Security

Security

mobile tracer

nowadays there are risk in everything even in using a phone when people get unwanted texts and mis call they get irritated,if intel makes an app which helps trace a particular mobile number then they can trace the number and complain the police department and action can be taken and parents can keep track of their kids movement without knowing them

Submitted by

Voting

-1 votes
Active

Security

IPSEC assistance through hardware (on chip)

I would like to have IPSEC client ability provided on chip. This shall enable secure access to say enterprise resource from remote computer. This would be real nice as you move the security below one layer to chip from operating system supporting IPSEC client, or installation of software from IPSEC security provider.

Submitted by

Voting

-2 votes
Active

Security

My Data: My Personal History

Easy Tracker. An idea is to have personalizer,which indeed help to fetch any important related to me. This has to absolutely confidential and digitally encrypted. What data? 1)My educational Data:Scanned certificate Qualification details, Education details with all important stats and numbers. 2)My finance Details Mutual fund Credit cards, Bonds Pan Card Etc 3)My Company Experiences My medical My Payroll ...more »

Submitted by

Voting

-2 votes
Active

Security

Tracking laptops through Laptop Serial code

Currently lost/stolen mobile phones can be tracked using thier IMEI no. but there is no such provision for tracking the laptops. since most of the laptops available today come with WIFI connectivity, a laptop can be easily tracked using the serial no(or any other unique code associated with the laptop) of the laptop. this can serve in two ways: 1). recovering lost or stolen laptops 2). tracking terrorist activities ...more »

Submitted by

Voting

-2 votes
Active

Security

Passwords with time as a dimension

In a enterprise level sritical security requirement, time between keystoke can be considered as a constraint for password. Lets say user wants to create his new password. He types in the first character and purposefully idles out 2 seconds and then types the second character and then continues then the password to login will be considered with that pause. Even if the user enters the same characters it doesnt login. He ...more »

Submitted by

Voting

-2 votes
Active

Security

Password with time as a dimension

In a enterprise level sritical security requirement, time between keystoke can be considered as a constraint for password. Lets say user wants to create his new password. He types in the first character and purposefully idles out 2 seconds and then types the second character and then continues then the password to login will be considered with that pause. Even if the user enters the same characters it doesnt login. He ...more »

Submitted by

Voting

-2 votes
Active

Security

inbuilt Antivirus Into the notebooks

There should be Inbuilt anti virus into the notebook.Just we have to keep update that anti virus time to time and no other anti virus software will be required to install for security reasons into the notebooks.This internal inbuilt anti virus software will be within the window files and can provides much better security than other software.This must be according to the version of window like different for Xp,Vista and ...more »

Submitted by

Voting

-2 votes
Active

Security

Login safely without text password.

Whenever we give our credetinals to any web portal instead of using password we can choose any type of file

and calculate cryptographic hash of that file. With this

we can increase the login security.

Submitted by

Voting

-2 votes
Active

Security

Security in Software world

Security has got lot of significance in Software envirnment. This is due to the fact that users store their valuable informations like account passwords,creditcard informations etc. How we ensures that these informations are stored securely? We can implement our own security system for the application being developed. But this will affect cost, time, effort etc. On the other hand thre are several security tools available.One ...more »

Submitted by

Voting

-2 votes
Active

Security

Cab movement monitoring

The private cab companies can have a device installed in all their cabs which can track the location, number of passengers and possibly a camera survelliance to cater to growing security threats across country. This device would be integrated using a GPS, a camera and a wireless storage device.

This system can be utilized by public transport department as well.

Submitted by

Voting

-2 votes
Active

Security

Security Knowledge among Youth

Most of the penetration problem of intel into the indian market is because of lack of awareness. There has to be an awareness program targetted at the security feature of both software and hardware. Bios Level usages are misused in lots of places and the compatibility mapping of the hardwares with intel motherboards are substituted with replicas which are both cheap and non secure. If Intel increases the awareness to ...more »

Submitted by

Voting

-2 votes
Active

Security

password manager

With increasing participation in the number of social networking sites and forums its hard to keep track of your passwords. Of course you can always save them in your browser but if your computer is shared or there are multiple users you would want privacy. A easy to use password manager would store passwords for all sites for a particular user. Each user has his own PIN. Thats it 1 PIN for 20 sites. Useful and easy. ...more »

Submitted by

Voting

-2 votes
Active