Custom Thin Client

We can custom configure your thin client to connect remotely to any environment. We can customize your thin client to connect to multiple remoting protocols such as MS Remote Desktop, Citrix or VMware.

We can design a custom thin-client to meet your specific needs. We can customize thin-clients to various VESA mount configurations so our thin-clients can be seamlessly integrated into monitors or TV's. We can customize our thin-clients with integrated keyboard, mouse and displays for an all in thin-client solution. We can also customize the operating system for your thin-client

Millions of Peripherals Open to Cyberattacks

Firmware can be burned into the integrated circuit or the component may have its own flash memory where firmware is stored. Firmware can also be provided by the operating system at boot time. Regardless of the approach, firmware is used as the device-specific operating system for the peripherals, and can provide hackers many ways to hack into a system. Many peripheral devices do not verify that firmware is properly signed with a public/private key before running the code. ...

Intel Patches Flaw in Security Engine

It's not the first flaw found in CSME. In November, a critical flaw in CSME was patched that could allow escalation of privilege, denial of service or information disclosure. Another critical flaw discovered in May could allow an authenticated user to enable escalation of privilege over network access in CSME. ...

Google Chrome Will Block File Downloads

Google started to label HTTP websites with an "insecure" warning in the navigation bar from Chrome 68. Just because websites use an HTTPS connection does not guarantee that they are safe from all threats. Phishing landing pages can easily use SSL certificates. Similarly, HTTPS websites can still serve up images, scripts or other file types that are downloaded using the less-secure HTTP connection. ...

Microsoft Patches Crypto Spoofing Flaw

he vulnerability, CVE-2020-0601, exists in the way Windows Crypt32.dll validates Elliptic Curve Cryptography certificates. Core CryptoAPI functions include encrypting and decrypting data using digital certificates. The CryptSignMessage function creates a hash of the specified content, signs the hash, and then encodes both the original message content and the signed hash. On unlatched systems, hackers can evade next-ge ...