There are several statements in the computer security field which are misunderstood, one very important one is “security through obscurity is bad.” First let’s talk about what we mean when we say security by obscurity, it means that the security of a system or process resides in the secrecy of the whole method rather than strength or design of the system. It can be better understand with the help of an example, suppose you kept all your money in an ‘unbreakable’ safe and locked that down. So the security resides in the strength of the safe and the key combination that is needed in order to open the safe since everyone knows where the money is, but the main strength is the key combination that is kept secret. It is the combination of keys which guarantees the safety of the money. On the other hand, if you buried the money in some place in such a way that only in some particular night during the full moon, shadow of the particular tree will point to that place, its security by obscurity since all the security depends only on the fact that no one knows this.
Hello, i am again sorry for delaying the post, was busy in some personal work. well all is good when i am back now.
So today lets talk about something which is very close to everyone, either you belong to security industry or not, you do care about your PRIVACY dont you? i guess the answer is yes..
Privacy is a ability of a individual or group who wants to keep something restricted to themsevs and dont want anyone else to know about it. well in security world we often say that there is no 100% secrecy, so you can try to keep things private but chances are very small that you will be susscessfull. Well you may not even know that someone else knows what you think is private, but thats different case. We all have our own personal space, which we dont want anyone to know and thats normal, its very “Human”, but what happens when someone breached into your personal space without your knowledge ? obviously no one would like to face that situation that your private pictures are posted online which you kept in some hidden filder or your laptop and thought they are hidden from world. But on the other hand in real life it happens all the time, we hear evey day about leaked mms , songs get leak before official relases, private pictures of celebrities are posted online. This kind of unintended action is called PRIVACY VIOLATION.
Security is a shield (environment) we create around us to feel secure from things we dont want to be affected.
Security always has its scope, it can be personal , it can be family, society, National , or global.. for example terrorism is a national security threat, global warming is a threat with the scope of global. the point is we in real life underestimate security where things are under our control and overestimate security where things are not in our control. let me put it this way, how come riding on a bike on a highway can be more secure than having a terrorist attack? in both the cases chances are equally high that you will die, but we care less about bike because we think we have things in our control, and overestimate terrorism because that’s not in our control.
Its very common that people often misunderstood information security as a technical security, think about this which firewall restricts an employee to share his password to his friend? can you secure that ? the answer is NO.
Pogoplug Pro is the first of a new variety of hardware from Pogoplug. They are based on the PLX/Oxford Semiconductor NAS7820 SoC, which provides two ARMv6 cores clocked at 700MHz. The Pro has an onboard mini-PCIe slot that is used for a WiFi module.
Pogoplug V3 and the new pink colored Classic models are the continuation of the “oxnas” hardware from Pogoplug. They are based on the same PLX/Oxford Semiconductor NAS7820 SoC. Unlike the Pro/Video varieties, these do not have a mini-PCIe controller or slot.
The SoC used in these models is not supported in the mainline Linux kernel, and all sources are covered under an NDA with PLX. We support these devices with a custom kernel that is flashed alongside the original kernel in flash memory. This is a safe and non-destructive process, and allows the devices to use all of the software in our repositories.
Model numbers located on bottom of foot:
POGO-P01 – Pro
POGO-P21 – V3
POGO-P25 – V3
POGO-B01 – Classic
POGO-B02 – Classic
POGO-B03 – Classic
POGO-B04 – Classic