security

Archi & Techno

Edge Computing : learn to delegate

While the interest for the Internet of Things by companies is no longer to be proven, this area continues to give a hard time to experts, as for security and architecture. Indeed, the multiplication of data sources brings a reflection on the architecture of networks. As Satya Nadella (Microsoft CEO) said on stage in 2017: "When I joined Microsoft in 1992, all Internet traffic was 100 gigabytes a day. Today is 17.5 million times that amount ... per second! "And we are only at the…

Lire la suite
IoT

IoT and Security: an impossible union?

One of the most crucial questions to ask about the Internet of Things today is: does the IoT have a future despite its inherent lack of security? Studies show that despite the obvious acknowledgment that this ecosystem is full of security breaches that can endanger its functioning, companies' interest in IoT does not go away. Indeed, in a pragmatic dynamic, organizations opt for the undeniable contribution that these technologies bring on their business and their methods of work compared to the dangers generally accepted as…

Lire la suite
Archi & Techno

Develop a secured Android application

Android applications are commonly used to process very sensitive data. It is the developer's responsibility to make sure that the information prompted by the user cannot be intercepted easily by a malicious people. The Open Web Application Security Project (OWASP) [9,10] tries to enumerate the potential security issues of a mobile application. Some of them are the system architect's responsibility (such as issues related to weak server sides control), some are the back end developper responsibility (issues related to authentification checks) and finally, some are…

Lire la suite
Archi & Techno

How to rescue your data, 3/3

Last time we have seen how to rescue your FAT. In this article we'll see a third, and last, way of losing data. Physically crash a hard disk Hard disk are made of mechanical pieces, so they are subject to ageing. The S.M.A.R.T. technology, shipped in hard disk for years, can monitor a bunch of indicators helping you foresee your hard disk's end of life. Under GNU/Linux, smartd is widely used. As all the indicators, if they are not seen by a human, they are…

Lire la suite
Archi & Techno

How to rescue your data, 2/3

Last time, we have seen how to rescue a partition. Let's go further and make an other mistake... Crash your partition's FAT The FAT (file allocation table) is a map : it tells the OS where all the files of your partition are. Thus, there is one FAT by partition, and the FAT is depending of the filesystem of your partition. It's the same analogy as the partition table : if you loose this map, the cities are still there but you don't know where.…

Lire la suite
Archi & Techno

How to rescue your data, 1/3

I could show you the recipe on how to rescue your data and disks, but as it mainly depends on the way they are erased / crashed, I will show you in which particular case the rescue I expose can be made. Thus, in those 3 articles I'll expose you three different ways of crashing data and disks, and the ways to rescue them. It serves another purpose : to show you how easy it is to lose data and disk. I've tested for you…

Lire la suite