Mobile devices security

Written by Mike Ber


Continued from page 1

Almost atrepparttar same time withrepparttar 143265 appearance ofrepparttar 143266 first Trojan for PDAs,repparttar 143267 first virus to affect cell phones has also arrived. This worm is called “Cabir”, and it has been spotted by some security specialists who issued an alert concerningrepparttar 143268 danger. Cabir spreads using a file named “Caribe.sis” and travels across devices working withrepparttar 143269 Symbian operating system which is used in PDAs and many cell phones. Cabir places itself usually on a mobile device when a user agrees to a transmission showingrepparttar 143270 text message "Caribe". After thatrepparttar 143271 worm begins a nonstop search particularly for Bluetooth-connected wireless devices to send itself to. Also,repparttar 143272 battery’s life ofrepparttar 143273 infected device is harshly reduced during this process. The inventors of Cabir did not designrepparttar 143274 worm to spread massively. It was intended to be a test demonstrating that these mobile devices can be easily infected by viruses because of their rapid maturation. The worm rated with a low risk because it has to be intentionally activated by a mobile phone user, and also allowingrepparttar 143275 Caribe package requires pressing a button priorrepparttar 143276 files can be loaded intorepparttar 143277 receiving phone.

It was predictable that viruses and worms for cell phones and PDAs would appear. This isrepparttar 143278 end result ofrepparttar 143279 impressive advances made in mobile communication technology inrepparttar 143280 past years. Over time, cell phones and PDAs turn out to be more PC-like, making them vulnerable to viruses. And because they are more PC-like, smart cell phones and PDAs are mostly used by companies for mission-critical applications and data storage. Also they are used for receiving emails and text messages just like desktop computers. That makes their users just as exposed to viruses and worms. These security concerns can be dealt with software-encryption solutions that need to be attached torepparttar 143281 new devices. The encryption technology expands to mobile devicesrepparttar 143282 identical type of security that many companies have organized into their desktop computers. It encrypts data and prevents illegal access torepparttar 143283 data stored withinrepparttar 143284 device, which is either lost or stolen.

Mike Ber is the owner of the Canadian Domain Name Portal called www.Every.ca He is also a contributing author to www.ComputerMagazine.ca, www.Developer.ca, and www.XP.ca


3G Technology

Written by Mike Ber


Continued from page 1

Market analysts are faced withrepparttar challenge of accurately predicting how much technology consumers will actually be willing to pay for 3G services. With 3G providing features that are ‘cool’ but expensive, and with cheaper and adequate alternatives available inrepparttar 143264 form of 2.5G,repparttar 143265 pure cell-phone features no longer hold any ‘pulling’ power. In fact, some critics argue that 2.5G speeds are just fine, thank you, and provide enough flexibility for most applications.

The rapid development of wireless LANs based onrepparttar 143266 802.11 standard andrepparttar 143267 future 802.11g standard means that 3G systems now have serious competition. Although Wi-Fi support is still patchy (and suffers fromrepparttar 143268 same security issues), and some users prefer 2.5G and 3G systems instead of Wi-Fi due torepparttar 143269 widespread coverage, wireless LANs have completely taken overrepparttar 143270 office environment. Not only that but wireless LAN systems are getting faster and becoming more robust. There are plans to develop 802.11 systems that approach 1.5 Mbps in theoretical speeds. Intel and others are also looking into developing metropolitan area networks (MANs) that expand that 300 feet Wi-Fi bubble to about 30 miles, or across an entire city.

Inrepparttar 143271 U.S, 3G services have been slow to start. Only in late 2003 and early this year did commercial 3G packages evolve torepparttar 143272 extent thatrepparttar 143273 general public became interested in them. Compare this withrepparttar 143274 presence of 3G services in Japan since 2001 andrepparttar 143275 popularity of 3G networks in Europe since 2000 (Finland launched it’s first network in late 2000). Compared torepparttar 143276 rest ofrepparttar 143277 developed world,repparttar 143278 U.S is lagging behind. And here is why:

A much more developed lower-tier communications infrastructure (2G and 2.5G) has meant that there are more alternatives have been available to consumers. ‘Wi-Fi’ has becomerepparttar 143279 latest rage with tech-savvy consumers, and because it became available before 3G systems were fully operational, it has captured a sizeable share ofrepparttar 143280 wireless business market. U.S companies have several technical and legal issues in acquiringrepparttar 143281 appropriate spectrum for 3G use fromrepparttar 143282 FCC. As technology becomes more sophisticated and bandwidth increases, systems become increasingly vulnerable to attack by malicious hackers (known as crackers) unless countermeasures are implemented to protect against such activity. Ensuring secure wireless connections in a pre-requisite to any wireless service provider.

Despiterepparttar 143283 obstacles, 3G is here to stay. The main issue is to work it intorepparttar 143284 market in such a way that it becomes useful forrepparttar 143285 majority of people, and not just a select few. Ideally, we are looking at multi-tiered services that offer a combination of 2.5G, 3G and Wi-Fi capabilities to one, national network. Eventually we would be using multiple networks to check our email, leave a message for a friend and download that bonus music video onto our PDA. Being part of a culture that revels on paying a flat rate for unlimited access, I would expect such a network to offer different levels of service, with customers being charged according to their service package, and not having to pay multiple fees for Wi-Fi and 3G access.

Just as PC users are starting to wonder whether there really is a need for faster computers,repparttar 143286 whole communications industry might also be entering a period of transition (not just a few years but perhaps a decade or two) where new technologies would not mean that older technologies become obsolete; rather, two separate consumer groups would emerge who would userepparttar 143287 old and new technologies side by side.

Mike Ber is the owner of the Canadian Domain Name Portal called www.Every.ca He is also a contributing author to www.ComputerMagazine.ca, www.Developer.ca, and www.XP.ca


    <Back to Page 1
 
ImproveHomeLife.com © 2005
Terms of Use