Google

Sunday, October 28, 2007

*****************************************************************************
A SHORT NOTE ABOUT SECURITY:-

Security:-

Many operating systems include some level of security. Security is based on the two ideas that:
The operating system provides access to a number of resources, directly or indirectly, such as files on a local disk, privileged system calls, personal information about users, and the services offered by the programs running on the system;
The operating system is capable of distinguishing between some requesters of these resources who are authorized (allowed) to access the resource, and others who are not authorized (forbidden). While some systems may simply distinguish between "privileged" and "non-privileged", systems commonly have a form of requester identity, such as a user name. Requesters, in turn, divide into two categories:

Internal security:-

an already running program. On some systems, a program once it is running has no limitations, but commonly the program has an identity which it keeps and is used to check all of its requests for resources.

External security:

a new request from outside the computer, such as a login at a connected console or some kind of network connection. To establish identity there may be a process of authentication. Often a username must be quoted, and each username may have a password. Other methods of authentication, such as magnetic cards or biometric data, might be used instead. In some cases, especially connections from the network, resources may be accessed with no authentication at all.
In addition to the allow/disallow model of security, a system with a high level of security will also offer auditing options. These would allow tracking of requests for access to resources (such as, "who has been reading this file?").
Security of operating systems has long been a concern because of highly sensitive data held on computers, both of a commercial and military nature. The United States Government Department of Defense (DoD) created the Trusted Computer System Evaluation Criteria (TCSEC) which is a standard that sets basic requirements for assessing the effectiveness of security. This became of vital importance to operating system makers, because the TCSEC was used to evaluate, classify and select computer systems being considered for the processing, storage and retrieval of sensitive or classified information.



SanDisk has begun shipping its 8GB microSDHC ......!!!!!!!!!!




SanDisk has begun shipping its 8GB microSDHC and M2 flash memory cards. The company hopes that they will find a market among users of memory-card-ready mobile phones. Available now for $140 and $150, respectively.
SanDisk Corporation (NASDAQ: SNDK), formerly SunDisk, is an American multinational corporation which designs and markets flash memory card products. SanDisk was founded in 1988 by Eli Harari and Sanjay Mehrotra, a non-volatile memory technology expert. SanDisk became a publicly traded company on NASDAQ in November 1995. SanDisk produces many different types of flash memory, including various memory cards and a series of USB removable drives. SanDisk markets to both the high and low-end quality flash memory.

For more click link--> [Electronista]

Windows Vista
(Part of the Microsoft Windows family

No comments: