Skip to main content

Posts

A Guide to Patenting Software: Getting Started

One of the things that makes protecting computer related inventions tricky is that first you have to define the invention, and defining the invention is not something that is altogether easy when the invention is a computer process or relates to software. Sure, it is easy enough to define a list of desired functionality, and if you have some computer programming skills it is easy enough (after investing the requisite time) to write the code that will enable the functionality, but that which can be protected via patent lies somewhere between the desired functionality and the code, making the defining of the invention rather elusive for some, particularly those who are new to the patent arena. Further complicating the matter is the reality that over the last several years the law of patent eligibility in the United States has been in flux. It did become largely settled with respect to software and business methods thanks to  Bilski v. Kappos , which was decided by the United States S

What Is Doxing & How Does It Affect Your Privacy? [MakeUseOf Explains]

Internet privacy is a huge deal. One of the stated perks of the Internet is that you can remain anonymous behind your monitor as you browse, chat, and do whatever it is that you do. However, did you know that your real life identity can be compromised based on your Internet persona? It’s called “doxing” and it’ll sneak up on you without your knowledge. So, what is Doxing? Doxing can affect anyone. Nobody is outside the possibility of being doxed. How much of your real life information is on the Internet? Even the smallest slice of personal data can come back to bite you in the rear. Real name, phone number, email address – anything. Sound like fearmongering? In one sense, it is. You’ve probably never heard of someone who’s been doxed. But that doesn’t mean you’re immune. Let’s take a closer look at what doxing is, exactly, and then I’ll show you what you can do about it. Doxing 101                                                                                                

12 ways to hack-proof your smartphone

A s we’ve recently seen from  leaked CIA documents , no one is immune to hacking attacks. Here’s how to protect yourself against them, whether they come from opportunist thieves or state-sponsored spies. 1. Keep up to date – and don’t open up holes yourself When it comes to protecting yourself against hackers, step one is always to install software updates as soon as they become available: that’s as true on smartphones as it is on computers. Yes, updating can be a tiresome and intrusive process, and it sometimes brings annoying changes to the interface that you’re used to. All the same, a huge proportion of successful hacks exploit vulnerabilities that have already been patched; exposing yourself unnecessarily is just daft. I’d also strongly advise against using unofficial tools to “root” your phone (known as “jailbreaking” on iOS), unless you know exactly what you’re doing. On a rooted phone, technical safeguards can be defeated, allowing apps to perform all sorts of actions t

Top 7 Network Attack

When you log in to an AccessEnforcer, or any UTM device, you will see a number of network attacks detected and blocked. The number may be in the thousands, or even hundreds of thousands. Many of these attacks are scans – precursors to attack. Depending on your settings, a good number might also be firewall policy violations. But what are other types of network attacks? What are the most common ones today? One answer comes from the latest  Threat Report  from McAfee Labs. The chart below aggregates data from the company’s network of millions of sensors across the globe. It shows the most common network attacks detected in Q1 2015. We describe each of these common types of network attacks below. Top 7 types of network attacks Denial of service attacks – 37% A denial of service (DOS) attack attempts to make a resource, such as a web server, unavailable to users. These attacks are very common, accounting for more than one-third of all network attacks reviewed in the repor

crypthography and network security

Cryptography, which translates as "secret writing," refers to the science of concealing the meaning of data so only specified parties understand a transmission's contents. Cryptography has existed for thousands of years; for most of history, however, the users of cryptography were associated with a government or organized group and were working to conceal secret messages from enemies. These days, millions upon millions of secure, encoded transmissions happen online each day -- and cryptographic standards are used to protect banking data, health information, and much more. Without cryptography, e-commerce as we know it would be impossible. Since online security threats evolve so quickly, there are dozens of different schools of thought on how best to use encryption to enhance network security -- not just for governments, but for businesses and end users, too. Classical Encryption Techniques Classical Encryption Techniques Explained at Purdue University (PDF) : These