TITLE

'Central Station' Video

PUB. DATE
June 2005
SOURCE
Security: Solutions for Enterprise Security Leaders;Jun2005, Vol. 42 Issue 6, Special Section pN
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
This article focuses on the central station video security. Steve Shaer of VideoSave, developed this idea and believes that such a back to the future approach will arrive because of shortcomings of digital video recorders (DVRs). A DVR is little more than a PC and PCs are prone to failures, with the weakest link being the hard disk, where the video is stored. Computer users are bombarded by software updates for vulnerabilities and viruses in the underlying Windows, and even Linux operating systems. With nearly every DVR attached to the Internet these days, making them exposed, the risks can increase. .
ACCESSION #
17202392

 

Related Articles

  • Control your users. Hudson, Paul; Morrison, Graham // APC (Bauer Media Group);Jan2008, Vol. 28 Issue 1, p103 

    The article presents information on how to add new users to a computer system running on the Linux operating system, change password, and to manage groups for easy administration. It is stated that with Linux, one can add a safe user account that's impossible for even the most clueless user to...

  • Gunk Busters! Leonhard, Woody // PCWorld;Jan2006, Vol. 24 Issue 1, p74 

    This article offers tips on how to maintain personal computers. Start by visiting the Windows Update site to make sure that the computer have the latest patches for the version of the operating system. Next, check the antivirus and antispyware utilities for updates, and then run a complete check...

  • editorial. Sarno, Tony // APC (Bauer Media Group);Aug2006, Vol. 26 Issue 8, p6 

    The article presents the comments of the author on issues related to the computer software industry. He says that the most powerful, secure, feature-rich operating system--Vista--for consumer computers will be released by Microsoft Corp. in January 2007. The Vista operating system will come as...

  • When the virus becomes Windows. Butler, Jamie // APC (Bauer Media Group);Dec2005, Vol. 25 Issue 12, p28 

    The article provides information on Windows rootkit, a program or set of programs than an attacker uses to maintain a permanent and undetectable presence on a computer. Rootkit is designed to act as part of the Windows operating itself so the computer user is completely unaware that anything out...

  • NOVELL'S BALANCING ACT. Galli, Peter // eWeek;3/27/2006, Vol. 23 Issue 13, p16 

    The article reports on the challenges faced by Novell Inc. on how to win customers of the Windows platform while also persuading its legacy NetWare users to migrate to Linux operating systems. The company plans to use those releases to convince businesses that switching to its products will be...

  • Prevention, updates crucial in taming the 'Silicon beast'. Goldsborough, Reid // New Orleans CityBusiness (1994 to 2008);9/24/2007, Vol. 28 Issue 9, p18 

    The article provides tips to prevent computers to stop working. It is helpful to use an anti-virus program, fire-wall program, and anti-spyware program. The author emphasizes the best approach to update Windows or whatever operating system an individual is using regularly. He stresses the need...

  • Content Management. Beck, Mike // InfoWorld;8/8/2005, Vol. 27 Issue 32, p40 

    This article presents information on several content management system applications available in the U.S. market in August 2005. OpenCms runs on Apache Tomcat under most operating systems and is licensed under the LGPL. Implementation support and other professional services are available from...

  • XP Downloads. Otey, Michael // Windows IT Pro;Jan2006, Vol. 12 Issue 1, p65 

    The article deals with the ten most interesting Microsoft software that can be downloaded from the Internet for the Windows XP computer operating system. The Microsoft Photo Story 3 for Windows lets users edit digital photos, create slideshows with narration and music and burn slideshows to...

  • TIGER ARRIVES.  // Macworld;Jul2005, Vol. 22 Issue 7, p50 

    This article features the release of the operating system (OS) Tiger by Apple Computer in 2005. The OS focuses on tools such as Spotlight and Dashboard, as well as the updated versions of Safari, Mail and iChat. It also provides tips on how to safely install OS X 10.4 and how to get up-to-speed...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics