The Alfa AWUS036H is the latest version of the most powerful card available. This has a stunning 1000mW output power. So if you are looking for a device to connect to an outdoor 2.4 GHz antenna, such as on a boat or an RV, this is a perfect solution. It outperforms wireless cards that are built in to newer laptops. Adding this to your laptop or desktop computer will enhance range and signal quality at longer distances. And works with Win98SE/200/ME/XP, Windows Vista, Windows 7, Linux (kernel 2.6.6 and later) and Macintosh (OS version 10.4). And the necessary drivers for ALL of these operating systems are included on CD-ROM
* Connects at a full 54Mbps via USB 2.0, up to 8 times faster than a USB 1.1 adapter
* High gain upgradeable
* Compact size for greater flexibility
* Also compatible with USB 1.1 desktop and notebook computers
* Plug-and-Play Compatible with windows 98SE, 2000, Millennium, XP and Linux
* High security 64/128/256bit WEP Encryption, TKIP, WPA, 802.11
Instituto Sagres gave the lecture “The Intelligence and Cyber Power”. The event occurred on 19 September 2012 and was part of the Cyber Intelligence Symposium, organized by the Brazilian Army Intelligence School (EsIMEx).
The approach is an analogy with the rise of Air Power and its Theories, as well as Air Forces, from the invention of the balloon, by priest Bartolomeu de Gusmão, to the present day, under the focus of Intelligence for military use. Examines aspects of the emergence of Air Power Theories and as in its early days the air vector was seen only as a tool for Intelligence, without any military value as stated by Marshal Foch in 1910, notably with use only for the (Aerial) Reconnaissance, replacing the cavalry and later seen as a replacement to the high spots on the ground, as the Military Doctrine of the time. In this analogy, we have uncovered a probable metric for chronology of emergent Cyber Power in function of the use of the Fifth Dimension: Cyberspace; until then only seen as a source of Intelligence, without any military value. The author leads the audience to question at what timeline point, in the use of Cyberspace, we would be: at the time of the Duque de Caxias balloons (or American Civil War) or UAV? The speaker brings to reflect the questioning of how far away we are from what could be Cyber Power Theories and Cyber Forces (the next Force among Armed Forces) and how Intelligence has and will have a key role in this evolution.
View the original article here
This book is designed to give readers of all backgrounds and experience levels a well-researched and engaging introduction to the fascinating realm of network security. With real-world examples that reflect today’s most important and relevant security topics, Penetration Testing will address how and why people attack computers and networks, so that readers can be armed with the knowledge and techniques to successfully combat hackers. Because the world of information security changes so quickly and is often the subject of much hype, this book also aims to provide a clear differentiation between hacking myths and hacking facts. Straightforward in its approach, this valuable resource teaches the skills needed to go from hoping a system is secure to knowing that it is.
Click here to buy from Amazon
Cet ouvrage examine les modalités du cyberconflit, en particulier la cyberguerre (guerre cybernétique, guerre informatique). Il introduit la notion d’affrontements dans la dimension informationnelle (ADI). Ce concept regroupe l’ensemble des opérations et actions situées entre la cybercriminalité et la cyberguerre.
La cyberattaque et la cyberdéfense deux dimensions majeures du cyberconflit, sont développées à l’aide d’analyses de scénarios. Les questions de géopolitique et de relations internationales sont exposées afin de confronter les discours sur le cyberpouvoir et la cyberpuissance à ceux sur la guerre froide, la guerre nucléaire et les guerres nouvelles.
Enfin, le cyberconflit est observé à travers le prisme de l’art de la guerre.
Des logiques d’affrontement conventionnelles sont applicables, mais doivent composer avec des phénomènes spécifiques au cyberespace: absence d’attribution des attaques, absence de preuve, réduction des notions de temps et d’espace.