G$earch

Log in with your face

Posted by Harshad

Log in with your face


Log in with your face

Posted: 09 Feb 2010 03:48 PM PST

KeyLemon adds an extra layer of security to your computer log-in process by making your Webcam do all the heavy lifting. Instead of typing your password, KeyLemon 2.2 associates your face with your profile, and then regularly checks to make sure that the person sitting in front of the computer matches the image attached to that profile. If it doesn't think they match, the computer takes a photo via the Webcam and then automatically goes to hibernate.

The latest version of KeyLemon introduces a Firefox plug-in called LemonFox that lets users log in to three social-networking services using their Webcam.

Once installed, the program's Wizard will walk you through creating a profile of your face, and link it to your computer's log-in. By default, KeyLemon will check the Webcam every 10 seconds to make sure you're you, although that can be changed in the Control Center's LemonScreen tab. Also, KeyLemon conveniently includes a text bypass for your log-in. This is important because, occasionally, KeyLemon won't be able to recognize you.

The problem is rare, but I found it occurs in two situations. In bright-light settings where the details of your face get washed out, KeyLemon struggles and often fails to recognize your face. There was also occasional failure on laptops resuming from a closed-lid hibernation. One big bug was on laptops jumping from a dock to an undocked state, where the program would freeze the entire operating system and require a reboot. Generally, though, KeyLemon worked more than 90 percent of the time over several days of testing.

KeyLemon's setup wizard.

(Credit: Screenshot by Seth Rosenblatt/CNET)

In the Control Center under the LemonScreen and LemonLogin tabs, you'll find a decent array of settings to tweak. These include being able to toggle on and off the log-in feature, configuring the program to run at start-up, program logging, reshooting your profile pic, and creating your own skins.

The Firefox plug-in LemonFox can be used to log you in to your Facebook, LinkedIn, or Twitter accounts. Just like the main program, LemonFox opens to a tutorial to get you started, and it uses the Webcam to prevent unauthorized access--at least on the computer with KeyLemon installed. It's a good idea to start with the social-networking services, but what I'd really like to see is integration with the Firefox password manager and support in other browsers.

Overall, though, it seems like a solid software tool for adding an extra layer of security to your computer for a reasonable price. The trial limits you to 30 uses, but has no major feature restrictions. A one-year license retails for $19.95, and it's compatible with XP, Vista, and Windows 7.

See what's under McAfee's new interface

Posted: 09 Feb 2010 02:23 PM PST

McAfee spent three years researching and developing a new vertical interface for its consumer security suites, and has made them far better in the process. The improved detection engine includes enhanced download scanning, faster scan and start-up times, and a stronger firewall.

Check out this First Look video for a tour of McAfee AntiVirus Plus. If you're interested in McAfee Internet Security 2010 or McAfee Total Protection 2010, note that those upgrades have more features tacked onto the same security engine, but they lack trials.

Tales2Go: Get on-demand audiobooks for children

Posted: 09 Feb 2010 09:44 AM PST

Tales2Go offers a variety of short stories and full-length audiobooks.

Hey, fellow parents. Sick to death of the kids' "Wiggles" CDs? Exhausted the library's "Magic Tree House" collection? Do I have an app for you: Tales2Go provides on-demand access to nearly 900 children's stories. It's my single favorite app of 2010 (so far).

The Tales2Go collection includes works from a variety of audio publishers, including Audio Bookshelf and Recorded Books. A Tales2Go representative told me a couple "major" new publishers will collectively add about 80 more titles to the library in coming weeks.

The app provides countless ways to peruse the catalog, starting with highest rated and most popular playlists. You can also browse by age group, story type, narrators (a few recognizable names, including Catherine O'Hara and Tom Bosley), character and series, and grade level.

The collection includes everything from two-minute fables to six-hour novels, with just about everything in between. I found "American Girl" and "Diary of a Wimpy Kid" titles for my 10-year-old daughter, and "Encyclopedia Brown" and "Henry and Mudge" for my 7-year-old son. Truly, there's something here for everyone.

The Tales2Go app scores high with its smart, simple interface. While listening to a story, you can create a bookmark (for easily returning to where you left off), add the story to your Favorites list, and apply a rating.

There's even an alarm feature so you (or, presumably, your children) can wake up to Tales2Go, which automatically plays your favorites station.

If you end up using the app in the car, keep in mind that streaming audio requires a decent EDGE, 3G, or Wi-Fi connection--which could be a problem if you're driving in a rural area. I wish it would include a download option.

The app is free and includes a 30-day trial of the Tales2Go service. After that, a one-year subscription will cost you a very reasonable $24.99--about what you'd pay for a couple audiobook CDs. Needless to say, I consider this a killer deal.

If you have preteen-or-younger children, and have a good way to listen to iPhone audio via your car's speakers, I can't recommend Tales2Go highly enough. Check out the demo video:

Originally posted at iPhone Atlas

Microsoft, Google split over browser bug bounty

Posted: 09 Feb 2010 04:00 AM PST

To entice security researchers to look for holes in the Chrome browser, Google has announced it will pay $500 for bugs found in the code. But several experts say that's not enough money to motivate skilled vulnerability researchers.

"I think it's ridiculous," Charlie Miller, a senior security researcher at Independent Security Evaluators, said when asked Monday for his opinion of Google's new bug bounty program. "It's insulting. It's so low."

Under Google's new "experimental" incentive program, announced last week, people will get paid $500 for select interesting and original security vulnerabilities discovered in Chrome, or $1,337 for particularly severe or clever bugs. That figure refers to the geek term for elite, or "leet," which can be spelled out using the numbers.

Mozilla pays $500 to researchers who find valid security bugs in the Firefox browser, the Thunderbird e-mail client, or the Mozilla suite.

Jeremiah Grossman, chief technology officer and co-founder of WhiteHat Security, said Google's plan could be the start of an interesting trend.

"If a researcher is purely interested in the dollar reward, then by all means he should go where the dollar is highest. But if you happen to find one because it's fun and interesting to you, then you'll get paid too," he said. "I've been suggesting Microsoft should do this for a long time but they have a moral issue with it."

Microsoft is sticking with its no-bounty stance.

"Microsoft does not offer compensation for information regarding security vulnerabilities. We do not believe that offering compensation for vulnerability information is the best way we can help protect our customers," said Dave Forstrom, group manager of Microsoft Trustworthy Computing. "We also do not think it fosters the growth of a healthy ecosystem."

You would think Google would be roundly praised for offering to pay researchers for work they often do for free. But not everyone is impressed.

"It's probably better to pay professional QA [quality assurance] people and pen [penetration] testers than to expect the public to do your testing for you on the cheap," said Gary McGraw, chief technology officer at Cigital and a specialist in secure code writing processes. "No excellent professional tester I know would be attracted by a bounty like that--perhaps adolescents would do it for beer money (or rather Red Bull and vodka money)."

Miller's criticism might be particularly stinging, given that he announced a campaign called "No More Free Bugs," about a year ago. He argued that vendors should pay when outside researchers discover vulnerabilities in their commercial software instead of freeloading on the efforts of volunteer bug hunters whose work ends up making the products safer.

"In some senses this is my dream come true," Miller said. "I've been begging vendors for this. And then when it happens I'm bitter and critical," because it's so much lower than what researchers can make from bounty programs at VeriSign iDefense's Vulnerability Contributor Program and the Zero Day Initiative run by 3Com's TippingPoint.

"If I did find a bug in Chrome, I could sell it to the Zero Day Initiative and make $2,000 and it still gets reported to Google eventually, so why would I give it to Google for $500? It doesn't make sense," he said.

Pedram Amini, who runs the Zero Day Initiative, wouldn't say exactly how much the program pays for bugs, but did allow that "on average it's over 10 times what Google's offering."

"Google is the first huge company to create a bug bounty. I'm happy they're doing it. It's a step in the right direction," he said. "But pricing-wise, they're not going to be able to compete with other bug bounty programs."

On the bright side
Granted, it might be easier to find bugs in beta software than in products that have been released to the public, which the Zero Day Initiative focuses on, according to Amini. And it's wise for Google to do something to attract the attention of researchers to its browser, which is much newer and has fewer users than the other major browsers, he said.

"I think there is going to be a subset of people who will use the Google program," he said. "One thing that is certain--vulnerabilities do have value."

Google's pay scheme is at the low end of what iDefense pays, according to Rick Howard, director of iDefense Intelligence.

"Google has always shown that it is willing to take on large and complex projects for which it has no past experience and make a success of it. I see no reason why they should not succeed in this one," Howard said.

And Google doesn't always go cheap. Last July, it paid more than $8,000 to a team of researchers that won a Native Client Security Contest.

Asked to comment on complaints that $500 is too little compensation for bug hunters, Chris Evans of the Google Security Team wrote in an e-mail: "We took care to design the program to allow for a wide variety of bugs to qualify for payment and to make it easier for researchers to participate--for example, we don't necessarily need a working exploit (which is often much more difficult than finding a bug) and we're interested in bugs even if they manifest within the Chromium sandbox."

Chromium is the open-source project for Google's Chrome browser and unreleased Chrome operating system. Evans said it was too early to say whether Chrome OS would be included in the bounty program after it launches.

"Chromium has already benefited from collaboration with security researchers, and we expect they will continue to scrutinize the Chromium code and help us improve it regardless of any action we take," he said. "To them, this reward can be seen as a token of appreciation. To others, we hope the addition of a reward may encourage new people to participate beyond how they might have otherwise."

Originally posted at InSecurity Complex

Mozilla plans to drop Mac OS X 10.4 support

Posted: 09 Feb 2010 03:34 AM PST

Mozilla wants its Firefox browser to drop support for Mac OS X 10.4--the operating system also known as Tiger that was released in 2005--but the plan is running into some resistance.

If support is indeed removed, then Firefox 3.6--the current version of the browser--would be the last one to support Mac OS X 10.4, although Mozilla would still issue updates for several months after the succeeding version of Firefox is released.

"We would like to take advantage of more modern technologies on Mac OS X, and 10.4 support has been a hindrance," Josh Aas, one of Mozilla's Mac experts, said in a mailing list post. "We are planning to make the decision to remove 10.4 support final and remove the code from the tree. If you have any strong objections please let us know now."

There are objections, of course.

"I still have two PowerPC machine that use OS X 10.4.11...As it stands now it impractical for me update either machine due to lack of funds...So if support for 4.11 is removed then that means I will have to go to something else such a iCab, Opera, or OmniWeb rather than Firefox and you don't need to lose users," Phillip Jones said in a response, suggesting a two-track approach. "You can create one with all the fancy new stuff. Then one for us poor people that [can't] drop ($3,000) at the drop of the hat and have to hang onto older equipment out of necessity."

But his objection and some from others have not moved Mozilla members to change course thus far.

"Does this suggestion come with a donation for doubling of full-time development resources, QA [quality assurance] and testing, build and release infrastructure, and user support for this second track that would cover a shrinking minority of Firefox on Mac users?" Mozilla's Asa Dotzler asked in a post. "There are currently approximately 1.5 million people using Firefox on 10.4 and we're fully aware of that...In one year, I expect 10.4 to account for less than 5 percent of Mac OS X users and at that point it will have less prominence than Windows 98."

Supporting Mac OS X 10.4 also comes with a penalty for those who are using 10.5 and 10.6, added Mozilla programmer Boris Zbarsky. "We can significantly improve the user experience on 10.5 and especially 10.6 if we drop support for 10.4 (we're talking something like 30 percent performance improvement on 10.6, for example if I recall the numbers correctly, between the newer compiler and doing 64-bit builds," he noted.

Mike Shaver, Mozilla's vice president of engineering, added that the decision wouldn't immediately cut off those with Tiger.

"10.4 users would still have a supported release until Firefox 3.6 was end-of-lifed, which I would expect to be at least 6 months after the trunk release of which Boris speaks," Shaver said. "They wouldn't be able to upgrade to the latest and greatest, but they would still get stability and security updates."

The sometimes-emotional debate recapitulated elements of a 2009 discussion about dropping Mac OS X 10.4 support.

Originally posted at Deep Tech

0 comments:

Post a Comment