If this were a movie, we’d be laughing at the improbability of the premise — that encryption can be cracked by listening to the high-pitched sounds produced by a computer’s CPU as it decrypts data. But it’s real, and although it can be done at a distance of 4 meters with a parabolic microphone, the researchers (Daniel Genkin, Eran Tromer, and Adi Shamir, who is the S of the RSA cryptosystem) also showed that it could be done with a smartphone sitting next to a laptop. Upping the ante, they suggest that a microphone hidden inside a colocated server could eavesdrop on numerous nearby servers. In short, if security is paramount, both heavy-duty encryption and physical protection are necessary. follow link
Trust Local Addresses in VirusBarrier X6's Antivandal
VirusBarrier X6's Antivandal feature stops all kinds of network attacks, including port scans, ping floods and more. However, you may have some devices on your network that send out pings or other requests that may be interpreted as attacks. To prevent this, add them to the Trusted Addresses list so they won't be blocked. You can even add a range of addresses with wildcards, such as 192.168.1.*.
- ExtraBITS for 6 January 2014 (06 Jan 14)
Encryption Cracked by Listening to a Computer’s CPU