industryterm:antivirus software

  • What is #aws #lambda or #serverless ?
    https://hackernoon.com/what-is-aws-lambda-or-serverless-f0a006e9d56c?source=rss----3a8144eabfe3

    AWS Lambda logoThere has been a lot of talk about serverless and AWS lambda these days. More and more companies and teams are switching towards the serverless architecture for their applications.In this article, I will be explaining serverless and we will be deploying our first hello world lambda function!What is Serverless?Serverless simply means that you don’t have to manage the servers on which your application runs.You don’t have to take care of patching the system, installing antivirus software or configuring firewalls. Also, you don’t have to worry about scaling your application as the load increases, it is handled automatically!Hence, it allows you to focus more on the functionality of your application.Why is it better?Normally, when you are creating a dynamic web application you (...)

    #cloud #cloud-computing

  • Allure Magazine Will No Longer Use the Term “Anti-Aging” - Allure
    https://www.allure.com/story/allure-magazine-phasing-out-the-word-anti-aging

    With that in mind, and starting with this issue, we are making a resolution to stop using the term “anti-aging.” Whether we know it or not, we’re subtly reinforcing the message that aging is a condition we need to battle — think antianxiety meds, antivirus software, or antifungal spray.

    #âgisme #presse_féminine

  • Chinese Computer Games | Foreign Affairs
    https://www.foreignaffairs.com/articles/137244/adam-segal/chinese-computer-games

    Keeping Safe in Cyberspace
    By Adam Segal
    March/April 2012

    In March 2011, the U.S. computer security company RSA announced that hackers had gained access to security tokens it produces that let millions of government and private-sector employees, including those of defense contractors such as Lockheed Martin, connect remotely to their office computers. Just five months later, the antivirus software company McAfee issued a report claiming that a group of hackers had broken into the networks of 71 governments, companies, and international organizations. These attacks and the many others like them have robbed companies and governments of priceless intellectual property and crucial military secrets. And although officials have until recently been reluctant to name the culprit, most experts agree that the majority of the attacks originated in China.

    (bon papier mais paywall)

    #chine #etats-unis #cyberguerre #internet

  • http://code.google.com/p/libperseus

    http://code.google.com/p/libperseus/logo?cct=1299322141

    PERSEUS library is an open source technology whose aim is to secure any kind of communication streams against illegitimate or abusive eavesdropping except for Nation State Security offices, provided that a suitable, huge computing power is used (from tens of hours with a supercomputer). PERSEUS enables to provide at the same time users’ needs for privacy and confidentiality while preserving the ability of security agencies (police, defense, national security...) to eavesdrop communications of really bad actors (terrorists, child pornographs...). The PERSEUS technology can be very useful in different cases:

    - To protect against illegal or abusive eavesdropping activity by malware on a large scale (e.g. botnets which are listening on non standard TCP ports rather than hooking keyboards for example; hooking techniques are indeed supposed to be detected by antivirus software).

    - To protect against private stream eavesdropping by private intelligence companies (consuming behaviour analysis, economic intelligence, non legal eavesdropping...).

    - To protect communications from “non democratic” states towards democratic states (e.g; journalists).

    - To protect professionnal of business communications in countries where cryptography use is limited or forbidden.

    The interest of the PERSEUS technology lies also in the fact that TRANSEC aspect is also provided (protecting the communication channel). In other words, any data stream protected with PERSEUS looks like a lot of legitimate, unencrypted data streams. Moreover, its statistical profile is constantly changing (statistical mutation).

    PERSEUS technology has been developped by Eric Filiol. Current applications and implementations of PERSEUS library are:

    – Eddy Deligne has implemented the first application dedicated to the HTTP stream through a Linux/Windows Firefox module (the sever is also available). See the Google code repository as well as the Perseus Apache Google code repository.

    - Fabien Jobin has designed the Andromede library embedding the PERSEUS library to protect torrent protocols. Go to the Andromeda Google code repository.

    PERSEUS technology is an open source technology under the triple GPL/LGPL/MPL licence.

    http://code.google.com/p/andromeda
    http://code.google.com/p/perseus-firefox

    #privacy