devices that they own or using tablets as interactive customer displays. But they allowed for “object-specific” management where particular objects (apps, files, etc) can be managed or run to particular policies.

It includes the ability to provide a corporate app store with the ability to provide in-house apps, Web links or commercial apps so users know what to “pick up” on their devices. These apps are then set up to run to the policies that affect how that user runs them, including control of data transfer. This setup may also please the big businesses who provide those services that small businesses often provide as an agent or reseller, such as Interflora. Here, they could run the business-specific app store with the line-of-business apps like a flower-delivery-list app that runs on a smartphone. There is the ability to remotely vary and revoke permissions concerning the apps, which could come in handy when the device’s owner walks out of the organisation.

Conclusion

What this conference shows at least is the direction that business computing is taking and was also a chance to see core trends that were affecting this class of computing whether you are at the “big end of town” or not.

Is this what the new super slim PlayStation 3 is all about

Articles

Sony unveils super slim PlayStation 3 | Crave – CNET

Sony PlayStation 3 2012 up close and personal eyes on | Engadget

From the horse’s mouth

US Press Release

European Press Release

My Comments

The press have been afield with the news about Sony’s latest PlayStation 3 games console. But this one is a major redesign to cope with the smaller space that newer consolidated electronics can occupy. This has yielded a smaller console that is significantly lighter and doesn’t use as much power as the existing units.

One main difference is that it has a top-loading Blu-Ray drive for your games and movies. This uses a sliding lid in a similar vein to some CD players like the B&O Beocenter 9000 series music systems rather than the hinged lid that, in my opinion, is asking for problems. 

There are two main design variants – one with a 500Gb hard disk and a cheaper variant with 12Gb flash memory with the ability to add in an optional 250Gb hard disk. The American market would have the console come with the 250Gb hard disk in the box. The cheaper version may work with occasional gamers and those of us who use the PS3 more as a network media client rather than as the full-on games console.

Of course there will be access to the PlayStation Network and the local video-on-demand services that has allowed the PS3 to earn its keep as a network multimedia terminal rather than just a games console for teenagers and young men. It will also have the same performance expectations as the current-generation PS3.

But could these variants be a way to bring the PlayStation Experience to more households or allow one to increase the feasibility for more of the multi-player multi-machine gaming from this console?

A CCTV hacking incident could be a lesson in system lifecycle issues

Article

How A Prison Had Its CCTV Hacked | Lifehacker Australia

My Comments

In this article, it was found that a prison’s video-surveillance system was compromised. The security team checked the network but found that it wasn’t the institution’s main back-office network that was compromised but a Windows Server 2003 server that was affected. This box had to be kept at a particular operating environment so it could work properly with particular surveillance cameras.

The reality with “business-durable” hardware and systems

Here, the problem was focusing on an issue with “business-durable” hardware like the video-surveillance cameras, point-of-sale receipt printers and similar hardware that is expected to have a very long lifespan, usually in the order of five to ten years. But computer software works to a different reality where it evolves every year. In most cases, it includes the frequent delivery of software patches to improve performance, remedy security problems or keep the system compliant to new operating requirements.

Newer software environments and unsupported hardware

The main problem that can occur is that if a computer is running a newer operating environment, some peripherals will work on lesser functionality or won’t work at all. It can come about very easily if a manufacturer has declared “end of life” on the device and won’t update the firmware or driver set for it. This also applies if a manufacturer has abandoned their product base in one or more of their markets and leaves their customers high and dry.

Requirement to “freeze” software environments

Then those sites that are dependent on these devices will end up running servers and other computer equipment that are frozen with a particular operating environment in order to assure the compatibility and stability for the system. This can then compromise the security of the system because the equipment cannot run newly-patched software that answers the latest threats. Similarly, the system cannot perform at its best or support the installation of new hardware due to the use of “old code”.

In some cases, this could allow contractors to deploy the chosen updates using removable media which can be a security risk in itself.

Design and lifecycle issues

Use standards as much as possible

One way to tackle this issue is to support standard hardware-software interfaces through the device’s and software’s lifecycle. Examples of these include UPnP Device Control Protocols, USB Device Classes, Bluetooth Profiles and the like. It also includes industry-specific standards like ONVIF for video-surveillance, DLNA for audio-video reproduction

If a standard was just ratified through the device’s lifespan, I would suggest that it be implemented. Similarly, the operating environment and application software would also have to support the core functionality such as through device-class drivers.

Provide a field-updatable software ecosystem

Similarly, a device would have to be designed to support field-updatable software and any software-update program would have to cover the expected lifespan of these devices. If a manufacturer wanted to declare “end of life” on a device, they could make sure that the last major update is one that enshrines all industry-specific standards and device classes, then encompass the device in a “software roll-up” program that covers compliance, safety and security issues only.

As well, a “last driver update” could then be sent to operating-system vendors like Microsoft so that the device can work with newer iterations of the operating systems that they release. This is more so if the operating-system vendor is responsible for curating driver sets and other software for their customers.

The device firmware has to work in such a way to permit newer software to run on servers and workstations without impairing the device’s functionality.

As well, the field-updating infrastructure should be able to work in a similar way to how regular and mobile computer setups are updated in most cases. This is where the software is sourced from the developers or manufacturers via the Internet, whether this involves a staging server or not. This should also include secure verification of the software such as code-signing and server verification where applicable.

Conclusion

What this hacking situation revealed is that manufacturers and software designers need to look seriously at the “business-durable” product classes and pay better attention to having them work to current expectations. This then allows us to keep computer systems associated with them up to date and to current secure expectations.

WiFi Direct–Another way to share files between Android devices

Article

WiFi Shoot: Sharing files over Wi-Fi Direct | Android Authority

My Comments

The Android mobile phone platform has provided many options for “throwing” files between devices.

Firstly, there was the Bluetooth “object-push” profile where you can share material between devices that have this protocol and are set up for it. This includes Android and Symbian-based mobile phones and some devices like a few Bluetooth printers and printing kiosks.

There was the subsequent arrival of the “Bump” ecosystem which allowed you to transfer the files via Internet after you “bump” the phones next to each other. This implemented a “recognised bump” pattern to register users with this system.

Next the Android platform integrated Near-Field Communication as part of the Ice Cream Sandwich iteration and implemented the file transfer as a specific function called “Android Beam”. This was exemplified in the TV advertising that Samsung did for the popular Galaxy S II phone and Samsung’s “super variant” of that function where two people touched each others’ phones to each other.

Now that most newer Android devices come with Wi-Fi Direct, a new app has been launched to enable one to “throw” files between these devices using this method. The app which is called WiFi Shoot and is currently in beta version, exposes itself as a “share” option for images and videos and can transmit the images or videos; or receive any of these files.

There are plans to open it up to a larger array of content types once the bugs are ironed out of it. Similarly, it could support “throwing” of files to and from other non-Android devices that use Wi-Fi Direct as a file-transfer or object-transfer method such as printers that could print photos or Windows PCs that have the appropriate software.

I see this as another way that the Android platform is working towards a level and competitive playing field for activities involving mobile computing.

Achieving a failover printer setup in your business

Brother HL-2240D compact monochrome laser printer

Brother HL-2240D compact monochrome laser printer – an example of a workflow printer

I have come across situations with small offices such as clinics who run one or more dedicated laser printers that turns out receipts, invoices and other documents as part of the customer-facing business workflow. Some offices may run the printers also for some back-office requirements like preparing reports or balance sheets for that workstation.

But there is the situation where the printer can break down, usually with a mechanical failure like frequent paper jamming. This can happen more frequently as a machine ages and is worked hard in a busy office. It is analogous to that situation most of us experience when a car gets to that point in its life where it frequently lives at the mechanic’s workshop and drills a hole in your pocket because it is always breaking down.

This situation can impair the business’s workflow especially as one has to work out how to rectify a paper jam or, in some cases, reset the machine. As well, no woman would want to ruin their beautifully-done fingernails knocking them on the machine’s internals while removing jammed up paper.

In these situations, it is a good idea to set up a failover printing arrangement where you have other printers that come in to play if the workstation’s primary machine fails. This is easier to achieve if all of the printers accessible to the office or reception area are linked to the network.

For example, you could use a multifunction for this purpose even though each workstation computer has a dedicated laser printer like the Brother HL-2240D or Dell 1130n. The multifunction printer, which is often expected to serve as the main copier and fax machine for the organisation, could be a machine like the Brother MFC-8370DN or HP LaserJet M1536dnf for a monochrome variety or a Brother MFC-9460CDN or HP LaserJet Pro Color M475 Series for a colour variety. Even one of the high-end business inkjets like the HP OfficeJet Pro 8600 could do the job just as well.

Some environments that have two or more workstations may prefer to have one workflow printer per workstation. Here, it would be preferable to connect the printers via the network rather than directly to the workstation computers. Here this can allow the other workflow printer to be used as a failover measure.

HP LaserJet M1536dnf monochrome laser multifunction printer

HP LaserJet M1536dnf monochrome laser multifunction printer – an example of a multifunction expected to be a small business’s copier and fax

But what you would have to do is to set up the workstations to use the printer that is local to them as well as this main multifunction printer or other workflow printer. This may be as simple as adding the driver set for the main printer to the computers or it may also require the line-of-business software to be set up to allow the use of two or more printers.

As far as default printers are concerned, you would have to set the primary dedicated printer as the default machine, then have the users select the main multifunction printer as a secondary printer whenever their primary printer fails. This can be done as part of ordering the print job in most software or going to the Printers option in the operating system and setting the multifunction printer as the default while the single-function workflow printer is out of action.

If you run a server-driven printing environment, it may be worth looking at options that allow failover printing so that print jobs that come from one workstation appear at particular printers in an order of availability.

Once you look at this option for setting up multiple printers in your office or reception area, you could then be sure of an arrangement where a printer failure doesn’t impede on your business workflow or affect how your business is perceived by the people your business benefits.

Toshiba to introduce the first NFC-capable Ultrabook

Article

Toshiba Satellite U925T is First NFC-Enabled Ultrabook#xtor=RSS-181#xtor=RSS-181#xtor=RSS-181

My Comments

From this article, I reckon that Toshiba has used the Satellite U925T Ultrabook to push themselves ahead of the game by integrating the “touch-and-go” near-field-communications technology in to a portable computer.

One key advantage that I see of this is exploiting the mobile-wallet systems like MasterCard PayPASS and, perhaps, Google Wallet to allow NFC-compliant payment cards to facilitate an online transaction that doesn’t have the fraud risks associated with “card not present” transactions. This would be facilitated by the use of appropriate software that interlinks with the NFC reader and merchant-side software that runs the transaction as if you are paying for the goods at a store using your card and their card terminal.

Similarly, the Android and Windows Phone ecosystem would benefit from this feature through access to the mobile wallets that can be hosted in the NFC-capable smartphones. This can extend to device-to-device file-transfer functions like Android Beam where users could upload pictures and sync contacts and QR-discovered Websites to the notebook from the smartphone.

In addition, the setup routines associated with commissioning Bluetooth or Wi-Fi wireless devices with this notebook can be simplified to a “touch-and-go” procedure if these devices support this functionality. This can then lead to the ability to transfer “extended-functionality” files to the host computer so as to open up advanced feature sets like sound-optimisation functions for headsets and microphones.

What I see about this more is that this Toshiba Windows 8 hybrid Ultrabook is an example of using NFC to demonstrate a synergy between open-platform computing devices. This then simply leads to a breeding ground for innovation.

Bluetooth Smart Ready product announcements piling up

Article – from the horse’s mouth

Bluetooth Smart Ready product announcements piling up

My Comments

I have given some coverage about the new Bluetooth 4.0 “Smart” and “Smart Ready” technologies. These are improvements to the Bluetooth specification to allow the use of Bluetooth sensor and control devices that can work on low battery requirements – think 2-3 AA or AAA Duracells or a “watch” battery – for in an order of six months or more.

This has opened up paths for health and wellness devices like blood-pressure monitors, glucose monitors and pedometers. Even the old 80s-style digital watch is coming back with a vengeance as a smartphone accessory due to this technology.

Most of the Bluetooth-equipped tablets and smartphones issued over the past model year or so are equipped with this technology fully with software support. But an increasing number of newer laptops are equipped with Bluetooth 4.0 Smart Ready functionality at least on a hardware level and underpinned with OEM software. An example of this is the recently-reviewed Fujitsu LifeBook LH772 which has this interface.

These units would have full inherent implementation when they run Windows 8 and it could open up questions about how the Bluetooth 4.0 Smart technology could be relevant to the laptop or desktop “regular-computer” device class.

One way I would see it being relevant to this class is the availability of Bluetooth wireless keyboards, mice and game controllers that don’t need special rechargeable batteries to operate. Here, they could run for a long time of use on just the two or three AA batteries.

Sensor devices like temperature or humidity sensors that are important to particular profession or hobby groups like refrigeration / HVAC engineers or gardeners could benefit from this technology especially when used with a laptop or tablet. Here, these computers could work with data-logging software to record trends or monitor for abnormal conditions.

At least what is being proven with the current crop of Bluetooth-Smart-Ready capable regular and mobile computer devices is that the world of innovation with this low-power wireless netowrk is being opened up.

Asus’s latest USB laptop expansion module satisfies current expectations

Articles

Asus Launches the New USB 3.0 HZ-1 Docking Station | Tom’s Hardware

ASUS Launches the New USB 3.0 HZ-1 Docking Station Based on DisplayLink’s Leading SuperSpeed™ Graphics Technology | BusinessWire

My comments

I have covered the concept of expansion modules a.k.a docking stations that connect to laptops via USB 3.0, Thunderbolt or other similar connectivity as a must-have accessory. This is to allow people who use smaller or less-equipped laptops like Ultrabooks to use other equipment like optical drives or larger displays at their normal workspaces yet be able to maintain the portability of these machines. I cited this kind of device when I reviewed the Sony VAIO Z Series ultraportable which came with one of these modules that housed a slot-load Blu-Ray optical drive.

Lenovo issued one of these USB 3.0 modules as the ThinkPad USB 3.0 Dock. This unit had a Gigabit Ethernet connection as well as an external sound module and self-powered USB 3.0 hub for five devices.

Now ASUS have issued an improved USB 3.0 variant of a USB docking station that they previously released. The previous iteration had USB 2.0 connectivity therefore having access to 10/100 Ethernet, VGA and DVI video as well as an audio module and USB self-powered-hub connectivity for four devices. The video is supplied to the module using the DisplayLink video-over-USB technology to transfer the video to the VGA and DVI ports.

Now this improved version satisfies the current expectations by being equipped with a Gigabit Ethernet port as well as an HDMI port for current displays. This has the audio module and the USB 3.0 hub but uses the latest iteration of the DisplayLink technology to exploit the high throughput of USB 3.0 for high-resolution displays and stereo or surround-sound audio via HDMI. It is infact the first USB 3.0 docking station or expansion module that I have heard of that implements this DisplayLink setup.

Personally, I would like to see this device and the previous version equipped with an SP/DIF optical output using the same 3.5mm optical-electrical jack that Sony used with some of their CD Walkmans in the mid-90s to facilitate digital CD-MiniDisc recording with their MD Walkmans. Here this connection could be used provide a high-quality PCM stereo or bitstream surround digital signal to amplifiers that have built-in digital-analogue conversion circuitry.

As long as these are kept to common standards, it could then be feasible to supply the expansion modules to work with extra peripherals at one’s main work locations.