Trending February 2024 # 4 Surprisingly Outdated It Infrastructures You (Probably) Didn’t Know About # Suggested March 2024 # Top 8 Popular

You are reading the article 4 Surprisingly Outdated It Infrastructures You (Probably) Didn’t Know About updated in February 2024 on the website Cancandonuts.com. We hope that the information we have shared is helpful to you. If you find the content interesting and meaningful, please share it with your friends and continue to follow and support us for the latest updates. Suggested March 2024 4 Surprisingly Outdated It Infrastructures You (Probably) Didn’t Know About

1: Nuclear Facilities Still Rely on Floppy Disks (from the 70s)

This same computer (and the floppy disks needed to transport data from it) are still being used for the government’s nuclear command and control systems. This might sound silly, but it makes a little bit of sense when you think about the fact that newer systems are easier to hack remotely (if they’re connected to the Internet, of course). Still, maintaining hardware that isn’t even produced anymore (IBM withdrew the Series/1 from marketing back in 1988) is very expensive since replacement parts are hard to find.

2: The Treasury Department Still Uses Assembly Code

First making its appearance in 1949, assembly code (ASM) has influenced the way computers operate today. It is the granddaddy of every other computer programming language and is still used to some extent when making kernel level software.

The U.S. Treasury Department, however, still relies on it heavily. No one got around to changing this status quo, meaning that government employees tweaking the software that runs this particular department have to contend with code that looks like the following.

The treasury’s “Business Master File,” which is used to track tax data for individual businesses, encounters the same problem. In addition to working on a very dated programming language, this particular record runs on a mainframe system less powerful than the first iPhone and larger than the average bedroom.

Don’t get me wrong: ASM is just as efficient (and in most cases, more so) as its successors, but the fact that it is very convoluted and extremely difficult to program with makes it more trouble than it’s worth in this particular case.

3: Veterans Affairs Uses COBOL For Its Most Important Functions

Invented in the late 50s for the purpose of making it easier to do business with computers, COBOL is a programming language that continues to run some of the most important aspects of the VA department within the United States.

Although more updated versions have still found their way into business circles, the VA continues to use the version it first adopted when it first began to use computers. Everything from human resources to veterans’ benefits continues to use a system that was implemented back when Elvis Presley was still recording albums.

4: The Department of Transportation Relies on Classic chúng tôi to Track Hazardous Materials

Active Server Pages was an add-on to IIS (Microsoft’s web-hosting platform) that allowed developers to create websites that worked well with Microsoft products. The plan didn’t necessarily pan out (most websites rely on PHP) probably because of the fact that hosts would have to pay licensing fees to use IIS.

The Department of Transportation doesn’t seem to have gotten the memo since they continue to use classic ASP even though Microsoft has already stopped supporting it. This presents a number of security issues, which is a significant concern when you take into account the fact that this system tracks and reports on hazardous materials transported across the country.

The good news is that the Government Accountability Office states that there are plans in place to replace this system entirely by the year 2023.

Conclusion

Compare the situation to that of European nations: although they are a bit more up to date on their systems in general, this can largely be chalked up to the fact that most governments had an inherent distrust of computers until the late 90s. Fun fact, by the way: the National Health Service in the UK still uses Windows XP.

Miguel Leiva-Gomez

Miguel has been a business growth and technology expert for more than a decade and has written software for even longer. From his little castle in Romania, he presents cold and analytical perspectives to things that affect the tech world.

Subscribe to our newsletter!

Our latest tutorials delivered straight to your inbox

Sign up for all newsletters.

By signing up, you agree to our Privacy Policy and European users agree to the data transfer policy. We will not share your data and you can unsubscribe at any time.

You're reading 4 Surprisingly Outdated It Infrastructures You (Probably) Didn’t Know About

Everything You Need To Know About Iphone Os 4

After making the crowd go WOW for a few minutes, Steve-o, loyal to himself, started the presentation about iPhone OS 4.

Here is everything you need to know about iPhone OS 4 (all images are compliments of gdgt):

iPhone OS 4, will come with many many new features. With over 1,500 new APIs for devs, chances are there will be a little something for everyone.

Although iPhone OS 4 will come with hundreds of new features, the presentation was focused on 7 of them.

1. Multitasking

This is a given one that I had predicted since last year (hey no applause for me here, please hehe). As steve Jobs said, “We weren’t the first to this party, but we’re going to be the best”, and I believe him.

Dudes from Pandora and Skype came up on stage and demo’d their apps in action, running in the background. If you’ve seen Backgrounder and Proswitcher, you won’t be amazed by that. I guess the real asset of Apple’s new multitasking is that it’s been developed to not feel sluggish or drain the battery, which you might have experienced with apps like Proswitcher.

Apple will be providing seven multitasking services:

Location

Push notifications

Local notifications

Task completion

Fast app switching

2. Folders

Very much inspired from the jailbreak app Categories, Folders will give people the ability to organize their apps better.

Apple added a beautiful UI that allows you to drag and drop your apps in folders. The folder name is automatically created but can of course be edited. Up to OS 3.X, you were able to have 180 apps on your iPhone over 11 pages. If you replace every one of those with a folder, you’re now going to be able to see 2,160 apps!

3. Enhanced Mail

This is another big one that I’ve wanted to see for a while: the unified inbox.

You can now have all your emails from different accounts come in one unified inbox. Obviously, you can still switch to a specific inbox if you wish too. Additionally, iPhone OS 4 allows you to add multiple Exchange accounts (no more hack needed).

Finally, Apple added the ability to sort your emails by thread, pretty much like Gmail does.

4. iBooks

This is one I really don’t care about. I guess many people do though, and that’s yet another opportunity for Apple to sell you something (ebooks).

Not much was said about iBooks. Basically they brought it from the iPad. Nothing exciting…

5. Enterprise Features

A bunch of features for companies that no one except businesses really care about. My favorite is wireless app distribution which allows a company to wirelessly distribute an application anywhere in the world with their own servers.

6. Game Center

Again, nothing really groundbreaking here. Apple added a social gaming network that does automatic matchmaking, find others with a similar ability and match them against you.

7. iAd

This is the big fish of the day. While you probably won’t give a damn about iAd, let me tell you this: iAd is the reason why I bought a crap load of Apple stocks…

Conclusion

One thing I forgot to add in there is that you’ll now be able able to add custom backgrounds to your home screen. That’s not really the theming many of us expected, but that’s a start.

Apple will be releasing a developer preview of iPhone OS 4 today at chúng tôi

iPhone OS 4 will be release to the rest of us this summer for the iPhone 3GS and iPod Touch 3G. They will run pretty much everything. The iPhone 3G and iPod Touch 2G will run many of these new features, but not everything (ie. multitasking) because the hardware just can’t do it. iphone OS 4 won’t be released until this fall for the iPad.

All in all, I’m not impressed by this presentation as I expected much more from iPhone OS 4 but let’s not forget this is just a developer presentation and there is still a few months until the launch of the next iPhone. Like the teaser said, this was just a sneak peek at the future of iPhone OS. Something tells me there is much more to come in the next few months.

Thanks to gdgt for the amazing live blogging and for the images.

What You Should Know About Healthcare It Security Best Practices

Healthcare has earned an unfortunate reputation as the most frequently breached sector, at an even higher rate than financial services. Part of the reason is the lucrative nature of its data — the average healthcare data breach costs $380 per record, compared to a global mean cost of $141, according to research from the Ponemon Institute. Security problems don’t just affect patient care; they can also bring lawsuits if patient data is exposed.

Healthcare IT managers in the U.S. are also seeing vulnerabilities affect patient care as they fight a shortage of security talent, an abundance of legacy equipment with known issues, and widespread problems with haphazard networking.

There’s no cure-all to solving these problems, but healthcare IT best practices — assisted by automation such as a good mobile device management (MDM) toolkit, and devices with chip-level security such as the Samsung Galaxy Tab S4 — can put you in a more secure spot. Follow these three main steps to strengthen your mobile security in the hospital.

1. Build a Culture of Security

Rather than just focusing on minimum HIPAA requirements, IT managers should try to zoom out and build a big-picture security strategy — one that addresses the needs of all employees from the C-level executives to floor staff. This means pushing information security education down to individual staff members and up to the executive team, so that they understand the issues and the plans to address them. This culture extends outside of the organization to partners and suppliers, so look for vendors that are naturally aligned with your security goals.

Within this framework, mobile device security starts with appropriate policies based on a risk analysis and appropriate mitigation. Policies should detail how mobile devices are managed, whether staff are allowed to bring and use their own devices, restrictions on how and where devices may be used and the security measures and configuration of each mobile device.

IT security plans must also contend with the recovery from other types of disasters. For example, if IT networks or systems are down, healthcare staff will still need to exchange vital information, and a plan for secure communications should be in place.

However, a mobile device policy is useless if it isn’t communicated, so healthcare staff at all levels should receive training on how it affects them and be required to sign off that they understand and agree with the policies.

2. Establish Mobile-Specific Policies

Given the heavy use of tablets and smartphones, mobile devices need to be a special focus of hospital security policies. Device loss and theft are a start, but admins should also be aware of electromagnetic interference (EMI) in the medical environment, shoulder surfing of private health information by unauthorized viewers, unencrypted Wi-Fi networks, and sloppy authentication practices.

How Mobile Solutions Improve Patient Experience

White Paper

Get your free guide to enhancing the patient experience with mobile technology. Download Now

Key initiatives to protect mobile devices typically include strong bidirectional authentication, both of the user and of the device, and a requirement for encryption of all Electronic Health Record (EHR) data, both on the device and in-transit over the network.

IT managers should layer additional security on top of the basic features of the mobile device operating system. Endpoint security software helps to reduce the attack surface, and Android-specific security tools such as Samsung Knox bring additional security — such as virtual private network (VPN) — as well as data loss protection and containerization features.

MDM tools are key systems for IT managers to corral devices and keep them up-to-date and compliant with policies for authentication, encryption and end-point security.

3. Implement Strong Access Controls

Physical access controls are hard in a hospital environment, where 24/7 traffic includes a constantly rotating cast of patients, caregivers and support technicians. Devices should be protected from unapproved access, theft and unauthorized viewing.

This rotating cast doesn’t just apply to people. It also applies to devices, which may shift hands and roles every few hours. By drastically reducing locally stored data and providing access to cloud-based resources founded on user credentials, IT managers can more tightly implement strong access control policies.

At the top of all these access controls are defined rules for who can see EHR data. IT managers should grant access to EHR information based on “need to know” policies, built on top of role-based access controls. While this can be done by applying specific profiles to phones, data separation is also an easy way to segment certain types of data.

EHR access controls have implications for other parts of security policy, including logging, log maintenance, device remote wiping policies and sharing of user accounts.

Access to networking should be a primary concern as well, and MDM tools can help to enforce these policies on the hardware side. Physical Ethernet ports should all be protected using NAC technology to prevent unauthorized users or devices connecting to the hospital backbone.

Furthermore, wireless networks should be carefully segmented, with separate firewalled access defined for guests, medical and non-medical staff, and medical and non-medical IoT devices. End users must use WPA2-Enterprise wireless networks that authenticate both the user and the device and provide strong encryption.

Regardless of hospital IT infrastructure, administrators need to develop a multifaceted approach to mobile security to keep patient and employee data safe. By combining education, mobile-specific policies and access control, IT departments can create a solid foundation against any future cyberattacks.

This Woman Swallowed Her Braces 10 Years Ago And Didn’t Know It

Ordinarily, when we eat something harmful, we get sick fairly quickly, or the item passes through our bowels in a normal fashion. Neither happened in this woman’s case. Depositphotos

When a thirty-year-old woman turned up to the Sir Charles Gairdner Hospital, in Western Australia complaining about an incredible amount of stomach pain, the cause of her suffering initially eluded the physicians trying to treat her.

Blood tests that look for inflammatory markers in white blood cells—the cells of the immune system—were normal. This suggested that her woes weren’t caused by an infection.

“Then we looked at kidney function and liver function as well to tell if there was some kind of larger problem affecting other organs” Dr. Talia Shepherd told Popular Science. Shepherd was one of the physicians handling the woman’s case and wrote about the experience in a case study recently published in the journal BMJ Case Reports

But the woman’s kidney and liver functions were normal too.

The woman hadn’t recently had surgery which ruled out the likelihood that a surgeon had accidentally left something behind—something that happens surprisingly often. A 2013 inquiry, by the healthcare nonprofit The Joint Commission found that over a seven-year period in the United States, surgeons left behind 770 objects—ranging from gauze and towels to broken parts of instrument—in patients. Objects left behind can often cause a range of health issues and even death.

But the woman hadn’t had surgery. Still, a CT scan—a type of x-ray—did reveal that an object was behind the woman’s woes. A thin metallic wire was poking at her intestines.

The area circled in blue highlights the braces wire they saw on the CT scan. Shepherd T, Teo A, Naunton-Morgan R./BMJ Case Reports

“We were all a bit dumfounded,” says Shepherd. “It wasn’t what I was expecting to find at all.”

“The other thing that we see not infrequently are fish bones,” added Shepherd. “So, people swallow fish bones and then perforate through the bowel and I thought possible that’s what it was. But looking at the density on the CT scan the radiologist said it was something metallic.”

Ten years earlier, the patient had worn braces. And somehow—it’s not clear how—she swallowed one of the wires used to straighten her teeth. The filament clocked in at just under three inches.

This isn’t the weirdest thing Dr. Shepherd has seen someone swallow, “In terms of objects that people have swallowed, I’ve seen some pretty weird things,” she says, “But we’ll it to leave to people’s imaginations.”

A quick google search turns up cases of people swallowing a Sponge Bob Square Pants keychain, an LED light and so on. But what makes this case so strange is that the item stuck around for so long without causing any problems.

“The case is so unique is because normally if you swallow something like that it presents earlier,” says Shepherd.

The digestive tract, from your mouth all the way to your bowels has plenty of twists and turns where that braces wire could have gotten stuck and started causing problems. There were plenty of opportunities along that particular digestive path during the decade that the patient carried the wire inside of her body.

“People normally present much earlier,” says Shepherd, “kind of right after they’ve swallowed it or when it’s in the stomach really, because that’s obviously where it has a high risk of causing a perforation.”

But it didn’t.

Instead it just sat somewhere in her digestive system silently for a decade, until one day it shifted, leaving her with an intense pain, eventually bringing her to the hospital and Shepherd.

The doctors surgically removed the wire and now, says Shepherd, “She’s totally well and kind of taken it in her stride and moving on with her life. She recovered well.”

Everything You Should Know About Youtube: Private Vs Unlisted

Everything You Should Know About YouTube: Private vs Unlisted

Having said that, there are times when you (as a video uploader) don’t want the whole YouTube family to watch your video. There can be various reasons that can be categorized in different sections and you want a particular section of viewers to watch the same video. In those cases, you can use the customization settings to make the video available to people as YouTube Private or Unlisted. Yeah!!

YouTube Video Types & YouTube Platform

Everyone is using the same platform (YouTube), yet, many of them are getting reviews in millions & others are in thousands. Obviously, the time, content, video quality, & supporting things matter, however, the video-type-leveraging also plays a vital role that can boost your business (if you are into business). These video types can be as simple as Public to as specific as Private that limits your viewers & let you control your audience.

If you are running a business, there are plenty of questions that go through your mind while posting videos on YouTube. Should I make this public so my friends can also see the video along with the clients? Do I need to make a separate video for clients or share a webinar with them? Do I want my family to see these videos or just the people I’m working with?

So many questions yet you need to find ways to meet all the expectations and publish your videos as well. And the simplest & approachable way is, publishing your videos as Private or Unlisted so you will have full control over the viewers.

What Do You Mean By YouTube Private vs Unlisted? YouTube Private

As the name suggests, YouTube Private is all about keeping your video visible to a certain number of people (50 in total)    . That too, you will need to invite so choose the people wisely before sending the invitation for the video visibility. This goes without say but the YouTube Private videos don’t get listed under video recommendations & search results.

Additionally, it’s not a chain system where the invitees can send the invite link to other people so they can watch the video. Even after saying so, the invitee sends the link to another person, he/she won’t be able to watch it unless they have got the direct link from the uploader.

Also Read: How to Use YouTube in Picture-in-Picture Mode

YouTube Unlisted

Apart from the YouTube Private, another video type YouTube offers is Unlisted that is somewhere between the Private & Public category. Any YouTube video that comes under the YouTube Unlisted video category can’t be seen in video suggestions or search results. However, whoever has the link to the video can watch as well as share the video easily.

That means, in Youtube Unlisted videos, it can work like a chain system where viewers can watch & share the video link to other users as well.

Public

Last but not the least, the Public video category is another section of videos YouTube offers to its uploaders. If you are going ahead with Public type while publishing the video, sky’s the limit for you. You have the whole YouTube world to view your video and more viewers or subscribers is the key to the right direction, we believe. Setting the video’s category Public will bring your video in Google Search results (if someone types in the right keywords). With the right kind of strategic decisions, the Public video category can profit you in many ways.

Difference Between YouTube Private & Unlisted

Now that we have got an idea about the YouTube video types, we can take the decision accordingly while publishing videos. Having said that, the above explanation is just an intro to what the video type means. If you are planning to stay on YouTube for a long time & we believe that you do, knowing about them in depth is a necessity. So here we will be talking about the differences between both types of videos, YouTube Private & YouTube Unlisted.

Also Read: YouTube Loading Slow: Here’s How to Fix

Advantages of Creating a Video, “YouTube Private”

1. Own Video Library

Obviously, if you are sharing your personal videos to a limited number of people, those are close to you. And since you have all the control over those videos, soon it will become your own video library. Please know that those videos can be anything from secret project to comic books or art because YouTube doesn’t limit you to not put specific content videos unless they are compromising ones. So whenever you feel like watching them, go to your account and they are easily accessible to you, your own video library.

2. Organization Info Store

3. Video Sharing With Loved Ones

4. Storage Space Saving

Advantages of Creating a Video, “YouTube Unlisted”

1. Portfolio Sharing With Possibly-Future-Employers

Without a doubt, everyone of us would agree that the Unlisted YouTube category is a gift for users. More than 70% of people are doing jobs in the whole world & they don’t want the current employer to know that they are looking for other options. YouTube Unlisted can help you put in your portfolio in front of prospective employers and your current employer wouldn’t have a slightest idea about it. Isn’t this cool!!

2. Feedback Sharing For Co-Workers

Feedbacks are a very important aspect of running a business (no matter small or big) & it needs to be kept away from people you wouldn’t want to get access to. In case you have a running business where the employee strength is more than 50 people or simply a section you want to share the feedback with, go with Unlisted YouTube videos.

3. YouTube Page Redesigning

Not everyone is too happy with the video he/she made in the starting phase of posting videos on YouTube. So in case you want to untie yourself from those old videos that are embarrassing for you now, the Unlisted YouTube feature is for you. Plus, there are possibilities that the video has been shared or embedded by any of the users and it can be accessed again. So in those cases, if you switch to Unlisted YouTube video, the video visibility will be gone hence no access. Voila!!

Limitations of YouTube Unlisted Videos

Not every feature, app or software is perfect because users have their own expectations & manufacturers cannot amend accordingly. With YouTube Unlisted, one of the limitations is if your video is on playlist, it might appear publicly. Another limitation is a bit riskier because the unlisted YouTube videos get shared on other websites as there is a dedicated website for YouTube Unlisted videos altogether.

How to Change The YouTube Video Privacy Settings

Now that we have learnt about the video types that one can publish on YouTube, it’s important to know how to do so. You need to start the process by logging into the YouTube account & tap on the “Video & +” sign nearby the account profile picture.

Post doing so, choose the Upload Video option from the list & on the same page, you will see the list of making it either Public, Unlisted, or Private.

Choose your appropriate video type accordingly and go ahead with uploading the video on YouTube.

Wrapping Up:

Privacy protection is very important while you are on the internet & one loose end can give you nightmares. From Facebook to Instagram & YouTube, every one of those platforms are popular among users, however, while creating & uploading content, you need to be extra careful. For example, if you want to upload videos on YouTube & control your viewers, set the video privacy settings accordingly.

From YouTube Private to Unlisted YouTube & Public categories define your YouTube family so be careful while doing so.

Next Read

How To Make A GIF From A YouTube Video

How To Download YouTube Videos On Mac

Quick Reaction:

About the author

Ankit Agarwal

What You Need To Know About Osx/Dok Malware

A new type of man-in-the-middle attack has been detected in the wild, targeting Apple’s Mac. Dubbed OSX/DOK, it relies on a new strain of macOS malware which leverages a bogus security certificate to bypass Apple’s Gatekeeper protection. Popular anti-virus programs are currently unable to detect OSX/DOK.

The Hacker News and researches at CheckPoint explain that the malware affects all versions of macOS by using a valid developer certificate signed by Apple. Here’s what OSX/DOK does, how it works, how to tell if you’re affected and what you can do to protect yourself and avoid these kinds of attacks in the future.

What is OSX/DOK?

OSX/DOK is a new type of malware distributed via an email phishing campaign.

It’s been designed to specifically target Mac owners. OSX/DOK affects all macOS versions and can avoid detection by most anti-virus programs. It’s signed with a valid developer certificate authenticated by Apple, meaning it avoids detection by macOS’s Gatekeeper security feature.

How does OSX/DOK infest your Mac?

The malware bundle is contained in a .ZIP archive named “Dokument.zip.”

Once executed, the malware first copies itself to your Mac’s /Users/Shared/ folder before executing itself from that location. It then proceeds to install a new root certificate which lets it intercept your traffic with a man-in-the-middle attack. To ensure the malware finishes installing its payload before a reboot, it adds itself as macOS Login Item named “AppStore”.

Next, the user is greeted with a persistent window designed to look like a valid macOS warning, as you’re seeing on the screenshot below. The window informs the user of a supposed security issue in their Mac which requires an update. The message prevents the user from doing anything on their computer until they accept the fake update prompt.

Once the password is supplied, the malware gains administrator privileges on your Mac.

Using those privileges, it installs command-line tools that allow connection to the dark web. It then changes your Network Settings to redirect all outgoing connections through a malicious proxy server which lets the attacker eavesdrop on your communications.

Some phishing messages used to spread the malware appear to mostly target users in Germany, but that doesn’t mean that only European users are at risk. For what it’s worth, the malware code supports messages in both German and English.

What damage does OSX/DOK do?

OSX/Dok redirects your traffic via a malicious proxy server, giving nefarious users access to all your communication, including that encrypted by SSL. Because it installs a compromised root certificate on the system, the attacker is able to impersonate any website to fool users into providing their passwords for banking apps and popular online services.

How to know if you’re affected?

If you’ve recently opened a ZIP file in an email message you weren’t expecting, and are now seeing suspicious-looking prompts asking for your Mac password, your system may have been infected with OS X/DOK. Because the malware redirects your network traffic to a rogue proxy server, you should venture into System Preferences → Network.

If Automatic Proxy Configuration has been enabled in the lefthand column and the field underneath the heading Proxy Configuration File points to the URL that begins with “127.0.0.1:5555”, the malware is already routing all your traffic through a rogue proxy server.

The malware installs two LaunchAgents that will start with system boot:

/Users/YOUR USERNAME/Library/LaunchAgents/com.apple.Safari.proxy.plist

/Users/YOUR USERNAME/Library/LaunchAgents/com.apple.Safari.pac.plist

If you find these files in the above locations, delete them immediately.

If the certificate is installed on your Mac, delete it.

How to protect yourself?

OSX/DOK is the first major-scale malware to target Mac users via a coordinated email phishing campaign.

The first point of attack relies on the user opening a maliciously-crafted attachment in an email message. Don’t open suspicious attachments, especially if the attached file is named “Dokument.ZIP”. Beware of phishing messages bearing animated GIFs or those regarding supposed inconsistencies in your tax returns.

Always check the headers to confirm the validity of the sender.

If the malware file has found its way on your system, do not interact with and suspicious-looking prompts pretending to be valid macOS dialogs, especially if they ask for your root password for no apparent reason. Apple never puts up warning messages if your Mac requires a software update. All macOS software updates are distributed exclusively via Mac App Store.

If you use an anti-virus app, update its signature database manually.

At the time of this writing, no anti-virus vendor has updated their signature database with DOK OS X malware, but that will change soon. This malware issue will be fully resolved as soon as Apple revokes the bogus security certificate that its author has abused to bypass the Gatekeeper security feature.

Source: The Hacker News, CheckPoint

Update the detailed information about 4 Surprisingly Outdated It Infrastructures You (Probably) Didn’t Know About on the Cancandonuts.com website. We hope the article's content will meet your needs, and we will regularly update the information to provide you with the fastest and most accurate information. Have a great day!