Sabtu, 14 April 2012
Kell, High Security Concept-Based Operating Systems Linux!
Kell itself is a Linux operating system that will fit in the category of secure system, where the packages will be used is a package that supports the security of a system. In general, Linux-based operating Sitem who have high-security technology has a flaw that is operational in everyday applications is somewhat complicated. However, this operating system has a technology which is equivalent to linux backtrack to the smooth operation of the well.
Various technologies which we will install the package that has the capability of high defense and attack on a system. With high security is supported by the descendants of UNIX systems will increasingly have a good stability. Kell will be developed from the Debian-based linux. This is because linux Bactrack itself was now in the Debian base. That will facilitate the transformation of the package will ayang Kell do to develop further.
Some of the traits that we would apply to Kell:
Have high security capabilities with packet hacking Kell will bring a package that generally in use for network security, with this allowing Kell able to perform manipulation capabilities of security systems. Packages such as maps and other hacking package will we apply to Kell.
System "out of the box"
Kell is the operating system in a state that has a default or a so-called "out of the box". This means that Kell did not need to install the application support after installation is complete Kell, so Kell could have directly used in a variety of things such as multimedia, office, game, 3D desktop, printer, internet package complete. List of systems out of the box that is on Kell
A. Has installed all the multimedia codecs
2. Has installed proprietary drivers for VGA (Intel, Nvidia, Ati)
3. The printer driver has been installed complete enough
4. Have been installed flashplayer etc.
With the full support of multimedia systems
Besides having a high-security technology Kell will have a multimedia-based application packages are complete.Making Kell I expect to be completed by mid or late 2012 maximum.Kell I will continue to develop despite the current manufacturing process is not finished, but a concept of Kell has become the benchmark for how to depanya Kell. However, because the manufacture of unfinished Kell will be able to make changes from what was in the launch palm in a concept. Though some have mentioned the concept will remain on hold and I mean change is the addition of a new technology that I can not mention.
Constraints are the bottlenecks in the manufacturing Kell me is the lack of hardware devices that lack adequate support and, as less than the maximum hardware specifications.
IT security in the era of globalization
Recently, the issue of information security becomes an integral part in the various fields, because the security of an information is a priceless thing. A private data stored in computers may very well be a secret that does not want anyone to know. Is an even distribution of important information in a company that does not want to be known by others and the public. Or perhaps worse still the file is a state secret information which is very dangerous if it has spread to the public or known by outsiders.
Security in a computer must not only be safe in cyber but also locally. A wide range of bank burglary case, an intrusion into a system website, or theft of valuable information from individuals and groups of people who have been irresponsible to problems that arise as the development of information technology is increasingly shot.
Do you remember about the case of Luna Maya and Aril Peterpan?
Still exist in our minds about the circulation of a video nasty in Indonesia doing a horrendous artist various circles. From what we can judge that from the video in question also do not want it to backfire for them. However, due to negligence (human error) or a system error (system error) the reason why it could happen.Or in the case of agents of the Russian woman who managed to steal important information in the U.S. Defense.
When someone manages to take the important information in a secret national defense would be a bad thing for the country. However, important information is sometimes just a sweet stored in a computer that they deem safe enough. Even if we are to review each case mostly done by people in itself. Although in a large company of a computer that stores important or confidential documents are usually just the boss who has the password to unlock the computer, but does not cover the chance that data could be taken by others. Example when the computer is in living in conditions of light, then the people who do not have a password on that computer will even be able to take over the computer.
This is what becomes the new reference standard in a high security IT world. To continuously developed and minimize any act of Cyber Crime in the era of globalization include human error and support a safe system.
Langganan:
Posting Komentar (Atom)
Tidak ada komentar:
Posting Komentar