Mobile devices security

Written by Mike Ber


As this security solution is not such a great idea, other companies have researched, and finally found a new way to prevent cell phones and PDAs theft. This method permits to remotely disable up to four different tasks of a stolen cell phone or PDA, rendering it inoperable. But atrepparttar same time data contained inrepparttar 143265 device are locked. The beauty of this option is thatrepparttar 143266 unit is not damaged in any way - full functionality and data can be easily restored ifrepparttar 143267 device is recovered. Thus,repparttar 143268 device is useless torepparttar 143269 thief, but it can be reactivated and restored if it is recovered and returned to its rightful owner.

Another new security breach has been encountered this year when reports were received about a backdoor Trojan horse program that can take control over a mobile device. This isrepparttar 143270 first known backdoor Trojan horse for PDAs. The subject program, identified as Backdoor.Brador.A, attacks PDAs runningrepparttar 143271 Windows operating system. And like all backdoors, it cannot spread by itself. The Trojan arrives as an e-mail attachment or can be downloaded fromrepparttar 143272 Internet. Also, it has a complete set of destructive functions characteristic for backdoors. After it is installed, this small program is activated whenrepparttar 143273 PDA is restarted and begins to look for a remote administrator to take control ofrepparttar 143274 device. Security specialists claimrepparttar 143275 virus was written by a Russian virus coder since it was attached to an e-mail with a Russian sender address and contained Russian text. Fortunately,repparttar 143276 Trojan’s threat control and removal was rated as "easy".

The important thing about this virus is notrepparttar 143277 number of devices affected, because this number is very small, butrepparttar 143278 fact that this isrepparttar 143279 first one that appeared onrepparttar 143280 "market" is considered to be very important. We have to admit that it is hardly surprising that viruses have found their way to mobile devices. This isrepparttar 143281 natural trend. Where technology goes, viruses will follow. Asrepparttar 143282 new technology shifts intorepparttar 143283 mobile market, these threats will move in that direction also. The specialists fromrepparttar 143284 Kaspersky Labs claim they were expecting a virus attack on a PDA, due torepparttar 143285 latest attacks against other mobile devices. Now,repparttar 143286 PDA users look at a real danger and it is a well known fact that interested intruders will grabrepparttar 143287 chance to attack PDAs and mobile phones inrepparttar 143288 near future. Virus threats development for mobile devices is passing throughrepparttar 143289 same stages asrepparttar 143290 one for desktops.

3G Technology

Written by Mike Ber


A ‘third generation’ wireless communications technology having evolved from first generation analog, and second generation digital, communication technologies.

Whenever someone asks me to explain what 3G systems are, I tend to think of huge departmental stores. All your basic needs – plus a few extra items thrown in to spice things up – under a single roof. A plea to modern man’s psychological need for convenience. And that’s how it is withrepparttar current crop of 3G packages. A simple, all-in-one access to everything users could ever want from a mobile phone (and then some).

But seriously now, what is 3G (or 2.5G for that matter)? Basically 3G systems are meant to berepparttar 143264 ultimate upgrade torepparttar 143265 current 2G systems that are operating underrepparttar 143266 Global System of Mobile Communications (GSM). GSM is referred to asrepparttar 143267 Second Generation (2G) of mobile phone technology, withrepparttar 143268 old analog mobile phone system beingrepparttar 143269 first. Since current 2G phones send and receive data at only 9.6 Kilobits per second (kbps),repparttar 143270 advent of text and multimedia messaging (MMS) has meant thatrepparttar 143271 demand for drastically improved data transfer rates has been very strong.

3G systems are designed to offer increased voice capacity and higher-speed data rates by providing a more robust wireless pipeline. The International Telecommunications Union (ITU), a regulatory and standards-setting body, states that any system claiming to be 3G must be capable of a minimum speed of 144K bits/second, and theoretically going up to 2 Mbps. Very good, you might say. But why is there such a need for speed?

Well, 3G systems aim to provide faster access to all kinds of data, thus turning your wireless phone (or appliance) into a handier, cooler, tool. This speed is matched withrepparttar 143272 promise that it will "keep people connected at all times and in all places." What results isrepparttar 143273 capability to accessrepparttar 143274 Internet as you would at home, mobile instant messaging, enhanced multimedia options, usability as a fax/pager/e-mail tool, as well asrepparttar 143275 obvious premise of crisper and more stable voice communications. Very impressive, but not without a lion’s share of problems.

For starters, 3G services are bound to be ‘expensive’, especially due torepparttar 143276 very high prices paid for 3G spectrum licenses. Secondly,repparttar 143277 services offered by 3G are nice, but are beyondrepparttar 143278 current demands ofrepparttar 143279 average user. So now we have a situation whererepparttar 143280 consumer is not satisfied withrepparttar 143281 current level of service, yet is also balking at paying so much for something that resembles overkill.

To fillrepparttar 143282 void, 2.5G has evolved. 2.5G radio transmission technology is radically different from 2G technology because it uses packet switching. GPRS (General Packet Radio Service) isrepparttar 143283 European 2.5G standard,repparttar 143284 upgrade from GSM. GPRS overlays a packet-switched architecture ontorepparttar 143285 GSM circuit-switched architecture. It is a useful evolutionary step onrepparttar 143286 road to 3G because it gives telecommunications operators experience of operating packet networks, and charging for packet data. Data transfer rates in 2.5G services can theoretically reach 64Kbps.

It is important to noterepparttar 143287 resulting irony. Because 3G services were too expensive and becauserepparttar 143288 market was not ‘ready’ for them, 2.5G evolved. Now, as it is said later,repparttar 143289 evolution of 2.5G has become an obstacle for 3G services to penetraterepparttar 143290 cell phone market.

However, 3G cannot be judged merely onrepparttar 143291 basis of costs and services alone. The value of any consumer technology can only be truly measured in terms of its worth torepparttar 143292 average user. And when it comes to mobile communications,repparttar 143293 needs ofrepparttar 143294 ‘average’ customer are already being fulfilled through 2G and 2.5G. Most people do not need to use video conferencing or browse complete websites through their cell phones. Most of us are satisfied with constant coverage,repparttar 143295 provision to check our email and maybe send a voice message or so. With all of this available in quite affordable packages, experts are beginning to wonder whether there actually isrepparttar 143296 massive demand to matchrepparttar 143297 hype that was created when 3G first came intorepparttar 143298 picture.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use