'Central Station' Video

June 2005
Security: Solutions for Enterprise Security Leaders;Jun2005, Vol. 42 Issue 6, Special Section pN
Trade Publication
This article focuses on the central station video security. Steve Shaer of VideoSave, developed this idea and believes that such a back to the future approach will arrive because of shortcomings of digital video recorders (DVRs). A DVR is little more than a PC and PCs are prone to failures, with the weakest link being the hard disk, where the video is stored. Computer users are bombarded by software updates for vulnerabilities and viruses in the underlying Windows, and even Linux operating systems. With nearly every DVR attached to the Internet these days, making them exposed, the risks can increase. .


Related Articles

  • Control your users. Hudson, Paul; Morrison, Graham // APC (Bauer Media Group);Jan2008, Vol. 28 Issue 1, p103 

    The article presents information on how to add new users to a computer system running on the Linux operating system, change password, and to manage groups for easy administration. It is stated that with Linux, one can add a safe user account that's impossible for even the most clueless user to...

  • Gunk Busters! Leonhard, Woody // PCWorld;Jan2006, Vol. 24 Issue 1, p74 

    This article offers tips on how to maintain personal computers. Start by visiting the Windows Update site to make sure that the computer have the latest patches for the version of the operating system. Next, check the antivirus and antispyware utilities for updates, and then run a complete check...

  • editorial. Sarno, Tony // APC (Bauer Media Group);Aug2006, Vol. 26 Issue 8, p6 

    The article presents the comments of the author on issues related to the computer software industry. He says that the most powerful, secure, feature-rich operating system--Vista--for consumer computers will be released by Microsoft Corp. in January 2007. The Vista operating system will come as...

  • When the virus becomes Windows. Butler, Jamie // APC (Bauer Media Group);Dec2005, Vol. 25 Issue 12, p28 

    The article provides information on Windows rootkit, a program or set of programs than an attacker uses to maintain a permanent and undetectable presence on a computer. Rootkit is designed to act as part of the Windows operating itself so the computer user is completely unaware that anything out...

  • NOVELL'S BALANCING ACT. Galli, Peter // eWeek;3/27/2006, Vol. 23 Issue 13, p16 

    The article reports on the challenges faced by Novell Inc. on how to win customers of the Windows platform while also persuading its legacy NetWare users to migrate to Linux operating systems. The company plans to use those releases to convince businesses that switching to its products will be...

  • Prevention, updates crucial in taming the 'Silicon beast'. Goldsborough, Reid // New Orleans CityBusiness (1994 to 2008);9/24/2007, Vol. 28 Issue 9, p18 

    The article provides tips to prevent computers to stop working. It is helpful to use an anti-virus program, fire-wall program, and anti-spyware program. The author emphasizes the best approach to update Windows or whatever operating system an individual is using regularly. He stresses the need...

  • Content Management. Beck, Mike // InfoWorld;8/8/2005, Vol. 27 Issue 32, p40 

    This article presents information on several content management system applications available in the U.S. market in August 2005. OpenCms runs on Apache Tomcat under most operating systems and is licensed under the LGPL. Implementation support and other professional services are available from...

  • XP Downloads. Otey, Michael // Windows IT Pro;Jan2006, Vol. 12 Issue 1, p65 

    The article deals with the ten most interesting Microsoft software that can be downloaded from the Internet for the Windows XP computer operating system. The Microsoft Photo Story 3 for Windows lets users edit digital photos, create slideshows with narration and music and burn slideshows to...

  • Hasta la Vista, Aqua. Farivar, Cyrus; Seff, Jonathan // Macworld;Aug2004, Vol. 21 Issue 8, p88 

    Mac OS X and Unix both have a command line at their cores. And just as Apple placed the glossy Aqua user interface atop OS X, open source programmers have designed the K Desktop Environment (KDE) to give Unix a useful windowed interface. But while Unix users can't get Aqua without buying a...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics