Notice: The called constructor method for WP_Widget in collapsCatWidget is deprecated since version 4.3.0! Use
instead. in /var/www/vhosts/121/242034/webspace/siteapps/WordPress-56954/htdocs/wp-includes/functions.php on line 4718
Brendan Moran - IT Consultant and IT Trainer, Wicklow, Ireland - Part 10

Apple Mac — New Virus

ZD Net report­ed on 29th Oct 2010 

A new Tro­jan horse mal­ware that affects Mac OS X has been uncov­ered by Mac­in­tosh Secu­ri­ty site SecureMac.

The Tro­jan is called ‘trojan.osx.boonana.a’ and is being dis­guised as a video and dis­trib­uted through social-net­work­ing sites such as Face­book. It appears on peo­ple’s Face­book pages and may con­tain the text “Is this you in this video?” in the link. When the link is clicked, the Tro­jan runs a Java applet that down­loads oth­er files to the com­put­er and auto­mat­i­cal­ly opens an installer.

The Tro­jan will then run in the back­ground and appears to report sys­tem infor­ma­tion to servers on the inter­net, lead­ing to a poten­tial breach of per­son­al infor­ma­tion. The Tro­jan also attempts to spread itself by send­ing spam email mes­sages from the user’s account.

Davy’s Stock Market app for iPhone

Davy Stock­bro­kers have launched a new stock mar­ket app for the iPhone .

Sim­ply vis­it the App Store and type in Davy to install.

It is avail­able for free.

Apple’s iPhone v Google’s Android

Cia­ra O’Brien has a good arti­cle in today’s Irish Times (16th July 2010) high­light­ing the bat­tle between Apple’s iPhone and Google’s Android sys­tem which oper­ates across a range of hand­sets.

Both sys­tems have had recent upgrades. Apple’s iOS4 boasts over 100 new fea­tures or tweaks includ­ing mul­ti­task­ing (lim­it­ed), abil­i­ty to cre­ate fold­ers easy shut­ting down of appli­ca­tions in the back­ground,  but still no Flash sup­port. Android has beefed up Exchange sup­port and has always sup­port­ed Flash.

Apple has a tight con­trol over the os on its iPhone and Google has lit­tle or no con­trol on what hand­sets uses its Android sys­tem. This is rem­i­ni­es­cent of the ear­ly eigth­ies when Apple only allowed Mac OS on its PCs but Microsoft allow DOS/Windows onto any PC.

Database Development

Access 2013I design and devel­op a wide range of data­base sys­tems. These range from desk­top Access sys­tems to enterprise/internet wide SQL and MySql. These data­bas­es are cus­tomised 100% for my clients. They are nev­er sta­t­ic and can be devel­oped to grow with your busi­ness / organ­i­sa­tion­al needs. Data­bas­es are far supe­ri­or to spread­sheets — with data­bas­es you enter the data once and then you can get unlim­it­ed views and turn that raw data into infor­ma­tion. I also spe­cialise in recov­er­ing data from cor­rupt Access data­bas­es.

The five main rea­sons why peo­ple com­mis­sion one of my data­bas­es are:

• Improve Oper­a­tional Effi­cien­cies
• Reduce Costs
• Gen­er­ate New Rev­enues
• Deliv­er Improved Cus­tomer Ser­vices
• Adhere to good busi­ness prac­tices

Infor­ma­tion = Organ­ised Data + Typ­i­cal Data­base include:

  • Cus­tomer Rela­tion­ship Man­age­ment (CRM)
  • Sales and Sales Analy­sis Data­bas­es
  • Stock / Inven­to­ry Sys­tems
  • Point of Sale (POS) Sys­tems
  • Time and Billing Sys­tems
  • Finan­cial Con­sul­tan­cy Sys­tems
  • Bank­ing Data­bas­es
  • Order Man­age­ment Sys­tems
  • Equip­ment Hire and Timed Based Invoic­ing
  • Mar­ket­ing Cam­paign Sys­tem
  • Cus­tomer Ques­tion­naire / Feed­back
  • Health/Safety and Social Wel­fare Data­bas­es
  • Research Data­bas­es
  • Hos­pi­tal Depart­ment Data­bas­es
  • Accounts Cus­tomi­sa­tion
  • Legal Data­bas­es
  • Book­ing Sys­tems
  • Data­bas­es for Solic­i­tors
  • Pen­sion Data­bas­es
  • Schools Data­bas­es

I also recov­er data from cor­rupt Access data­bas­es .

Preventing Enterprise Data Loss — 6 Best Practices

There is an excel­lent Arti­cle on ZD Net 15th June 2010 about the 6 Best Prac­tices for Pre­vent­ing Enter­prise Data Loss. These include:

#1: Under­stand what data is most sen­si­tive to your busi­ness.

#2: Know where your most sen­si­tive data resides.

#3: Under­stand the ori­gin and nature of your risks.

#4: Select the appro­pri­ate con­trols based on pol­i­cy risk  and where sen­si­tive data resides.

#5: Man­age secu­ri­ty cen­tral­ly

#6: Audit secu­ri­ty to con­stant­ly improve.