2.05.2010

Malili Kenya's High-Tech Metropolis

Close your eyes and imagine a city built for technology. It is a city that will help spur economic development for an entire region, and serves as a exemplar for tourism, manufacturing, IT, and financial service companies. There’s ample mass transit, fiber optic speeds for data, partnerships with academic institutions and real estate developers, and is located near other large cities and airports. Sounds like something out of a science fiction novel, doesn’t it? Well by 2030, this will be a reality in Africa.
This is Malihi


Malili is a proposed 5,000 acre “technopolis” located 60km near Nairobi, Kenya. The city will create a regional brand for telecommunications, as well as grow the country’s IT contribution to their GDP. Malili will include a convention center, hotels, shopping facilities, academic institutions, health facilities, and more, according to Bitange Ndemo, Permanent Secretary in The Ministry for Information and Communications. Since his appointment, Ndemo has been concerned with the spirit of entrepreneurship in the region. Malili will follow similar “smart villages” created in Malaysia (Putrajaya) and China (Shenzhen). Smart Village Cairo, another comparison model, has 120 companies and 20,000 local and expatriate technology professionals in their city, and expects to expand more by 2011.
According to WhiteAfrican.com, Malili is a large government project that also has private sector participation – a combination which has not had the best track record for completed projects. This is an extremely ambitions move on the Kenyan government’s part. Time will tell whether or not this will fully come to fruition, but this is a great project for the country and the continent.

Rebuilding Haiti: Lessons from Katrina

While comparisons of the devastation in Haiti to New Orleans may seem obvious at this point, serious reflection is still needed. As the world mobilizes to help reconstruct Haiti, we must analyze carefully how today’s actions will impact the long-term survival of Haitian institutions, its future growth and its ultimate positioning on the world stage.

With world attention focused on them now, Haitians may have only one chance to rebuild sensibly. -J. Phil Thompson MIT's Urban Studies and Planning Department

This country, already on the brink of disaster even before the quake, is vulnerable to more earthquakes and potential disasters.

From MIT’s New Orleans experience, where students and faculty worked with community groups, the city and labor unions in a myriad of projects, we learned a few lessons that should apply to Haiti:
  • Well-meaning outsiders cannot be allowed to strip the country of its local capacity or ignore local knowledge.
  • Local assets must be preserved, and
  • Paternalistic foreign donor attitudes are best left at home.
Many responding to the Katrina crisis were determined to work “on” New Orleans rather than to work “for” New Orleans.

To avoid this in Haiti, we must look closely at the motivation of aid efforts and those who fund them.

Let’s start with attitudes. Following Katrina, some public commentary suggested that poor neighborhoods in New Orleans were not worth restoring, and that poor blacks in the city were culturally dysfunctional and better off dispersed elsewhere.

There is a close parallel to Haiti. New York Times columnist David Brooks wrote last Friday that, “Haiti, like most of the world’s poorest nations, suffers from a complex web of progress-resistant cultural influences.” Brooks does not mention the role of U.S. trade policy in decimating Haiti’s once prosperous agricultural economy. He does not mention that foreign aid from rich countries to poorer countries goes largely to foreign-based NGO intermediaries rather than to strengthening domestic institutions. Nor does he examine Haiti’s complex relationship to its neighbors, or consider the stark racial discrimination Haitians face in business, employment and education.

Haitians don’t lack drive, ideas or high expectations of progress. They lack partners willing and capable of investing in their country’s considerable indigenous capacity.

So what is a program for success, given that outside aid is essential to Haiti’s recovery?

Strengthen the Capacity of Government: The government of New Orleans was in worse shape than the levees before the Katrina disaster. City government was simply unable to lead the recovery effort. To avoid this problem, the Haitian government has requested an immediate investment in its basic infrastructure. This may be an unpopular move given the immediate needs in the streets, but quickly building this capacity, and making outside support accountable to a national authority, is key to long-term success.

Build Civic Capacity from the Neighborhoods Up: The most successful rebuilding in New Orleans occurred almost entirely at neighborhood levels. This will likely be true in Haiti, too. It takes a great deal of face-to-face coordination and staging to distribute aid effectively and to rebuild communities. Helping residents organize and plan at neighborhood levels is as important as helping government coordinate at the national level. Existing community leaders—who know their neighbors and understand their concerns—will be essential partners with outside funders.

Prohibit Elite Land Grabs: Immediately following Katrina, a group of developers proposed turning the Lower Ninth Ward into a golf course. Another proposal was to tear down public housing projects to make room for “high-end” residences or businesses. Following the tsunami in Asia, there were similar proposals to confiscate land from fishing communities to build luxury hotels. Such hasty attempts at land-grabbing, promoted in the name of recovery, must be resisted.

Rethink Infrastructure; Make Use of 21st-Century Technology: Just as cell phone technology replaces the need to string telephone wires in a reconstructed Haiti, it is not necessary for Haiti to replicate 19th-century building methods. This means looking beyond the established infrastructure contractors to rebuild homes and buildings. Instead look to Haitian social entrepreneurs, universities and regional development banks for the latest technologies that can be scaled up rapidly. The innovative use of the Internet, mobile phone and satellite technology in coordinating relief efforts points to possible opportunities. With 1.5 million people now homeless in Haiti, let’s apply the same type of ingenuous use of technology to plan physical infrastructure very differently.
At MIT, two labs are working on user-designed, low-cost housing. Others are working on small-scale decentralized water and sanitation, solid waste management, and household energy technologies suitable for poorer countries. In its rebuilding, Haiti must access the most modern technologies available and cannot sit around waiting for the big contractors to arrive.

Establish Innovative Financing Mechanisms So Haitians Can Invest: Nearly $2 billion in remittances flow into Haiti annually; 31 percent of Haitians receive remittances regularly, primarily from the United States. Through collaboration with a financial intermediary, a “Haitian social investment fund” should be created to channel remittance flows into innovative businesses working in housing, health and life insurance, to name a few. There are also new technologies entering the market (such as Prosper and Kiva) that enable Haitian workers to easily make small loans to each other. Such innovative technologies democratize finance, making it easy and safe for Haitians across the globe to invest in rebuilding their country; investments that can quickly accumulate in scale.

New partnerships: Many Haitians in the United States are churchgoers. Their churches will play an active role in Haiti’s relief and recovery. But labor unions, not often thought of as partners in global development, can also be engaged.We saw a glimpse of how labor unions can further development in New Orleans following Katrina. The AFL-CIO Investment Trust Corp. financed a manufactured housing plant and created a job training facility in the city. Tens of thousands of U.S. labor union members are of Haitian heritage; their leadership is crucial to Haiti’s reconstruction.


Haiti Rewired


How to Connect Port-au-Prince with a Wireless Network


How to deploy long-distance WiFi links in Haiti

Inveneo has created a methodology for deploying long-distance wireless networks from our many years of work in Africa. So while Port-au-Prince presents it own set of logistical and communication challenges, we were able to install and manage a high-functioning network relatively quickly using these basic steps:

1. WiFi Network Design - make sure your nodes are visible to each other and pointing at the right location
2. Location Capacity Survey - confirming the location can support a network node
3. WiFi Hub Antenna Pointing - aiming the dish for the highest signal strength
4. Installation Trip Preparation - determining what you'll need before your 30ft up a tower
5. Node Antenna Setup - aiming and connecting the antenna
6. Disseminating Internet Access - networking locally for end-user access
7. Network Management - making sure everyone has equal access to bandwidth

If you've read this far, you'll want to read the full How to Deploy Long-Distance WiFi in Haiti primer and how we and our Certified ICT Partners can bring Internet access to rural and underserved communities in the developing world.

2.01.2010

Four predictions for networking in 2010

Networking
The IEEE committee has been working on two new standards expected to finalize in 2010 that I predict will force a similar change in our networking environment: IEEE 802.az and IEEE 802.3at. Under IEEE 802.az, an Ethernet link can sit in an idle state and turn itself on only when data needs to be transmitted -- rather than consume power without reason. Research from Berkeley National Laboratory reported using 1 Gb Ethernet cables capable of supporting the new standard would cut US energy bills alone by up to $250 million a year. Also, the IEEE 802.at standard will allow an increase in the amount of power that can be transmitted over Ethernet cables from 15.5 W to 25.5 W! This will allow a whole new class of products to be powered over standard Ethernet cables, for example wireless access points, desktop devices, etc.

Routing and switching
The most important routing and switching trend IT networking pros should ask about in 2010 is "How can I find the ways and means to provide unified physical infrastructure for my enterprise networks?" Routing a unified network infrastructure for your business will require you to provide transport for data, voice, and video over wired and wireless networks. IT professionals should also plan to have enough space for newer applications like RFID, physical security and intelligent building management systems. Another question that will pose a challenge to network designers and architects will be "How will I green networks and datacenters while keeping service levels the same?"

Cisco certification
"What is going on with Cisco's Security and Voice tracks?" is a question I predict IT networking pros will ask in 2010. They made some interesting changes to Cisco certifications in 2009, like their new Cisco Certified Architect program, and CCNA Voice and CCIE certifications. I hear Cisco is going to make some more radical changes again this year.
As another 2010 prediction, I suspect IT networking pros will ask about Cisco's new policy with Pearson VUE that requires Cisco certification candidates to take a picture when doing the exam. It might not be widely known yet, but I sure had my questions when I heard that!

Network project management
The most important question to ask in 2010 concerning network project management is "What will this do to other budgets or IT teams in the network?" Too often companies have made poor decisions based around a single product because it is the new "cool toy" on the block. Often these decisions have a very negative impact on other specialties that may or may not be involved in a particular project. It is really time for companies to stop letting the tail wag the dog when it comes to networking decisions.
A second 2010 prediction is that network project managers will ask "How much power am I using and how much do I really need?"

1.27.2010

iPad Hands On

The Wait is Over
9.7 inch iPad was released today at a 500 invite art studio full of techs, bloggers and the media. iPad uses same apps and iPhone, has 3G connectivity and it won't be on T-mobile.

Ubuntu One Installation Instructions- Cloud Computing


Requirements: Because we want to give everyone using Ubuntu One the very best experience, we require that you run Ubuntu 9.04 (Jaunty Jackalope) or higher.

Ubuntu 9.10 (Karmic Koala) and higher

Ubuntu One is pre-installed.Ubuntu 9.10 Desktop Handbook

1.24.2010

HP India rolls out DeskJet D5568 wireless printing solution



San Francisco Airport Plans Free Wi-Fi


SFO appears ready to add to the free airport Wi-Fi trend:

This is yet another surprise to this veteran watcher of airport Wi-Fi. The San Mateo County Times appears to have broken the news that the SFO airport authority wants to switch off the money flow when the current T-Mobile contract ends in February. The authority would try to keep T-Mobile as a managed services vendor for up to two years, but would tender a new request for bids for the airport's long-term wireless provider.
SFO would join Boston, which is finalizing its free decision; Seattle-Tacoma, which switched over this month; and potentially, Atlanta. Denver started offering free Internet access at the end of 2007.
SFO has competition in its area with two smaller airports: Oakland in the east bay and San Jose in the south bay; both of those airports switched to free Internet service in 2008.
Don't cry for the service providers who operate networks in these airports; that's primarily Boingo Wireless, which under the Concourse brand has the lion's share of airport operations; AT&T and T-Mobile operate most of the rest. Airports aren't inclined to run their own Wi-Fi networks, and thus providers may shift from the hassle and cost of collecting fees and splitting revenue to providing a fee for service, which is much more reliable income over the long haul.

1.21.2010

High-tech Product Releases

High-tech product releases announced the week of January 20 include Bluetooth headsets that talk to you, a device that enables wireless music streaming, the MOTOROI smartphone, LG's first Android mobile, a range of powerful notebook computers from Sony and eco-friendly external hard drives from Samsung.

Intelligent Bluetooth headsets
Aliph Jawbone II Bluetooth Headset with NoiseAssassin (Black) [Bulk Packaging]Aliph's Jawbone ICON series is the first Bluetooth headset to offer users a personalized headset experience via their website software platform. The device has built-in, easy-to-use intelligent functions, such as a visual battery meter, free directory assistance, voice-to-SMS and voice dial. Aliph's Jawbone ICON series weighs in at just 8 grams and gives users up to 4.5 hours of talk time and 10 hours standby. Jawbone ICON Bluetooth headsets are priced at $99.99 and became available January 18.
  

A gadget that lets you listen to your music wirelessly Aperion Audio's Home Audio Link is a wireless adapter that enables consumers to stream audio from their computer, iPod, MP3 player and mobile devices to their home theater or audio system. Users can use the tiny device to wirelessly send music to up to three rooms in their house. The Home Audio Link costs $149 for the first unit and $70 each for additional units. The device will be out on January 28.



First Android-powered smartphone in Korea
MOTOROI smartphone (also called the XT720) will introduce Korean users to a new set of Android features including high-speed web browsing via WiFi, Google Maps, Gmail, YouTube videos and Google Talk. Motorola's smartphone has an 8 megapixel camera, Xenon flash, MP3 player, multitouch browsing, free access to local TV and audio channels via Terrestrial Digital Multimedia Broadcasting (DMB), up card and a 720p HDMI video recorder - the first of its kind to be offered in the Korean smartphone market. The MOTOROI will be available throughout South Korea in early February. No price was announced.to 8GBs of on-board storage, support for up to 32GB of storage using a Micro SD





LG goes Android
LG's first endeavor into the Android-powered mobile world is a touchscreen, social networking smartphone called the LG InTouch Max GW620. The phone boasts both QWERTY and touchscreen keyboards, a Social Networking Manager (called Linkbook), auto face-tagging photo features (that let you call, message or text your friends by touching their face in a photo), 5-megapixel camera for photos and videos, and a 3" touchscreen. The phone is available for free in the UK on a £20 (€23) per month two-year contract.
                                                       
Powerful, high performance mobile notebook computers

Sony has launched a new series of VAIO Z notebook computers that are designed to be tough, ultra-light and portable. The high-performance laptops are crafted from carbon fiber and aluminium, weigh less than 1.45kg and have a full 13.1" (33.3cm) HD (1920 x1080) display. The VAIO Z series will be released at the end of March. No prices were given.



 Eco-friendly designer External Hard Drives
Samsung has introduced a line of stylish "green" hard drives for the tech-savvy generation who want their gadgets to look good. The G Series includes 250GB, 320GB, 500GB, and 640GM versions in their G2 portable line and 1, 1.5 and 2 Terabyte models in their G3 Station range. The Hard Drives are designed to reduce energy consumption by more than 95 percent and go to sleep automatically after five minutes of inactivity. The hard drives will be available in mid-January. The 2TB 3G Station will cost $199.

1.20.2010

Cisco 5500 Series Wireless Controllers Optimizing Enterprise Video Over Wireless LAN


Asa 5500 Aip Security Services CARD-5Cisco Goes After Wireless

Can video delivered over a wireless networking connection be as good as video coming from a wired network? That's the challenge that networking giant Cisco (NASDAQ:CSCO) now is trying solve with new technology called VideoStream.

With VideoStream Cisco is aiming to enable enterprises to deliver HD quality video to multiple wireless end points. VideoStream is part of Cisco's overall Medianet strategy for delivering an architectural approach for networks that can handle all types of media and includes both wired and wireless connection points.

With the ratification of 802.11n, users have the bandwidth to do high speed data over wireless. The challenge that remains is that wireless is still a shared media, with one access point and multiple clients all contending for the same data and spectrum.


Functionally VideoStream includes a number of key components, among them is the ability to do reliable multicasting(define) which enables live broadcasting over an IP network. What Cisco has done is figure out a way to have video sent and error corrected from the wireless access point to the client endpoints at the highest wireless data rate available.

With stream prioritization technology, VideoStream provides users with another layer of wireless video quality control.

In one case there might be a special CEO video stream and on the other hand there could be a sporting event stream. With stream prioritization the network administrator can prioritize which stream should get more bandwidth for wireless delivery. Protecting video quality

Another element in VideoStream is something called – Resource Reservation Control.

As one of the main drivers behind the Cisco's video strategy, medianet builds upon the strengths of a pervasively deployed Cisco Unified Wireless Network solution with VideoStream technology. VideoStream technology leverages benefits delivered by a medianet and carries forward the rich service capabilities required for video like: traffic prioritization, protection, monitoring, and adaptability to deliver a scalable, high-performance, high-quality enterprise video experience over Wi-Fi.

The solution is that VideoStream understands how much total wireless bandwidth is available. If a request comes in from an endpoint and there isn't enough available bandwidth, the new request will get a video not available message, which will protect the quality for the users that are already receiving the video.

In order to help provide as much wireless bandwidth as possible, Cisco's VideoStream also has a method to improve wireless scalability for video delivery with packet replication.

Packet replication is not the same as how load balancing an application works for wired Web servers.

The VideoStream technology is part of Cisco's unified wireless software for all of their wireless controller products.

Yele Haiti


Founded by Grammy Award winner Haitian-born musician and producer Wyclef Jean, Yéle Haiti addresses problems concerning education, health, environment and community.

Donate $5 to the Yele Haiti Earthquake Fund (Wyclef's organization) by using your cell phone to text “Yele” to "501501"

Donate $10 to the American Red Cross by using your cell phone to text "HAITI" to "90999"
Your cell phone bill will be charged

#Haiti 7.0 Earthquake. Through IHG Priority Club I donated 10,000 points to help earthquake victims in Haiti to the Red Cross

@technical I donated $15 to help relief in Haiti to www.yele.org from web in reply to adriarichards

Please Donate to the relief effort in Haiti. They needs us now more than ever.  


1.18.2010

Sing Celebrate - For A King Celebrate Dr. Martin Luther King, Jr.



My Grandmother Billie Jean Williams was born in Haiti. She's 2/4 Jewish and American. She Married my grandfather Joseph Williams who's father was a slave.

Rheta Williams my mother and her family owned property in Louisiana, ran stores and were mostly teachers. They lived just on the other side of the Mississippi river where slavery was rampant.

I am grateful for all those who suffered, marched, and sacrificed for my freedom.



United States Army Of One Logo StickerHaving followed my Grandfather and father into the Armed Services United States Army I am very well aware that Freedom is not free. Billions have died from the diaspora, thru Haiti, to this land we call America. 

Today we honor the warriors who were the catalyst that brought about the dream of Martin Luther King, Jr.  "I Have a Dream": The Life of Martin Luther King, Jr. (Home Use)Happy Birthday to a King.

Wireless LAN Accessories

This in-building antenna is designed for recessed ceiling spatial diversity installations requiring wideband coverage of 2.4 GHz to 2.5 GHz & 4.9 - 5.85Ghz frequencies. This model combines three ultra flat omnidirectional antennas with isolation greater than 25dB within 1 aesthetic radome. It utilizes UL listed materials that meet strict UL safety specifications for in-building installations, including 3 x 12 inch Plenum rated pigtails that can be terminated with various types of connectors.


Antenna Dimensions:
0.35 lbs Weight
0.99” Depth
7.875” Length
4.1” Width
FEATURES: • Efficient omni-directional diversity and MIMO performance. Provides excellent performance using 3 total 2.4 & 5Ghz elements in a single, low profile design.• Easy to install and mount to a recessed ceiling tile system.• Plenum rated cable can be installed in many indoor mounting locations, not just plenum areas.• Covers 2.4 to 2.5 GHz for 802.11b/g, and 4.9 to 6 GHz for 802.11a and all US, European, and Japanese WLAN applications• Coaxial cable pigtails with various connector choices

Wireless Broadband


How quickly things change. Last year, broadband was the thing. Now that's history: wireless broadband is where it's at. And it's hardly surprising. Wireless connection - and a fast wireless Internet connection in particular - is fabulously convenient. Move your PCs to wherever you want them without worrying about trailing network cables everywhere; make Voice-over IP calls from the bathroom; surf from the sofa; stream music around your house wherever you want it.

Text "Haiti" to 90999 to donate to the Red Cross for Haiti relief. 100% of your $10 donation passes through.

The last time we looked at how to set up a wireless network, there were several qualifications, problems and caveats. Many new wireless devices simply didn't work properly out of the box - if at all - and Windows XP's wireless configuration boxes had the unfortunate habit of leading you round in circles.

All this is changing, though. And while the nature of radio waves is that you may occasionally suffer connection problems, things have moved apace in the last year. The advent of MIMO devices, which provide greater range and speed by using the radio waves that bounce off obstacles, is a huge step forward for the reliability of connections. And Windows XP Service Pack 2's much-improved wireless network support means there's really very little effort required to get yourself up and running.

There's one thing you should be aware of, though: security. You need to secure your new wireless network as soon as possible. The newest and safest encryption system, WPA, is a doddle to implement and extremely secure if you follow our walkthrough and setup tips. The word 'encryption' puts people off because it sounds complicated, but it's vital to secure your network from people leeching your connection, stealing your bandwidth and potentially gaining access to everything on your PC. An unsecured wireless connection is the equivalent of an open front door - it's a direct route to everything on your hard disk.

THE ESSENTIALS

While networking has become easier since the launch of Windows XP and its more or less self-configuring network connections, it can still be a topic couched in obscure jargon, which it's worth getting a passing knowledge of.

Routers

When people talk about wireless routers these days, they're talking about a wireless access point and router combined. The access point part allows your wireless PCs and devices to connect together; the router part allows those wireless devices to talk to wired devices and, crucially, gain access to your broadband connection. If your broadband is ADSL, you'll need a wireless ADSL router; if you have a Telewest or ntl subscription, which came with a cable modem featuring an Ethernet output, you need a wireless cable/DSL router. You can also get away with a cable/DSL router if your ADSL modem has an Ethernet port. There's some confusing terminology surrounding products too. Wireless routers are sometimes referred to as wireless gateways, switches or hubs - they're the same thing mostly.

Ethernet

Practically every PC motherboard these days has an Ethernet networking port with a maximum speed of 100Mb/sec (Fast Ethernet) or 1,000Mb/sec (Gigabit Ethernet). A wireless router will usually sport five Ethernet ports: one for the WAN (wide area network) connection, which connects to your cable or DSL modem supplied by your broadband ISP, and four for the LAN (local area network) side. You don't need to use these if you're going for a purely wireless setup, but they allow you to connect wired devices for one unified network, and it's useful to be able to connect with a wired connection for initial setup of your wireless security.

Network addresses

All modern networks, from your home LAN up to the Internet, now use the TCP/IP (Transfer Control Protocol/Internet Protocol) system to communicate; it's almost made all other network protocols obsolete. TCP/IP is a packet-switched networking system. This means data is divided up and sent from transmitter to receiver in small chunks. These packets of information can travel via different routes around the network and need to be routed to the correct destination. This is why the single most important concept in a TCP/IP network is the IP address. Every network adaptor - wired or wireless - on a network must be assigned a unique IP address for that network, so that data packets can find their way to the correct destination. Without exception, all wireless routers will by default handle that automatically via DHCP (dynamic host configuration protocol). The DHCP server in the router doles out an IP address to every wireless PC or device that tries to connect to it.

Gateways and DNS servers

As well as giving a wireless device an IP address, it also informs the device of three important bits of information it needs to communicate: the address of a gateway, the address of a DNS server and a subnet mask. The first two allow the device to communicate with the Net. A gateway is simply the IP address of the device that can route data to and from an external network; in the case of a home router, that external network is the Internet. So in the majority of cases, the gateway address is in fact the router's own IP address; it then acts as a broker, forwarding requests for web pages back and forth via a process known as NAT (network address translation).

A DNS (domain name system) server is one that a PC uses to translate 'friendly' web addresses (www.pcpro.co.uk, for example) into numerical IP addresses by which it can request web pages. The subnet mask is often the cause of confusion; it's a way of separating network subsegments. You don't need to worry about it, however - it's only of relevance to corporate-scale networks and doesn't impinge on getting your wireless network up and running.

Incidentally, NAT also acts as a safeguard in conjunction with any hardware firewall the router may have, since it means that external PCs on the Net can't get direct access to any given PC on your internal wireless network. This is in contrast to USB modems commonly supplied by ISPs, which place your PC onto the Internet directly and are an invitation to hackers.

Mac address

A second type of address you'll probably encounter is known as the MAC (media access control) address. Every standard Ethernet network device, including Wi-Fi access points and adaptors, has a unique hardware MAC address assigned to it at manufacture. For the end user, this is useful, because it allows MAC address-based security to restrict access to a wireless network.

NEW TECHNOLOGY

In the beginning - at least as far as consumers and small businesses were concerned - there was 802.11b, the first popularly adopted Wi-Fi standard. It offers a maximum theoretical throughput of 11Mb/sec, but in practice you're highly unlikely to achieve anything exceeding 5Mb/sec. Then came 802.11g to give a maximum theoretical throughput of 54Mb/sec, but again it's near impossible to achieve even a third of that in practice. But that isn't the only problem - variations in positioning and range make an enormous and unpredictable difference in the speed and reliability of both 11b and 11g wireless networks. This is particularly true in Europe as opposed to the US, where houses tend to be made of wood with thinner walls more easily penetrated by radio waves. Put joists, metal-reinforced concrete and so forth in its way and the results are unpredictable.

The standard issue

The solution may well lie in MIMO (multiple input, multiple output) technology. This forms part of the as-yet unratified standard 802.11n, which is set to replace 11b and 11g. MIMO splits one incoming data stream into multiple lower-rate streams, transmitting simultaneously via two or more aerials on the same channel. It improves both range and transmission speed by relying on a phenomenon known as multipath, where signals arrive at different times because of reflections. That's usually considered a problem, but here it effectively creates virtual radio channels along which more than one stream of data can be fed on the same frequency. Receiving the differing signals on multiple aerials, the two data streams can be reconstructed. Current WLAN MIMO technology has a maximum theoretical speed of 108Mb/sec - twice as fast as 802.11g and more than enough to cater for multiple users streaming multi-media files around a large house. MIMO offers higher speeds over longer range than conventional WLAN, so you'll be able to connect from further away without needing to spend extra on wireless bridges or repeaters.

You'll need to spend more on the router itself, though. Not just because a pre-N router such as the Belkin costs around £75 to the £40 of a typical 802.11g router, but because you'll also need to buy matching PC Cards (or USB adaptors) to upgrade the wireless radios in your notebook or PC.

Apart from the inevitably high cost of buying a new technology, the chief drawback of MIMO is that until it's ratified by the IEEE the way in which it's implemented by manufacturers will be proprietary. This means there's no guarantee MIMO products from different manufacturers will work together at 108Mb/sec; it's more likely that everything will slow to standard 802.11g speeds. But having been using MIMO products - in particular, Belkin's Pre-N router and network card - for the last couple of months, we're big fans of the technology. Range and, more importantly, reliability of the connection are hugely improved.

Transfer big files, fast

Four months ago, we tested 15 wireless routers in a group test and saw clearly the benefits of MIMO technology over standard 802.11g. Although the MIMO-based routers were generally faster than 802.11g routers at close range, the real difference came when we moved our test notebook further away from the router: while many routers struggled to make a connection, the MIMO routers kept transferring at 9Mb/sec. At close range, the Belkin hit almost 17Mb/sec, so even a 100MB file transferred in less than a minute. We've included the full group test on the cover disc this month (click on the Editorial tab).

Streaming DVDs

Media streaming is one of the big selling points of home wireless networking; devices such as the Sonos Digital Music System spread audio around the house. The bandwidth demands of streaming MP3 audio are pretty modest; the standard data rate is just 128Kb/sec (or, to put it another way, less than 0.2Mb/sec). But video is a different matter, and high-quality DVD- Video in MPEG2 format is different again.

There are various systems and proprietary setups on the market that claim to transmit video over a standard 802.11g connection, and this they certainly do. What they can't do, however, is transmit DVD- Video in its original form without reducing its quality or its resolution. There are no magic solutions to the problem of bandwidth - a system either has enough for a given application or it must strip out some information in order to transmit a given data stream. The minimum bit rate for DVD-Video is 4Mb/sec and can extend up to almost 10Mb/sec for short, high-quality movies. This is only the bitrate required for the raw data - transmitting it over the network adds the significant data overhead of network communication protocols and error correction.

Despite the claims of many 802.11g products of 'turbo' modes giving more than 100Mb/sec, we've yet to encounter an 11g product fast enough to stream raw DVDs simply by sharing the DVD-ROM drive in Windows over the network. With MIMO, though, it's a different story. We've had a lot of success using Belkin's Pre-N router and accompanying network card to stream DVDs flawlessly from one PC to another - simply by sharing the DVD drive using standard Windows file sharing - at a separation of about 10m, with a partition wall in line of sight. The trouble is, there still isn't enough spare bandwidth available to be able to guarantee this will work for you, so buying a Pre-N setup purely to stream DVDs might result in disappointment.

SECURITY

As we've already pointed out, you must secure your wireless network as soon as possible after getting it up and running. There are three aspects to wireless security. In order of importance, these are encryption, stealth and access restriction.

Encryption

Encryption is the most important simply because if you use encryption properly the other two are unlikely to matter - your network should be safe from abuse.

There are two standards for encryption over Wi-Fi: WEP (wired equivalent protocol) and WPA (Wi-Fi protected access). WEP is the older of the two, and WPA has come about because WEP simply isn't secure enough. A fundamental flaw in its implementation - to do with the way it appends an extra section on the end of your chosen encryption key - means that over a moderately busy network a snooper can break WEP in a matter of hours.

Until recently, using WPA instead of WEP wasn't easy, since many devices didn't support it, plus comprehensive built-in Windows XP support only came with Service Pack 2. But that's changed now, and we'd advise anyone using WEP to change to WPA immediately. It's easier to set up too; whereas WEP needs a specific-length, impossible-to-remember hexadecimal key, WPA generates its keys from a password that can be anything from eight to 64 characters in length, using any normal characters including spaces. You can generate a long but easy-to-remember passphrase, simplifying things if you're setting up several PCs with wireless connections.

Remember that any encryption system is only as good as its passwords, and that applies equally to WPA. Short or easy-to-guess passphrases are a gift to hackers so, unlike a PIN, a four-digit number is basically useless. A hacker has no limit to the number of passphrases he can try, so yours has to be long and obscure enough that an automated passphrase generator won't guess it.

As well as short numbers, certain things you might think are clever should also be avoided. So, for instance, you might think 'darthvader' is a good one, but in fact every hacker has a dictionary list containing millions of well-known passwords like that. So, 'wallaceandgromit' is out, as is 'frodobaggins'.

Instead, you want a couple of random words, some numbers and some odd characters. For instance, 'cheese672 badger123?' is strong and highly unlikely to be broken by a dictionary attack. A unique sentence - not a well-known quote like 'Ross has a boiler in the living room' - is good too.

Stealth

By default, all access points come pre-configured with a standard name known as an SSID (service set identifier), which the access point merrily broadcasts to all and sundry, allowing clients to see that there's an access point to connect to. This is very useful in Starbucks, but the last thing you want in your home setup. So you should do two things: first, change the default SSID; and second, hide it by instructing the router not to broadcast its presence.

This makes it much more difficult for anyone to find and start attacking your setup. It's as easy as pie and simply requires you to think of a name and check the 'hide SSID' option, which your router will invariably have in its web-based configuration.

Access restriction

This is the most tedious aspect of wireless security to set up, but if you're paranoid MAC-address-based access control is one more obstacle in the path of a determined hacker. As we mentioned earlier, every Ethernet device has a unique MAC address which is unique for that device. By setting up a table of the MAC addresses of your wireless devices in the router, you can restrict access to only those devices - any device with an unknown MAC address will be refused a connection. The drawback is that you have to manually enter the MAC address of every device you want to connect, but that's only a problem if you frequently have new hardware or you want guest devices to connect to your network with the minimum of fuss. Some routers also allow you to flip this idea on its head and specifically deny access to MAC addresses you specify and allow all others. This can be useful if you suspect a particular PC on your network has been infected by a virus - by specifically denying it access to the wireless network until you're sure the infection has been cleaned, you reduce the risk of the virus spreading without having to physically remove the wireless adaptor.

Detecting unauthorised access

If you suspect someone's stealing your bandwidth by connecting without your consent, it can be difficult to verify. The best thing to do is go into your router's web-based configuration system and check the client DHCP list. This is the list of network adaptors currently assigned an address on the router. If you're using only one computer (or, more specifically, one network adaptor), there should be only one IP address listed, and it should correspond to the host name and MAC address of your PC. If there's more than one and you haven't forgotten about any other wireless devices you have, such as printers or media-streaming audio gadgets, someone else is probably connected.

Looking at the DHCP list isn't foolproof, though: if the person stealing your bandwidth has had the presence of mind to manually configure an IP address it won't show up in the DHCP list. But many routers also have a log-file feature, some of which show all clients making a connection - this should be foolproof if you can be bothered to wade through it. If it does seem that someone's piggybacking, note the MAC address and block it, then change your SSID and encryption keys, and also change to WPA if you're using only WEP.

Don't get too paranoid, though: if you've followed these instructions and WPA is properly set up, there's little chance of anyone breaking into your system. Enjoy your wireless freedom.

1.15.2010

Ubuntu Security

The Windows Mindset

If you are coming from a Windows background you are used to terms like antivirus, spyware, and firewalls. Linux is different and these are not as important.

Viruses

The fact of the matter is: viruses/worms take advantage of flaws or holes in the code. There are no significant Linux viruses "in the wild". Linux boxes are no less targets than any other OS.

Do not believe the suggestion that the Linux community is complacent or "behind the times" in terms of viruses, or any other security issue. Linux developers have not "ignored" viruses, rather the OS is built to be highly resistant to them and since the code is "Open" there are literally thousands of eyes watching .

For the most part, Linux anti-virus programs scan for Windows viruses which do not run on Linux.


Reasons AGAINST antivirus on Ubuntu:
  1. They scan primarily for Windows viruses.
  2. There is a high rate of false positives.
  3. Isolation/inoculation is poor.
  4. And currently there are no known active Linux viruses (so there is essentially nothing to detect).

Reasons FOR antivirus on Ubuntu:
  • You are running a file or mail server with Windows clients.
  • You wish to scan files before transferring them, by email, flash drive, etc., to a Windows machine.

Running antivirus can make some sense if you are intending to "protect" Windows users, however, for a variety of reasons, it is best if Windows users learn to protect themselves.

Note: There have been many documented cases in Windows and Linux that a buffer overflow in an antivirus product has been an attack vector!

If you would like to run an antivirus program on Ubuntu you have several choices :

Comments on wine

Discussions about running Windows viruses on wine crop up from time to time and it is possible to run some Windows viruses on wine.

See these links :

Take the same precautions with wine as you would with Windows. Do not install untrusted applications from untrusted sources.

Windows viruses will be confined to ~/.wine and they do not have permission to change system files. This means to remove them you simply:

Code:
rm -rf ~/.wine
Please take care, this command deletes everything in your wine directory including all data and all applications.

You then need to restore your wine directory from a known good backup (you do keep backups ?).


Firewall

GUFW (gui)

UFW - Desktops

UFW - Servers

Ubuntu includes a firewall, iptables, but by default nothing is engaged. This is reasonable as a default Ubuntu install opens zero ports to the outside world, so a firewall is redundant. However, installing "server software" will cause ports to open, so some people like to use a firewall as a catch-all layer to find mistakes in their configuration.

Another use for firewalls is for the administrator to forcibly impose network policies on the user.Also, a periodic audit of the system for open ports is a good practice. Running the "nmap" command from another machine, or using one of many online port scanners:

http://nmap-online.com/
https://www.grc.com/x/ne.dll?bh0bkyd2

Remember, what you care about are open ports. Closed ports and stealth ports are equally secure, in that they are inaccessible to the public.

Iptables references :

The "problem" with iptables is that it is not particularly friendly to new users. Fortunately, there are several more user friendly interfaces available to allow you to manipulate your firewall (UFW, Firestarter, and Guarddog) :


A source of confusion sometimes occurs when users feel the need to be running firestarter/Guarddog for their firewall to be active. This is untrue ! Keep in mind that these applications are not firewalls, but rather configuration tools for ip tables. These applications should be run only to configure your firewall. Once configured, IP tables (the actual firewall) is active (at boot) without having to run firestarter/guarddog. firestarter will monitor traffic, but it runs as root and there are better monitoring programs, so configure you firewall, shut down firestarter/grauddog, and let IP tables do the rest


Browser / Spyware : Java/Flash/Ad-ware/Trackers/Cookies

This is where most users will have the most risk.
We all want Java/Flash, but our Internet browser opens us to attacks.

  1. Deny all cookies and add trusted sites, allowing only for session.
  2. Install NoScript. Again block all and add trusted sites to a white list.
  3. Install Safe History
  4. Adblocking : I block with a hosts file rather then Adblock Plus or Adblock Filterset.G because a hosts file protects more then just firefox.



See this link for additional information : How to Secure Firefox


The Ubuntu Mindset


Permissions and Encryption

The first layer of defense is file permissions. Permissions are used to set access and thus protect both system and user files.

Basic permissions
FilePermissions

See also umask at the bottom of that link. The umask value can be set in ~/.bashrc.

To set a "private home", as a user,
Code:
chmod 700 $HOME

How to's:

Running Server(s)

Common servers include NFS, Samba, FTP, SSH, VNC, RDP, and HTTP. Desktops become Servers if server software is installed.

Questions to ask yourself include:
  1. What port(s) or services does this software provide?
  2. Who will be able to connect to this? (i.e. is it restricted to a range of IP addresses Password protected?)
  3. What level of access will the visitor have to the system? (i.e. does the server run under a restricted user, or the root account? What can this restricted user do in a worst case scenario?)
  4. Does this service expose any additional information that's useful to a hacker? (i.e. does it allow users to transmit their passwords in cleartext? Does it have a 'statistics' view that reveals logged-in users, ip addresses, network configuration, or other potentially helpful information?)
  5. What is the security history of this software? Does it have a history of vulnerability and patch after patch? Or has it had a relatively unmarred history?

Examples :

SSH
VNC
Apache


Forensics


What to do when you think you have been cracked :
  1. Power off.
  2. Disconnect/disable your Internet connectivity.
  3. Now take a deep breath, re-boot, and read the logs. Ask for help if needed, but you really need to confirm that your system has been compromised.
  4. If you have been compromised, and have the time and interest, boot a live CD and image your hard drive. This image can then be used for forensic analysis.
  5. Re-install. Unfortunately, there is no way to trust a compromised system.
  6. When you install, be sure to install off line, use a stronger password, and research intrusion detection.

Intrusion References
CERT® Coordination Center (CERT/CC)
CERT® Coordination Center ~ Intruder Detection Checklist


My goodness ...


Further Reading:

Ubuntu wiki ~ Security page

Ubuntu wiki ~ Installing Security Tools

UDSF Security Analysis Tools

The Big Ol' Ubuntu Security Resource

Locking Down Ubuntu

Ubuntu geek ~ Security category

Security references Topics include Basics, firewall, Intrusion detection, Chroot, Forensics/Recovery, and Securing networked services.


Changing poison into medicine,
Nam-myoho-renge-kyo
 Technicowl
A person with ubuntu is open and available to others, affirming of others, does not feel threatened that others are able and good, for he or she has a proper self-assurance that comes from knowing that he or she belongs in a greater whole and is diminished when others are humiliated or diminished, when others are tortured or oppressed. ~ Archbishop Desmond Tutu, 1999

1.13.2010

Haiti's Other Earthquake

Restavek and Child Slavery: Haiti's Other Earthquake

Haiti holds a romantic and tragic place in the historical imagination -- a nation birthed by a successful slave rebellion, it was the first to abolish slavery in the Western hemisphere and briefly served as a beacon of hope for American abolitionists. However, it never realized its promise, for reasons that scholars and analysts can debate ad infinitum.

Perhaps most egregiously, its grinding poverty is so pervasive that an estimated 300,000 children have been given up by their parents to become restavèks -- a creole term for children sent to become house servants to wealthier Haitians. According to human rights workers and survivors of the child-slavery system, these children are forced to work long hours, are often kept out of school, are barely fed and clothed, and are routinely abused physically, emotionally and sexually.


Now, professional recruiters have made the situation even worse by making a business out of the longstanding informal practice. Last June, a United Nations expert on contemporary forms of slavery, Gulnara Shahinian, visited Haiti at the invitation of the government and issued a report that included the recommendations summarized below:

Since it is still struggling to recover from devastating storms in 2008 and will now be focusing effort on earthquake rescue, relief and repair, it's not likely that Haiti will have the resources to enact the reforms advocated by the UN, so private efforts such as Cadet's take on greater significance. Other high-profile philanthropic efforts include Haitian American musician Wyclef Jean's Yele Foundation. In 2008, Jean spoke to Al Jazeerah about his efforts to combat Haiti's food crisis:
Jean also sprang into action about the earthquake via Twitter,tweeting a way to contribute to the relief effort via text message.

Jean's efforts to combat poverty in Haiti are complemented by the work of other philanthropists, including former Pres. Bill Clinton, who serves as the UN special envoy to Haiti. He toured the island in March, 2009 with UN Secretary Ban Ki-Moon to survey efforts by his foundation and other organizations to expand education and nutrition programs. Clinton has been upbeat about Haiti's future, saying it...
"...offers unique opportunities for public and private investment to improve health and education in ways that will be good for Haitians and all their partners in our interdependent world."

Now that the earthquake has delivered to the country what Mr. Ban has called "catastrophic" and Haitian President Rene Preval has called "unimaginable," considerably more effort will be required to ensure that those investments are made and the benefits trickle down to the poorest Haitians so that they will be able to feed and care for their own children. Ultimately, only economic development and sustained human rights activism will finally allow the island to realize the dream that its founders fought so desperately to achieve more than 200 years ago.

How to help - Haiti- Charitable Organizations

A list of charitable organizations active in the nation


msnbc.com
updated 11:11 p.m. CT, Tues., Jan. 12, 2010

The U.S. State Department Operations Center said Americans seeking information about family members in Haiti should call 1-888-407-4747. Due to heavy volume, some callers may receive a recording. "Our embassy is still in the early stages of contacting American citizens through our Warden Network," the U.S. State Department said in a statement. "Communications are very difficult within Haiti at this time."

For those interesting in helping immediately, simply text "HAITI" to "90999" and a donation of $10 will be given automatically to the Red Cross to help with relief efforts, charged to your cell phone bill

1.12.2010

Toshiba Satellite E205 with Intel 802.11n Wireless Display Technology



The E205 will be available for $999 on Best Buy’s site on January 12, (TODAY) and will appear in retail stores several days later.



The coolest feature of the E205? With the push of a button you can beem wirelessly whatever you're watching then stream 720p video from the notebook to (like Hulu) to your big-screen TV, courtesy of Intel’s new Wireless Display technology. The video is carried over 802.11n to the Netgear box, and is then converted to a wired HDMI signal. Best Buy bundles a special box from Netgear that acts as a wireless receiver and plugs into your HDTV via HDMI.

 

1.11.2010

Wi-Fi Alliance

 The Wi-Fi Alliance is a global, non-profit industry trade association formed in 1999 to certify interoperability of Wireless Local Area Network products based on the IEEE 802.11 standard and amendments with more than 200 member companies devoted to promoting the growth of WLANs. Certification programs ensure the interoperability WLAN products from different manufacturers, with the objective of enhancing the wireless user experience.


Wi-Fi Alliance Certification Programs address: Wi-Fi products based on IEEE radio standards 802.11a/b/g/n Wi-Fi Protected Access certification , wireless network security(WPA, WPA2 and WPS for personal and enterprise deployments), authentication mechanisms used to validate the identity of network devices (EAP), and support for multimedia content over Wi-Fi networks (WMM and WMM Power Save. (WPS) Wi-Fi Protected Setup certification.