Modern graphics cards are now today with plenty of RAM. This memory has a very high throughput. If you don’t run a big X11 environment, why not dedicate this memory to another purpose? Swap space by example! Check out: http://gentoo-wiki.com/TIP_Use_memory_on_video_card_as_swap.
Category: Hardware
Your iPhone has a Good Memory!
I don’t have a iPhone yet. I’m waiting for the version “2” which should support 3G networks. Take care if you sell your beloved iPhone to an untrusted person: Your phone (as any other PDA or mobile phone) knows everything about you: emails, calls, SMS, visited websites. When the owner
Sesame Ouvre Toi!
New gadgets appeared on the access-control market: the online or “e-door locks”! New devices can be locked or unlocked from any browser (notebook, mobile phone, …), change the code or review the activity log. Read the news here.
Do not Underestimate Physical Security
Security in IT is everywhere: firewalls, proxies, anti-[spam|virus], IDS and more! But what about physical security to your IT infrastructure? Read the following story: Peter Gabriel‘s web site was off the web due to a server theft! I would like to know how the thieves performed! Why spend money to
Microsoft Helps Big Brother
In a previous post, I talked about US authorities who have rights to read your hard drives. Today, Microsoft announced a new toy USB stick called COFEE: Computer Online Forensic Evidence Extractor. “The device contains 150 commands that can dramatically cut the time it takes to gather digital evidence, which
Drive-thru Hijaking
No idea if used radio frequencies are the same in Europe/Belgium but it’s really funny!
High Technology Snack?
Today I went with colleagues to a snack in Louvain-La-Neuve to pick up some food. This is a “standard” snack where students are employed like many others on university campus. But today, I saw a brand new box next to the door: It is a fingerprint scanner from Oytech, a
Brrrrrrr!
In a previous post, I talked about whole disk encryption. More and more security incidents are reports by medias were laptop are stolen or list in the nature with thousands of ultra-confidential-top-secret-data. That’s why disk encryption becomes a hot topic at the moment. A “hot” topic? In fact, it’s more
Follow the cable…
Recorded this morning… Of course, this SDSL line is business critical!
3D GPS Demo
A new generation of GPS devices is on the way. They integrate now three dimensional maps. The next one should be linked to Google Maps!